{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:19:50Z","timestamp":1740169190140,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2020JJ4647","2020JJ6064"],"award-info":[{"award-number":["2020JJ4647","2020JJ6064"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Project of the Hunan Education Department","award":["UQ19B056","18B410"],"award-info":[{"award-number":["UQ19B056","18B410"]}]},{"name":"General Project of the Hunan Education Department","award":["19C0171"],"award-info":[{"award-number":["19C0171"]}]},{"name":"General Project of the Changsha Technology Bureau","award":["KC1809015"],"award-info":[{"award-number":["KC1809015"]}]},{"DOI":"10.13039\/100008970","name":"Teaching Research Project of the Hebei Normal University of Science and Technology","doi-asserted-by":"publisher","award":["SZYB202014"],"award-info":[{"award-number":["SZYB202014"]}],"id":[{"id":"10.13039\/100008970","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3036716","type":"journal-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T21:20:39Z","timestamp":1604956839000},"page":"204203-204213","source":"Crossref","is-referenced-by-count":2,"title":["Trust Research on Behavior Evaluation Based on Fuzzy Similarity"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8151-895X","authenticated-orcid":false,"given":"Limiao","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1017-762X","authenticated-orcid":false,"given":"Jiayin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2854832"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00898-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.1205"},{"key":"ref30","first-page":"3956e","article-title":"Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things","author":"li","year":"2020","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2909279"},{"key":"ref11","first-page":"3465","article-title":"Advancing the strategic messages affecting robot trust effect: The dynamic of user- and robot-generated content on human-robot trust and interaction outcomes","author":"jake","year":"2016","journal-title":"Cyberpsychol Behav Soc Network"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34630-9_46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104812"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54525-2_10"},{"key":"ref17","first-page":"899","article-title":"Collective engagement and spiritual wellbeing in knowledge based community: A conceptual model","author":"fachrunnisa","year":"2019","journal-title":"Proc Conf Complex Intell Softw Intensive Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"ref19","first-page":"534","article-title":"A reputation management and selection advisor schemes for peer-to-peer systems","author":"mekouar","year":"2009","journal-title":"Proc IFIP\/IEEE Int Workshop Distrib Syst Oper Manage"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0969-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2386-6_54"},{"key":"ref27","first-page":"76","article-title":"Fuzzy theory for the P2P subject trust evaluation model","volume":"8","author":"chen","year":"2012","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"ref3","first-page":"825","article-title":"Survey of research on dynamic trust mechanism in grid environment","volume":"29","author":"ma","year":"2018","journal-title":"J Chin Comput Syst"},{"article-title":"Formalizing trust as a computational concept","year":"1994","author":"marsh","key":"ref6"},{"key":"ref29","first-page":"148","article-title":"P2P network trust model based on priority","volume":"39","author":"li","year":"2013","journal-title":"Comput Eng"},{"key":"ref5","first-page":"354","article-title":"Highly reliable trust establishment scheme in ad hoc networks","author":"ren","year":"2012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cancergen.2014.10.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367525"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2017.6135"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1844-5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2010.48"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.984"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973754.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38323-6_18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.02.006"},{"key":"ref23","first-page":"307","article-title":"Alternative ranking based on fuzzy similarity in group decision-making","volume":"45","author":"guo","year":"2010","journal-title":"J Southwest Jiaotong Univ"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35130-3_6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2016.14"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09252083.pdf?arnumber=9252083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:04Z","timestamp":1639771024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9252083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3036716","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}