{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:51:47Z","timestamp":1774021907844,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132011"],"award-info":[{"award-number":["62132011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10278691","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"5972-5977","source":"Crossref","is-referenced-by-count":1,"title":["RepuFilter: Prevention of Untrusted Packet Spread Based on Trust Evaluation in Wireless Networks"],"prefix":"10.1109","author":[{"given":"Han","family":"Bao","sequence":"first","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Xiaoping","family":"Zhang","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Gaoyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Mengyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Yisong","family":"Wang","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy vikor","volume":"20","author":"ashtiani","year":"2014","journal-title":"Soft Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EAIT.2012.6407975"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402997"},{"key":"ref14","article-title":"Robust and lightweight fault localization","author":"bo","year":"0","journal-title":"2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2664893"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977641"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431289"},{"key":"ref1","article-title":"Survey on wireless network security","volume":"29","author":"nazir","year":"2021","journal-title":"Archives of Computational Methods in Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref16","author":"winick","year":"0","journal-title":"Inet-3 0 Internet Topology Generator"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4240"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.08.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473091"},{"key":"ref9","article-title":"The eigen-trust algorithm for reputation management in p2p networks","author":"kamvar","year":"0","journal-title":"Proc WWW2003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521336"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE47735.2019.9037758"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3221271"},{"key":"ref5","author":"zhang","year":"2016","journal-title":"Coda Toward automatically identifying and scheduling coflows in the dark"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","location":"Rome, Italy","start":{"date-parts":[[2023,5,28]]},"end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10278691.pdf?arnumber=10278691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:04:30Z","timestamp":1699902270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10278691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10278691","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}