{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:37Z","timestamp":1755993757639,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T00:00:00Z","timestamp":1721779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Research and Development Task Special Project of the Xinjiang Uygur Autonomous Region","award":["2022B01009"],"award-info":[{"award-number":["2022B01009"]}]},{"name":"Shanghai Natural Science Foundation","award":["21ZR1461700"],"award-info":[{"award-number":["21ZR1461700"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071450"],"award-info":[{"award-number":["62071450"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,24]]},"DOI":"10.1145\/3688574.3688583","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:21:55Z","timestamp":1726230115000},"page":"60-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy-based Trust in Distributed Networks: A State-of-the-art Review"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5274-0602","authenticated-orcid":false,"given":"Dongsheng","family":"Jia","sequence":"first","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-2892","authenticated-orcid":false,"given":"Weidong","family":"Fang","sequence":"additional","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China, \rUniversity of Chinese Academy of Sciences, China and \rShanghai Research and Development Center for Micro-Nano Electronics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5084-3351","authenticated-orcid":false,"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China, \rUniversity of Chinese Academy of Sciences, China and \rShanghai Research and Development Center for Micro-Nano Electronics, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2009.V1.1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC55385.2023.10118634"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.115.2200014"},{"key":"e_1_3_2_1_4_1","first-page":"95","article-title":"Comparison of Three Wireless Distributed Networks","volume":"2","author":"Li Ming","year":"2007","unstructured":"Ming Li and Yueyang Liu. 2007. Comparison of Three Wireless Distributed Networks. Telecommunication Science 2 (2007), 95\u201398.","journal-title":"Telecommunication Science"},{"volume-title":"Trust Management in P2P Network","author":"Gao Ying","key":"e_1_3_2_1_5_1","unstructured":"Ying Gao. 2013. Trust Management in P2P Network. Tsinghua University Press. Beijing, China."},{"key":"e_1_3_2_1_6_1","first-page":"91","article-title":"Wireless Distributed Network Analysis and Military Applications","volume":"33","author":"Feng Yu","year":"2012","unstructured":"Yu Feng and Bin He. 2012. Wireless Distributed Network Analysis and Military Applications. Sichuan Armaments Engineering Journal 33, 4 (2012), 91\u201393.","journal-title":"Sichuan Armaments Engineering Journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2643546"},{"key":"e_1_3_2_1_8_1","first-page":"209","volume-title":"FOSAD 2006\/2007 Tutorial Lectures","author":"Josang Audun","year":"2006","unstructured":"Audun Josang. 2006. Trust and reputation systems. in Foundations of Security Analysis and Design IV, FOSAD 2006\/2007 Tutorial Lectures. Heidelberg, Berlin, Germany, 209-245."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3019286"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06357-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3070630"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS110303056C"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106789"},{"volume-title":"Trust Management System in Network","author":"Zhang Wenzheng","key":"e_1_3_2_1_14_1","unstructured":"Wenzheng Zhang, Xiuhua Geng, Yu Zhou, Dianhua Tang, Junli Zhang, and Daoguang Mu. 2018. Trust Management System in Network. National Defense Industry Press. Beijing, China."},{"volume-title":"Murray Hill. Decentralized Trust Management. in Proceedings 1996 IEEE symposium on security and privacy","author":"Blaze Matt","key":"e_1_3_2_1_15_1","unstructured":"Matt Blaze, Joan Feigenbaum, Jack Lacy, T Research, and Murray Hill. Decentralized Trust Management. in Proceedings 1996 IEEE symposium on security and privacy, Oakland, USA,164-173."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.597"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102409"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-01933-0"},{"key":"e_1_3_2_1_19_1","first-page":"99","article-title":"A Review of Trust Modeling in Uncertainty Theory","volume":"38","author":"Xu Jun","year":"2017","unstructured":"Jun Xu. 2017. A Review of Trust Modeling in Uncertainty Theory. Minicomputer Systems 38, 1 (2017), 99\u2013106.","journal-title":"Minicomputer Systems"},{"volume-title":"Wireless Sensor Networks","author":"Feng Tao","key":"e_1_3_2_1_20_1","unstructured":"Tao Feng and Xian Guo. 2017. Wireless Sensor Networks. Xidian University Press. Xi'an, China."},{"key":"e_1_3_2_1_21_1","volume-title":"Fuzzy method and its application","author":"Xie Jijian","unstructured":"Jijian Xie and Chengping Liu. 2006. Fuzzy method and its application (3rd ed.). Huazhong University of Science and Technology Press. Wuhan, China.","edition":"3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"volume-title":"Research on Trust Evaluation Mechanism Based on Improved D-S Evidence Theory. Master Thesis","author":"Jingwen Li.","key":"e_1_3_2_1_23_1","unstructured":"Jingwen Li. 2014. Research on Trust Evaluation Mechanism Based on Improved D-S Evidence Theory. Master Thesis, Nanjing University of Posts and Telecommunications."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.5408575"},{"key":"e_1_3_2_1_25_1","unstructured":"Yizhou Li. Risk Management for Maritime Transportation under Incomplete Information Conditions. PhD Thesis School of Shipbuilding and Ocean Engineering Shanghai Jiaotong University."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2968833"},{"volume-title":"Research on Trust Evaluation Mechanism Based on Improved D-S Evidence Theory. Master Thesis","author":"Jingwen Li.","key":"e_1_3_2_1_27_1","unstructured":"Jingwen Li. 2014. Research on Trust Evaluation Mechanism Based on Improved D-S Evidence Theory. Master Thesis, Nanjing University of Posts and Telecommunications."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3306452"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.071"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1516-1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-152526"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733225"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)00280-K"},{"volume-title":"Trust Management and Network Security","author":"Jiang Wenbao","key":"e_1_3_2_1_34_1","unstructured":"Wenbao Jiang. 2012. Trust Management and Network Security. Tsinghua University Press. Beijing, China."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101388"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-020-00530-9"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07092-w"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3666-1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","unstructured":"Mukesh Kumar Garg Neeta Singh and Poonam Verma. 2018. Fuzzy rule-based approach for design and analysis of a Trust-based Secure Routing Protocol for MANETs. Procedia Computer Science 132 (2018) 653\u2013658. https:\/\/doi.org\/10.1016\/j.procs.2018.05.064","DOI":"10.1016\/j.procs.2018.05.064"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT55038.2022.9847823"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-016-0146-4"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893262"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0685-7"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ45933.2021.9494428"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2740219"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2952035"},{"key":"e_1_3_2_1_47_1","volume-title":"China Intelligent Automation Conference, 22\u201331","author":"Chen Wei","year":"2003","unstructured":"Wei Chen and Zengqi Sun. 2003. A Review of Type-2 Fuzzy Systems. in China Intelligent Automation Conference, 22\u201331. Hongkong, China."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3070689"},{"key":"e_1_3_2_1_49_1","volume-title":"Research on Subject Trust Evaluation Based on Fuzzy Theory. Advanced engineering forum.(September","author":"Liao Xinfei","year":"2011","unstructured":"Xinfei Liao. Research on Subject Trust Evaluation Based on Fuzzy Theory. Advanced engineering forum.(September 2011), 52-56. https:\/\/doi.org\/\/10.4028\/www.scientific.net\/AEF.1.52."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2798"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3790"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT57182.2022.9994119"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCSS57650.2023.10169657"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5683-8"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2007.357192"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.103269"},{"volume-title":"Fuzzy Cluster Analysis and Its Application","author":"Li Xianggao","key":"e_1_3_2_1_57_1","unstructured":"Xianggao Li and Hongxing li. 1994. Fuzzy Cluster Analysis and Its Application. Guizhou Science and Technology Press. Guizhou, China."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5358-5"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108807"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144679"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3133882"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968102"},{"key":"e_1_3_2_1_63_1","first-page":"114","article-title":"Indirect Recommendation Trust Transitivity Study based on Fuzzy Theory","author":"Long Hongyi","year":"2009","unstructured":"Hongyi Long and Dan Pan.2009. Indirect Recommendation Trust Transitivity Study based on Fuzzy Theory. Journal of Wuhan University of Technology, 114-117.","journal-title":"Journal of Wuhan University of Technology"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9759077.2022.2"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR56254.2022.9996058"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00766-8"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08098-9"}],"event":{"name":"BDE 2024: 2024 6th International Conference on Big Data Engineering","acronym":"BDE 2024","location":"Xining China"},"container-title":["Proceedings of the 2024 6th International Conference on Big Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688574.3688583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:14:21Z","timestamp":1755915261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,24]]},"references-count":67,"alternative-id":["10.1145\/3688574.3688583","10.1145\/3688574"],"URL":"https:\/\/doi.org\/10.1145\/3688574.3688583","relation":{},"subject":[],"published":{"date-parts":[[2024,7,24]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}