{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:47:10Z","timestamp":1776181630101,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Science and Technology Program of Inner Mongolia Autonomous Region","award":["2020GG0188"],"award-info":[{"award-number":["2020GG0188"]}]},{"DOI":"10.13039\/501100001809","name":"Huhhot Science and Technology Plan","doi-asserted-by":"publisher","award":["2021-KJXM-TZJW-04"],"award-info":[{"award-number":["2021-KJXM-TZJW-04"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,15]]},"DOI":"10.1109\/jiot.2024.3382010","type":"journal-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T19:31:42Z","timestamp":1711567902000},"page":"22643-22655","source":"Crossref","is-referenced-by-count":2,"title":["A Trustworthiness Sequence Prediction Scheme Based on Neural Networks and Mathematical Calculations"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3901-8972","authenticated-orcid":false,"given":"Xuefei","family":"Li","sequence":"first","affiliation":[{"name":"School of Computing, Inner Mongolia University, Hohhot, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2749-2135","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6660-5633","authenticated-orcid":false,"given":"Ru","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, Inner Mongolia University, Hohhot, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3139989"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.10.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3213699"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3039296"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.042711.00083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.092110.00088"},{"issue":"5","key":"ref7","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/THMS.2022.3144956","article-title":"A review on human\u2013machine trust evaluation: Human-centric and machine-centric perspectives","volume":"52","author":"Gebru","year":"2022","journal-title":"IEEE Trans. Human-Mach. Syst."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"106743","DOI":"10.1109\/ACCESS.2021.3100767","article-title":"On the trust and trust modeling for the future fully-connected digital world: A comprehensive study","volume":"9","author":"Ting","year":"2021","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3297453"},{"issue":"6","key":"ref10","doi-asserted-by":"crossref","first-page":"9326","DOI":"10.1109\/JIOT.2019.2933518","article-title":"A comprehensive study on the trust management techniques in the Internet of Things","volume":"6","author":"Pourghebleh","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"ref11","doi-asserted-by":"crossref","first-page":"3157","DOI":"10.1109\/JIOT.2020.3044296","article-title":"AIT: An AI-enabled trust management system for vehicular networks using blockchain technology","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"21","key":"ref12","doi-asserted-by":"crossref","first-page":"15672","DOI":"10.1109\/JIOT.2020.3029221","article-title":"NeuroTrust\u2014Artificial-neural-network-based intelligent trust management mechanism for large-scale Internet of Medical Things","volume":"8","author":"Awan","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"ref13","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1109\/JIOT.2018.2822677","article-title":"Trust quantification for networked cyber-physical systems","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"Sun","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref15","first-page":"1","article-title":"Subjective logic based trust model for mobile ad hoc networks","volume-title":"Proc. 4th Int. Conf. Security Privacy Commun. Netw.","author":"Balakrishnan"},{"issue":"1","key":"ref16","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/JSAC.2019.2952035","article-title":"A cross-layer trust evaluation protocol for secured routing in communication network of smart grid","volume":"38","author":"Velusamy","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"ref17","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","article-title":"Trustworthiness management in the social Internet of Things","volume":"26","author":"Nitti","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref18","first-page":"838","article-title":"Trustworthiness inference framework in the social Internet of Things: A context-aware approach","volume-title":"Proc. IEEE Conf. Comput. Commun.","author":"Xia"},{"issue":"1","key":"ref19","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TITS.2020.3013279","article-title":"A decentralized trust management system for intelligent transportation environments","volume":"23","author":"Chen","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"8","key":"ref20","doi-asserted-by":"crossref","first-page":"9031","DOI":"10.1109\/TVT.2020.2999566","article-title":"A dynamic trust evaluation and update mechanism based on C4.5 decision tree in underwater wireless sensor networks","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"ref21","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1109\/JIOT.2022.3215635","article-title":"Controversy adjudication-based trust management mechanism in the Internet of Underwater Things","volume":"10","author":"Jiang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3667","DOI":"10.1109\/TIFS.2020.2997179","article-title":"Trust management in Industrial Internet of Things","volume":"15","author":"Boudagdigue","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"3","key":"ref23","doi-asserted-by":"crossref","first-page":"3297","DOI":"10.1109\/TNSM.2020.3046906","article-title":"Trust-related attacks and their detection: A Trust management model for the social IoT","volume":"18","author":"Marche","year":"2021","journal-title":"IEEE Trans. Netw. Service Manag."},{"issue":"4","key":"ref24","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/JIOT.2021.3081422","article-title":"LightTrust: Lightweight trust management for edge devices in Industrial Internet of Things","volume":"10","author":"Ud Din","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"14","key":"ref25","doi-asserted-by":"crossref","first-page":"12044","DOI":"10.1109\/JIOT.2021.3124073","article-title":"Blockchain-enabled trust management model for the Internet of Vehicles","volume":"10","author":"Yang","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"ref26","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/JBHI.2021.3107339","article-title":"A secure and decentralized trust management scheme for smart health systems","volume":"26","author":"Ebrahimi","year":"2022","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"16","key":"ref27","doi-asserted-by":"crossref","first-page":"14779","DOI":"10.1109\/JIOT.2021.3063710","article-title":"A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic","volume":"9","author":"Chowdhury","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"ref28","doi-asserted-by":"crossref","first-page":"5943","DOI":"10.1109\/JIOT.2021.3060751","article-title":"PPTM: A privacy-preserving trust management scheme for emergency message dissemination in space\u2013air\u2013ground-integrated vehicular networks","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"ref29","doi-asserted-by":"crossref","first-page":"2987","DOI":"10.1109\/TNSM.2022.3179875","article-title":"A trust and reputation system for IoT service interactions","volume":"19","author":"Battah","year":"2022","journal-title":"IEEE Trans. Netw. Service Manag."},{"issue":"2","key":"ref30","first-page":"2074","article-title":"Heterogeneous blockchain and AI-driven hierarchical trust evaluation for 5G-enabled intelligent transportation systems","volume":"24","author":"Wang","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.003.2100672"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3082272"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3179428"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2018.2839623"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3059261"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2951620"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2920987"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2019.8885994"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874095"},{"issue":"15","key":"ref40","doi-asserted-by":"crossref","first-page":"12997","DOI":"10.1109\/JIOT.2021.3125091","article-title":"Dynamic access control and trust management for blockchain-empowered IoT","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"ref41","doi-asserted-by":"crossref","first-page":"4000","DOI":"10.1109\/JIOT.2019.2960526","article-title":"Blockchain-enabled decentralized trust management and secure usage control of IoT big data","volume":"7","author":"Zhaofeng","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref42","first-page":"1","article-title":"A survey on conventional encryption algorithms of cryptography","volume-title":"Proc. Int. Conf. ICT Bus. Ind. Govern. (ICTBIG)","author":"Yegireddi"},{"issue":"1","key":"ref43","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TKDE.2020.2981314","article-title":"A survey on deep learning for named entity recognition","volume":"34","author":"Li","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"ref44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2827872","article-title":"The MovieLens Datasets: History and context","volume":"5","author":"Harper","year":"2015","journal-title":"ACM Trans. Interact. Intell. Syst."},{"issue":"7","key":"ref45","doi-asserted-by":"crossref","first-page":"5332","DOI":"10.1109\/JIOT.2020.3040281","article-title":"Neural architecture search for robust networks in 6G-enabled massive IoT domain","volume":"8","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"ref46","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2013.6525602","article-title":"Enabling smart cities through a cognitive management framework for the Internet of Things","volume":"51","author":"Vlacheas","year":"2013","journal-title":"IEEE Commun. Mag."},{"issue":"22","key":"ref47","doi-asserted-by":"crossref","first-page":"22608","DOI":"10.1109\/JIOT.2022.3184632","article-title":"Trust management with fault-tolerant supervised routing for smart cities using Internet of Things","volume":"9","author":"Haseeb","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref48","first-page":"213","article-title":"Can we trust trust?","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Gambetta","year":"2000"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"issue":"4","key":"ref50","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","article-title":"Certificate chain discovery in SPKI\/SDSI","volume":"9","author":"Clarke","year":"2001","journal-title":"J. Comput. Security"},{"issue":"22","key":"ref51","first-page":"22327","article-title":"BTS: A blockchain-based trust system to deter malicious data reporting in intelligent Internet of Things","volume-title":"IEEE Internet Things J.","volume":"9","author":"Li","year":"2022"},{"issue":"4","key":"ref52","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1109\/SURV.2011.072210.00026","article-title":"Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges","volume":"13","author":"Djahel","year":"2011","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"5","key":"ref53","doi-asserted-by":"crossref","first-page":"4028","DOI":"10.1109\/JIOT.2019.2957520","article-title":"TCEMD: A trust cascading-based emergency message dissemination model in VANETs","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"ref54","doi-asserted-by":"crossref","first-page":"3548","DOI":"10.1109\/JSAC.2023.3310094","article-title":"TFL-DT: A trust evaluation scheme for federated learning in digital twin for mobile networks","volume":"41","author":"Guo","year":"2023","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10551641\/10479489.pdf?arnumber=10479489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:03:46Z","timestamp":1738004626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":54,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3382010","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,15]]}}}