{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807728,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61100007, 61100081","613111015"],"award-info":[{"award-number":["61100007, 61100081","613111015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007431","name":"Neurosciences Research Foundation","doi-asserted-by":"publisher","award":["613111015"],"award-info":[{"award-number":["613111015"]}],"id":[{"id":"10.13039\/100007431","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NIPA-2013-(H0301-13-2001)"],"award-info":[{"award-number":["NIPA-2013-(H0301-13-2001)"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003665","name":"National IT Industry Promotion Agency","doi-asserted-by":"publisher","award":["NIPA-2013-(H0301-13-2001)"],"award-info":[{"award-number":["NIPA-2013-(H0301-13-2001)"]}],"id":[{"id":"10.13039\/501100003665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558086","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Extract reputable users for trust-aware applications"],"prefix":"10.1145","author":[{"given":"Weiwei","family":"Yuan","sequence":"first","affiliation":[{"name":"Harbin Engineering University, Harbin City, Heilongjang Province, China"}]},{"given":"Donghai","family":"Guan","sequence":"additional","affiliation":[{"name":"Harbin Engineering University, Harbin City, Heilongjang Province, China"}]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Kyung Hee University, Seocheon-dong, Giheung-gu, Yongin-si, Gyeonggi-do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"volume-title":"Trust Management VI (pp. 253--262)","author":"J\u00f8sang A.","unstructured":"J\u00f8sang , A. 2012. Robustness of Trust and Reputation Systems: Does It Matter? . In Trust Management VI (pp. 253--262) . Springer Berlin Heidelberg . J\u00f8sang, A. 2012. Robustness of Trust and Reputation Systems: Does It Matter?. In Trust Management VI (pp. 253--262). Springer Berlin Heidelberg.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/s10489-010-0230-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/HICSS.2013.226"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1002\/spe.1052"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"528","article-title":"Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships","volume":"8","author":"Chaisamran N.","year":"2013","unstructured":"Chaisamran , N. , Okuda , T. , and Yamaguchi , S. 2013 . Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships . Information and Media Technologies , 8 ( 2 ), 528 -- 537 . Chaisamran, N., Okuda, T., and Yamaguchi, S. 2013. Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. Information and Media Technologies, 8(2), 528--537.","journal-title":"Information and Media Technologies"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2448556.2448580"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"691","article-title":"Enhancing the trust of internet routing with lightweight route attestation. Information Forensics and Security","volume":"7","author":"Li Q.","year":"2012","unstructured":"Li , Q. , Xu , M. , Wu , J. , Zhang , X. , Lee , P. P. , and Xu , K. 2012 . Enhancing the trust of internet routing with lightweight route attestation. Information Forensics and Security , IEEE Transactions on , 7 ( 2 ), 691 -- 703 . Li, Q., Xu, M., Wu, J., Zhang, X., Lee, P. P., and Xu, K. 2012. Enhancing the trust of internet routing with lightweight route attestation. Information Forensics and Security, IEEE Transactions on, 7(2), 691--703.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_8_1","first-page":"201","volume-title":"Global Communications Conference (GLOBECOM)","author":"Gazdar T.","year":"2012","unstructured":"Gazdar , T. , Rachedi , A. , Benslimane , A. , and Belghith , A . 2012. A distributed advanced analytical trust model for VANETs . In Global Communications Conference (GLOBECOM) , 2012 IEEE (pp. 201 -- 206 ). Gazdar, T., Rachedi, A., Benslimane, A., and Belghith, A. 2012. A distributed advanced analytical trust model for VANETs. In Global Communications Conference (GLOBECOM), 2012 IEEE (pp. 201--206)."},{"volume-title":"Security and Trust (PST), 2013 Eleventh Annual International Conference on (pp. 317--324)","author":"Kurdjokova E.","unstructured":"Kurdjokova , E. , Wibner , M. , Hammer , S. , and Andre , E . 2013. Trust-based decision-making for the adaptation of public displays in changing social contexts. In Privacy , Security and Trust (PST), 2013 Eleventh Annual International Conference on (pp. 317--324) . Kurdjokova, E., Wibner, M., Hammer, S., and Andre, E. 2013. Trust-based decision-making for the adaptation of public displays in changing social contexts. In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on (pp. 317--324).","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.knosys.2009.12.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TrustCom.2012.143"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1049\/iet-com.2009.0733"},{"doi-asserted-by":"crossref","unstructured":"Bhuiyan T. Josang A. and Xu Y. 2010. Trust and reputation management in web-based social network. Web Intelligence and Intelligent Agents 207--232.  Bhuiyan T. Josang A. and Xu Y. 2010. Trust and reputation management in web-based social network. Web Intelligence and Intelligent Agents 207--232.","key":"e_1_3_2_1_13_1","DOI":"10.5772\/8375"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.dss.2005.05.019"},{"doi-asserted-by":"crossref","unstructured":"Hu H. Ahn G. and Jorgensen J. 2012. Multiparty access control for online social networks: model and mechanisms.  Hu H. Ahn G. and Jorgensen J. 2012. Multiparty access control for online social networks: model and mechanisms.","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TKDE.2012.97"},{"volume-title":"2012 Second International Conference on (pp. 208--213)","author":"Ahmed A.","unstructured":"Ahmed , A. , and Alnajem , A . 2012. Trust-aware access control: How recent is your transaction history?. In Digital Information and Communication Technology and it's Applications (DICTAP) , 2012 Second International Conference on (pp. 208--213) . Ahmed, A., and Alnajem, A. 2012. Trust-aware access control: How recent is your transaction history?. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 208--213).","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.4304\/jnw.6.7.950-957"},{"unstructured":"http:\/\/www.trustlet.org\/wiki\/Epinions_datasets  http:\/\/www.trustlet.org\/wiki\/Epinions_datasets","key":"e_1_3_2_1_18_1"},{"unstructured":"http:\/\/snap.stanford.edu\/data\/  http:\/\/snap.stanford.edu\/data\/","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"crossref","unstructured":"Ghoshal G. and Barab\u00e1si A. L. 2011. Ranking stability and super-stable nodes in complex networks. Nature communications 2 394  Ghoshal G. and Barab\u00e1si A. L. 2011. Ranking stability and super-stable nodes in complex networks. Nature communications 2 394","key":"e_1_3_2_1_20_1","DOI":"10.1038\/ncomms1396"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"acronym":"ICUIMC '14","name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","location":"Siem Reap Cambodia"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":20,"alternative-id":["10.1145\/2557977.2558086","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558086","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}