{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:35Z","timestamp":1750220255386,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research & Development Program of China","award":["2020YFC2006204"],"award-info":[{"award-number":["2020YFC2006204"]}]},{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172042"],"award-info":[{"award-number":["62172042"]}],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494106.3528681","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:08:26Z","timestamp":1653365306000},"page":"107-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain-based Reputation Evaluation Using Game Theory in Social Networking"],"prefix":"10.1145","author":[{"given":"Wenjie","family":"Guo","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"given":"Zhixiong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Capital University of Physical Education And Sports, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Astraea: A Decentralized Blockchain Oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Adler J.","year":"2018","unstructured":"J. Adler , R. Berryhill , A. Veneris , Z. Poulos , N. Veira , and A. Kastania . 2018 . Astraea: A Decentralized Blockchain Oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) . 1145--1152. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00207 J. Adler, R. Berryhill, A. Veneris, Z. Poulos, N. Veira, and A. Kastania. 2018. Astraea: A Decentralized Blockchain Oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 1145--1152. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00207"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.045"},{"key":"e_1_3_2_2_3_1","volume-title":"AMS Subj.Class","volume":"90","author":"Batagelj V.","year":"1996","unstructured":"V. Batagelj . 1996 . Centrality in Social Networks . AMS Subj.Class , Vol. 90 (01 1996), 92--30. V. Batagelj. 1996. Centrality in Social Networks. AMS Subj.Class, Vol. 90 (01 1996), 92--30."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988579"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481.029"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2989392"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2893433"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948094"},{"key":"e_1_3_2_2_12_1","volume-title":"ACM Comput. Surv.","volume":"42","author":"Hoffman K.","year":"2009","unstructured":"K. Hoffman , D. Zage , and C. Nita-Rotaru . 2009. A Survey of Attack and Defense Techniques for Reputation Systems . ACM Comput. Surv. , Vol. 42 , 1, Article 1 ( Dec. 2009 ), 31 pages. https:\/\/doi.org\/10.1145\/1592451.1592452 K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A Survey of Attack and Defense Techniques for Reputation Systems. ACM Comput. Surv., Vol. 42, 1, Article 1 (Dec. 2009), 31 pages. https:\/\/doi.org\/10.1145\/1592451.1592452"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002711"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"A. J\u00f8sang R. Ismail and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision support systems Vol. 43 2 (2007) 618--644.  A. J\u00f8sang R. Ismail and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision support systems Vol. 43 2 (2007) 618--644.","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894944"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"D. E. Kouicem Y. Imine A. Bouabdallah and H. Lakhlef. 2020. A Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing (2020) 1--1. https:\/\/doi.org\/10.1109\/TDSC.2020.3003232  D. E. Kouicem Y. Imine A. Bouabdallah and H. Lakhlef. 2020. A Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing (2020) 1--1. https:\/\/doi.org\/10.1109\/TDSC.2020.3003232","DOI":"10.1109\/TDSC.2020.3003232"},{"volume-title":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC). IEEE, 1--8.","author":"Liu P.","key":"e_1_3_2_2_18_1","unstructured":"P. Liu and W. Zhang . 2018. A New Game Theoretic Scheme for Verifiable Cloud Computing . In 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC). IEEE, 1--8. P. Liu and W. Zhang. 2018. A New Game Theoretic Scheme for Verifiable Cloud Computing. In 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC). IEEE, 1--8."},{"key":"e_1_3_2_2_19_1","unstructured":"Z. Liu N. Luong W. Wang D. Niyato P. Wang Y. Liang and D. Kim. 2019. A survey on applications of game theory in blockchain. arXiv preprint arXiv:1902.10865 (2019).  Z. Liu N. Luong W. Wang D. Niyato P. Wang Y. Liang and D. Kim. 2019. A survey on applications of game theory in blockchain. arXiv preprint arXiv:1902.10865 (2019)."},{"volume-title":"Science and Information Conference. Springer, 1118--1134","author":"Nojoumian M.","key":"e_1_3_2_2_20_1","unstructured":"M. Nojoumian , A. Golchubian , L. Njilla , K. Kwiat , and C. Kamhoua . 2018. Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm . In Science and Information Conference. Springer, 1118--1134 . M. Nojoumian, A. Golchubian, L. Njilla, K. Kwiat, and C. Kamhoua. 2018. Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In Science and Information Conference. Springer, 1118--1134."},{"key":"e_1_3_2_2_21_1","unstructured":"J. Peterson J. Krug M. Zoltu A. Williams and S. Alexander. 2019. Augur: a Decentralized Oracle and Prediction Market Platform (v2. 0). Whitepaper https:\/\/augur. net\/whitepaper. pdf (2019).  J. Peterson J. Krug M. Zoltu A. Williams and S. Alexander. 2019. Augur: a Decentralized Oracle and Prediction Market Platform (v2. 0). Whitepaper https:\/\/augur. net\/whitepaper. pdf (2019)."},{"key":"e_1_3_2_2_22_1","volume-title":"2018 International Conference on Computing, Networking and Communications (ICNC). 425--431","author":"Rawat D. B.","year":"2018","unstructured":"D. B. Rawat , L. Njilla , K. Kwiat , and C. Kamhoua . 2018. iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity . In 2018 International Conference on Computing, Networking and Communications (ICNC). 425--431 . https:\/\/doi.org\/10.1109\/ICCNC. 2018 .8390264 D. B. Rawat, L. Njilla, K. Kwiat, and C. Kamhoua. 2018. iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. In 2018 International Conference on Computing, Networking and Communications (ICNC). 425--431. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390264"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/002200277101500111"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2840488"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494106.3528681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494106.3528681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494106.3528681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":25,"alternative-id":["10.1145\/3494106.3528681","10.1145\/3494106"],"URL":"https:\/\/doi.org\/10.1145\/3494106.3528681","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}