{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:05Z","timestamp":1740100445504,"version":"3.37.3"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647818","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Trust Quantification for Autonomous Medical Advisory Systems"],"prefix":"10.1109","author":[{"given":"Mini","family":"Thomas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reza","family":"Samavi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas E.","family":"Doyle","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1155\/2008\/481046"},{"key":"ref32","first-page":"1","article-title":"Sensors and in-home collection of health data: A privacy by design approach","author":"mihailidis","year":"2010","journal-title":"Information and Privacy Commissioners Report"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/W-FiCloud.2016.24"},{"key":"ref30","first-page":"73","article-title":"Unintended consequences of wearable sensor use in healthcare","author":"schukat","year":"2016","journal-title":"Yearbook of Medical Informatics"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/0169-2070(92)90028-8"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/978-0-387-71265-9_3"},{"key":"ref34","first-page":"841","article-title":"On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes","author":"ng","year":"2002","journal-title":"Advances in neural information processing systems"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TDSC.2015.2420552"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1186\/s13673-019-0183-8"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ACCESS.2019.2960467"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMST.2000.5340804"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1002\/9781119545293"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICCChina.2014.7008269"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-25867-1_22"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICITECH.2017.8079928"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1155\/2012\/546021"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.comnet.2014.11.008"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICIT.2013.6505900"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.2200\/S00861ED1V01Y201806AIM039"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.enbuild.2009.12.008"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.artmed.2018.05.005"},{"year":"2009","author":"koller","journal-title":"Probabilistic Graphical Models Principles and Techniques","key":"ref6"},{"key":"ref29","first-page":"1","author":"lagerqvist","year":"2018","journal-title":"IoT Latency and Power consumption Measuring the performance impact of MQTT and CoAP"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-030-38360-2_6"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SURV.2011.042711.00083"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1102219.1102222"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TBME.2015.2422751"},{"key":"ref9","article-title":"A reputation and knowledge based trust service platform for trustworthy social internet of things","author":"truong","year":"2016","journal-title":"Innovations in clouds internet and networks (ICIN) France"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.7249\/RR2751"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1155\/2018\/5978636"},{"key":"ref22","first-page":"1274","article-title":"Privacy protection and intrusion avoidance for cloudlet-based medical data sharing","author":"chen","year":"2016","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref21","first-page":"1","article-title":"Can i trust the data i see? a physician&#x2019;s concern on medical data in iot health architectures","author":"jaigirdar","year":"2019","journal-title":"Proc of the Australasian Computer Science Week Multiconference"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/JIOT.2017.2736446"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.23919\/ITU-WT.2017.8246999"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.3390\/s19112484"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.seizure.2015.11.008"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647818.pdf?arnumber=9647818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647818\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647818","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}