{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:49:48Z","timestamp":1776876588058,"version":"3.51.2"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115240","type":"journal-article","created":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T05:06:18Z","timestamp":1776143178000},"page":"115240","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Dynamic trust evaluation based on heterogeneous graph convolution network and lightweight attention"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2957-7033","authenticated-orcid":false,"given":"Pengyong","family":"Li","sequence":"first","affiliation":[]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2272-0494","authenticated-orcid":false,"given":"Jiaqi","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7375-0393","authenticated-orcid":false,"given":"Siguang","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0764-3351","authenticated-orcid":false,"given":"Wei","family":"Shi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115240_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111731","article-title":"Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in industrial internet of things","volume":"161","author":"Sarkar","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115240_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110641","article-title":"Secure architecture for industrial edge of things (IEoT): a hierarchical perspective","volume":"251","author":"Li","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.asoc.2026.115240_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2022.109486","article-title":"An edge computing based anomaly detection method in IoT industrial sustainability","volume":"128","author":"Yu","year":"2022","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"10.1016\/j.asoc.2026.115240_bib0020","doi-asserted-by":"crossref","first-page":"2462","DOI":"10.1109\/COMST.2020.3009103","article-title":"Edge computing in industrial internet of things: architecture, advances and challenges","volume":"22","author":"Qiu","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.asoc.2026.115240_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2019.106017","article-title":"APAD: autoencoder-based payload anomaly detection for industrial IoE","volume":"88","author":"Kim","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115240_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102303","article-title":"Adversarial attacks and defenses in explainable artificial intelligence: a survey","volume":"107","author":"Baniecki","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.asoc.2026.115240_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103402","article-title":"A review on trust management in fog\/edge computing: techniques, trends, and challenges","volume":"204","author":"Nikravan","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.asoc.2026.115240_bib0040","series-title":"2025 IEEE Conference on Computer Applications (ICCA)","first-page":"1","article-title":"A graph neural diffusion network for sophisticated persistent threat hunting in IoT environments","author":"Yenugula","year":"2025"},{"key":"10.1016\/j.asoc.2026.115240_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106146","article-title":"Dynamic and multi-objective reconfiguration of distribution network using a novel hybrid algorithm with parallel processing capability","volume":"90","author":"Jafari","year":"2020","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"10.1016\/j.asoc.2026.115240_bib0050","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.1109\/TNSM.2022.3173398","article-title":"A trust management method against abnormal behavior of industrial control networks under active defense architecture","volume":"19","author":"Wang","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"10","key":"10.1016\/j.asoc.2026.115240_bib0055","doi-asserted-by":"crossref","first-page":"18410","DOI":"10.1109\/JIOT.2024.3361914","article-title":"Dynamic trust management for the edge devices in industrial internet","volume":"11","author":"Yu","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"21","key":"10.1016\/j.asoc.2026.115240_bib0060","doi-asserted-by":"crossref","first-page":"21260","DOI":"10.1109\/JIOT.2022.3179428","article-title":"Toward a trust evaluation framework against malicious behaviors of industrial IoT","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.asoc.2026.115240_bib0065","series-title":"International Conference on Intelligent Computing","first-page":"461","article-title":"Feedback Mechanism-Based trust evaluation model for mobile edge computing in industrial IoT","author":"Cheng","year":"2024"},{"issue":"10","key":"10.1016\/j.asoc.2026.115240_bib0070","doi-asserted-by":"crossref","first-page":"14205","DOI":"10.1109\/TNNLS.2023.3275634","article-title":"Trustgnn: graph neural network-based trust evaluation via learnable propagative and composable nature","volume":"35","author":"Huo","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115240_bib0075","series-title":"IEEE INFOCOM 2020","first-page":"914","article-title":"Guardian: evaluating trust in online social networks with graph convolutional networks","author":"Lin","year":"2020"},{"key":"10.1016\/j.asoc.2026.115240_bib0080","series-title":"2021 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Graph neural networks for heterogeneous trust based social recommendation","author":"Mandal","year":"2021"},{"key":"10.1016\/j.asoc.2026.115240_bib0085","author":"Usman"},{"key":"10.1016\/j.asoc.2026.115240_bib0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.125391","article-title":"Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entities","volume":"260","author":"Jafarian","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115240_bib0095","series-title":"IEEE INFOCOM 2023-IEEE Conference on Computer Communications","first-page":"1","article-title":"Dtrust: toward dynamic trust levels assessment in time-varying online social networks","author":"Wen","year":"2023"},{"issue":"5","key":"10.1016\/j.asoc.2026.115240_bib0100","first-page":"1","article-title":"A survey on trust evaluation based on machine learning","volume":"53","author":"Wang","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"9","key":"10.1016\/j.asoc.2026.115240_bib0105","doi-asserted-by":"crossref","first-page":"7314","DOI":"10.1109\/TWC.2022.3157621","article-title":"LTrust: an adaptive trust model based on LSTM for underwater acoustic sensor networks","volume":"21","author":"Du","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"10.1016\/j.asoc.2026.115240_bib0110","doi-asserted-by":"crossref","first-page":"3814","DOI":"10.3390\/s23083814","article-title":"A dynamic trust-related attack detection model for IoT devices and services based on the deep long short-term memory technique","volume":"23","author":"Alghofaili","year":"2023","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.asoc.2026.115240_bib0115","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.1038\/s41598-023-28721-x","article-title":"A secure and dependable trust assessment (SDTS) scheme for industrial communication networks","volume":"13","author":"Khan","year":"2023","journal-title":"Sci. Rep."},{"issue":"7","key":"10.1016\/j.asoc.2026.115240_bib0120","article-title":"Compressing medical deep neural network models for edge devices using knowledge distillation","volume":"35","author":"Alabbasy","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"5","key":"10.1016\/j.asoc.2026.115240_bib0125","doi-asserted-by":"crossref","first-page":"4665","DOI":"10.1109\/TMC.2023.3297026","article-title":"Designing and training of lightweight neural networks on edge devices using early halting in knowledge distillation","volume":"23","author":"Mishra","year":"2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.asoc.2026.115240_bib0130","series-title":"2024 Annual Computer Security Applications Conference (ACSAC)","first-page":"131","article-title":"T-Edge: trusted heterogeneous edge computing","author":"Shen","year":"2024"},{"issue":"6","key":"10.1016\/j.asoc.2026.115240_bib0135","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3419100","article-title":"Trust in FPGA-accelerated cloud computing","volume":"53","author":"Turan","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.asoc.2026.115240_bib0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107342","article-title":"Trustworthiness assessment for industrial IoT as multilayer networks with von neumann entropy","volume":"106","author":"Wu","year":"2021","journal-title":"Appl. Soft Comput."},{"issue":"10","key":"10.1016\/j.asoc.2026.115240_bib0145","doi-asserted-by":"crossref","first-page":"10093","DOI":"10.1109\/TMC.2024.3373469","article-title":"Enhancing worker recruitment in collaborative mobile crowdsourcing: a graph neural network trust evaluation approach","volume":"23","author":"Zhan","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"10.1016\/j.asoc.2026.115240_bib0150","doi-asserted-by":"crossref","first-page":"3635","DOI":"10.1109\/JSYST.2021.3099072","article-title":"A deep autoencoder trust model for mitigating jamming attack in IoT assisted by cognitive radio","volume":"16","author":"Abdalzaher","year":"2021","journal-title":"IEEE Syst. J."},{"issue":"4","key":"10.1016\/j.asoc.2026.115240_bib0155","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/JIOT.2021.3081422","article-title":"LightTrust: lightweight trust management for edge devices in industrial internet of things","volume":"10","author":"Din","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"10.1016\/j.asoc.2026.115240_bib0160","doi-asserted-by":"crossref","first-page":"4433","DOI":"10.1109\/TDSC.2024.3353548","article-title":"TrustGuard: GNN-based robust and explainable trust evaluation with dynamicity support","volume":"21","author":"Wang","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.asoc.2026.115240_bib0165","doi-asserted-by":"crossref","first-page":"12","DOI":"10.63180\/jcsra.thestap.2025.2.2","article-title":"Analyzing cybersecurity risks and threats in IT infrastructure based on NIST framework","volume":"2025","author":"Aljumaiah","year":"2025","journal-title":"J. Cyber Secur. Risk Audit"},{"key":"10.1016\/j.asoc.2026.115240_bib0170","series-title":"Proceedings of the 14th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"Applicability of the IEC 62443 standard in industry 4.0\/IIoT","author":"Leander","year":"2019"},{"key":"10.1016\/j.asoc.2026.115240_bib0175","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.neucom.2021.03.091","article-title":"A review on the attention mechanism of deep learning","volume":"452","author":"Niu","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.115240_bib0180","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"6688","article-title":"An empirical study of spatial attention mechanisms in deep networks","author":"Zhu","year":"2019"},{"key":"10.1016\/j.asoc.2026.115240_bib0185","article-title":"Film: visual reasoning with a general conditioning layer","volume":"32","author":"Perez","year":"2018","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"issue":"1","key":"10.1016\/j.asoc.2026.115240_bib0190","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","article-title":"Birds of a feather: homophily in social networks","volume":"27","author":"McPherson","year":"2001","journal-title":"Annu. Rev. Sociol."},{"key":"10.1016\/j.asoc.2026.115240_bib0195","series-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"66","article-title":"Graph structure learning for robust graph neural networks","author":"Jin","year":"2020"},{"key":"10.1016\/j.asoc.2026.115240_bib0200","author":"Wu"},{"key":"10.1016\/j.asoc.2026.115240_bib0205","series-title":"RED: A Rich Epinions Dataset for Recommender Systems","author":"Meyffret","year":"2012"},{"issue":"3","key":"10.1016\/j.asoc.2026.115240_bib0210","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/JSAC.2022.3229422","article-title":"GNN at the edge: cost-efficient graph neural network processing over distributed edge servers","volume":"41","author":"Zeng","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.asoc.2026.115240_bib0215","first-page":"989","article-title":"Research on power balance and measurement of new energy power system based on graph neural network","author":"Liyan","year":"2024","journal-title":"Distrib. Gener. Altern. Energy J."},{"key":"10.1016\/j.asoc.2026.115240_bib0220","series-title":"2016 IEEE 16th International Conference on Data Mining (ICDM)","first-page":"221","article-title":"Edge weight prediction in weighted signed networks","author":"Kumar","year":"2016"},{"issue":"20","key":"10.1016\/j.asoc.2026.115240_bib0225","first-page":"22001","article-title":"A generalizable anomaly detection method in dynamic graphs","volume":"39","author":"Yang","year":"2025","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"issue":"6","key":"10.1016\/j.asoc.2026.115240_bib0230","first-page":"5865","article-title":"Gatrust: a multi-aspect graph attention network model for trust assessment in osns","volume":"35","author":"Jiang","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006885?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006885?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:09:47Z","timestamp":1776874187000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":46,"alternative-id":["S1568494626006885"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115240","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Dynamic trust evaluation based on heterogeneous graph convolution network and lightweight attention","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115240","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115240"}}