{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:48:19Z","timestamp":1769712499920,"version":"3.49.0"},"reference-count":70,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,11,4]]},"abstract":"<jats:p>The rapid development of global information technology, especially the emergence and widespread application of the Internet, has enabled information technology to quickly penetrate into various fields of the economy and society. Informatization and networking have become important features of today\u2019s era. However, while people enjoy the tremendous progress brought by information technology to humanity, the openness and security vulnerabilities of computer networks have also made network information security issues increasingly prominent. The invasion of hackers, the continuous generation and spread of computer virus, and the rampant use of rogue software have all caused great economic losses to individuals, enterprises, and countries. The computer network security evaluation is a multiple-attribute group decision making (MAGDM). Then, the TODIM and TOPSIS method has been established to deal with MAGDM issues. The interval neutrosophic sets (INSs) are established as an effective tool for representing uncertain information during the computer network security evaluation. In this manuscript, the interval neutrosophic number TODIM-TOPSIS (INN-TODIM-TOPSIS) method is established to solve the MAGDM under INSs. Finally, a numerical example study for computer network security evaluation is established to validate the INN-TODIM-TOPSIS method. The main research contribution of this paper is established: (1) the INN-TODIM-TOPSIS method is put up for MAGDM with INSs; (2) the INN-TODIM-TOPSIS method is put up for computer network security evaluation and were compared with existing methods; (3) Through the detailed comparison, it is evident that INN-TODIM-TOPSIS method for computer network security evaluation proposed in this paper are effective.<\/jats:p>","DOI":"10.3233\/jifs-233181","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T11:23:21Z","timestamp":1693567401000},"page":"8945-8957","source":"Crossref","is-referenced-by-count":2,"title":["A generalized integrated group decision-making framework for computer network security evaluation with Interval Neutrosophic information"],"prefix":"10.1177","volume":"45","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[{"name":"Shanxi Institute of Science and Technology, Jincheng, Shanxi, China"}]},{"given":"Ze","family":"Su","sequence":"additional","affiliation":[{"name":"Shanxi Institute of Science and Technology, Jincheng, Shanxi, China"}]},{"given":"Xiangqian","family":"Xu","sequence":"additional","affiliation":[{"name":"Shanxi Institute of Science and Technology, Jincheng, Shanxi, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-233181_ref1","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JIFS-179457","article-title":"Approach for group decision making based on linguistic truth-valued intuitionistic fuzzy lattice","volume":"38","author":"Diao","year":"2020","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref2","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1016\/j.ins.2019.10.013","article-title":"Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators","volume":"512","author":"Liu","year":"2020","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-233181_ref3","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1007\/s40747-020-00256-y","article-title":"Multi-attribute group decision-making process based on possibility degree and operators for intuitionistic multiplicative set","volume":"7","author":"Garg","year":"2021","journal-title":"Complex & Intelligent Systems"},{"key":"10.3233\/JIFS-233181_ref6","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.3233\/JIFS-231672","article-title":"Study on fuzzy comprehensive competitiveness evaluation of urban exhibition industry with hesitant fuzzy information","volume":"45","author":"Li","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref7","doi-asserted-by":"crossref","first-page":"135","DOI":"10.15388\/Informatica.2019.201","article-title":"A Bipolar Fuzzy Extension of the MULTIMOORA Method","volume":"30","author":"Stanujkic","year":"2019","journal-title":"Informatica"},{"key":"10.3233\/JIFS-233181_ref8","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/1331677X.2018.1543054","article-title":"An extended COPRAS model for multi-criteria decision-making problems and its application in web-based hotel evaluation and selection","volume":"32","author":"Roy","year":"2019","journal-title":"Economic Research-Ekonomska Istrazivanja"},{"key":"10.3233\/JIFS-233181_ref9","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1109\/TCYB.2016.2634599","article-title":"Group Decision Making Based on Heronian Aggregation Operators of Intuitionistic Fuzzy Numbers","volume":"47","author":"Liu","year":"2017","journal-title":"Ieee Transactions on Cybernetics"},{"key":"10.3233\/JIFS-233181_ref10","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1109\/TFUZZ.2018.2880705","article-title":"A compromise-typed variable weight decision method for hybrid multiattribute decision making","volume":"27","author":"Yu","year":"2019","journal-title":"Ieee Transactions on Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1049\/cit2.12016","article-title":"CHFS: Complex hesitant fuzzy sets-their applications to decision making with different and innovative distance measures","volume":"6","author":"Garg","year":"2021","journal-title":"CAAI T Intell Technol"},{"key":"10.3233\/JIFS-233181_ref13","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s12559-020-09809-2","article-title":"Novel Similarity Measure Based on the Transformed Right-Angled Triangles Between Intuitionistic Fuzzy Sets and its Applications","volume":"13","author":"Garg","year":"2021","journal-title":"Cognitive Computation"},{"key":"10.3233\/JIFS-233181_ref14","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.3934\/jimo.2020069","article-title":"MULTI-CRITERIA DECISION MAKING METHOD BASED ONBONFERRONI MEAN AGGREGATION OPERATORS OF COMPLEX INTUITIONISTICFUZZY NUMBERS","volume":"17","author":"Garg","year":"2021","journal-title":"Journal of Industrial and Management Optimization"},{"key":"10.3233\/JIFS-233181_ref15","doi-asserted-by":"crossref","first-page":"1800","DOI":"10.1002\/int.22361","article-title":"Complex intuitionistic fuzzy preference relations and their applications in individual and group decision-making problems","volume":"36","author":"Rani","year":"2021","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-233181_ref16","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2991\/ijcis.d.201215.002","article-title":"Algorithm for Multiple Attribute Decision-Making with Interactive Archimedean Norm Operations Under Pythagorean Fuzzy Uncertainty","volume":"14","author":"Wang","year":"2021","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"10.3233\/JIFS-233181_ref17","doi-asserted-by":"crossref","unstructured":"Salman S. , Muhammad K. , Khan A. and Glass H.J. , A Block Aggregation Method for Short-Term Planning of Open Pit Mining with Multiple Processing Destinations, Minerals 11 (2021).","DOI":"10.3390\/min11030288"},{"key":"10.3233\/JIFS-233181_ref18","doi-asserted-by":"crossref","unstructured":"Walker C.M. , Whigham D.F. , Bentz I.S. , Argueta J.M. , King R.S. , Rains M.C. , Simenstad C.A. , Guo C. , Baird S.J. and Field C.J. , Linking landscape attributes to salmon and decision-making in the southern Kenai Lowlands, Alaska, USA, Ecology and Society 26 (2021).","DOI":"10.5751\/ES-11798-260101"},{"key":"10.3233\/JIFS-233181_ref19","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1504\/IJSTL.2021.112918","article-title":"Green port performance evaluation under uncertainty: a multiple attribute group decision analysis","volume":"13","author":"Zhao","year":"2021","journal-title":"International Journal of Shipping and Transport Logistics"},{"key":"10.3233\/JIFS-233181_ref20","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/s40314-022-01785-7","article-title":"Spherical fuzzy Dombi power Heronian mean aggregation operators for multiple attribute group decision-making","volume":"41","author":"Zhang","year":"2022","journal-title":"Computational & Applied Mathematics"},{"key":"10.3233\/JIFS-233181_ref21","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.eswa.2022.119114","article-title":"An extended Exp-TODIM method for multiple attribute decision making based on the Z-Wasserstein distance","volume":"214","author":"Sun","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-233181_ref22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s40314-022-02183-9","article-title":"Location selection of electric vehicles charging stations by using the spherical fuzzy CPT-CoCoSo and D-CRITIC method","volume":"42","author":"Zhang","year":"2023","journal-title":"Computational & Applied Mathematics"},{"key":"10.3233\/JIFS-233181_ref23","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.asoc.2015.12.020","article-title":"Pythagorean fuzzy TODIM approach to multi-criteria decision making","volume":"42","author":"Ren","year":"2016","journal-title":"Applied Soft Computing"},{"key":"10.3233\/JIFS-233181_ref24","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","article-title":"Prospect Theory: An Analysis of Decision under Risk","volume":"47","author":"Tversky","year":"1979","journal-title":"Econometrica"},{"key":"10.3233\/JIFS-233181_ref25","first-page":"113","article-title":"TODIM: basics and application to multicriteria ranking of projects with environmental impacts","volume":"16","author":"Gomes","year":"1979","journal-title":"Foundations of Computing and Decision Sciences"},{"key":"10.3233\/JIFS-233181_ref26","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1080\/18756891.2015.1046329","article-title":"A hesitant fuzzy linguistic TODIM method based on a score function","volume":"8","author":"Wei","year":"2015","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"10.3233\/JIFS-233181_ref27","doi-asserted-by":"crossref","first-page":"555","DOI":"10.15388\/Informatica.2018.181","article-title":"TODIM Method for Picture Fuzzy Multiple Attribute Decision Making","volume":"29","author":"Wei","year":"2018","journal-title":"Informatica"},{"key":"10.3233\/JIFS-233181_ref28","doi-asserted-by":"crossref","first-page":"3291","DOI":"10.1007\/s13369-018-3069-6","article-title":"Biparametric Information Measures-Based TODIM Technique for Interval-Valued Intuitionistic Fuzzy Environment","volume":"43","author":"Mishra","year":"2018","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10.3233\/JIFS-233181_ref29","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/0377-2217(94)90282-8","article-title":"TOPSIS for MODM","volume":"76","author":"Lai","year":"1994","journal-title":"European Journal of Operational Research"},{"key":"10.3233\/JIFS-233181_ref30","first-page":"18","article-title":"Conceptual Design Evaluation Considering Confidence Based on Z-AHP-TOPSIS Method","volume":"11","author":"Liu","year":"2021","journal-title":"Applied Sciences-Basel"},{"key":"10.3233\/JIFS-233181_ref31","doi-asserted-by":"crossref","first-page":"3697","DOI":"10.3233\/JIFS-211123","article-title":"q-Rung orthopair fuzzyTOPSIS method and the application to information service qualityevaluation in online health community","volume":"41","author":"Ye","year":"2021","journal-title":"Journal of Intelligent& Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref32","doi-asserted-by":"crossref","first-page":"2732","DOI":"10.3934\/math.2021167","article-title":"Extension of TOPSIS method under intuitionistic fuzzy hypersoft environment based on correlation coefficient and aggregation operators to solve decision making problem","volume":"6","author":"Zulqarnain","year":"2021","journal-title":"Aims Mathematics"},{"key":"10.3233\/JIFS-233181_ref33","doi-asserted-by":"crossref","first-page":"4414","DOI":"10.1016\/j.eswa.2014.01.015","article-title":"The Hellinger distance in Multicriteria Decision Making: An illustration to the TOPSIS and TODIM methods","volume":"41","author":"Lourenzutti","year":"2014","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-233181_ref34","doi-asserted-by":"crossref","first-page":"907","DOI":"10.32604\/cmes.2021.016720","article-title":"An Improved Method Based on TODIM and TOPSISfor Multi-Attribute Decision-Making with Multi-Valued NeutrosophicSets","volume":"129","author":"Xu","year":"2021","journal-title":"Cmes-Computer Modeling in Engineering & Sciences"},{"key":"10.3233\/JIFS-233181_ref35","doi-asserted-by":"crossref","first-page":"2437","DOI":"10.1007\/s00500-021-06469-8","article-title":"A Pythagorean cubic fuzzy methodology based on TOPSIS and TODIM methods and its application to software selection problem","volume":"26","author":"Seker","year":"2022","journal-title":"Soft Computing"},{"key":"10.3233\/JIFS-233181_ref36","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1631\/FITEE.1700434","article-title":"TODIM and TOPSIS with Z-numbers","volume":"20","author":"Krohling","year":"2019","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"10.3233\/JIFS-233181_ref37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2005.06.004","article-title":"Network and information security: A computational intelligence approach Special Issue of Journal of Network and Computer Applications","volume":"30","author":"Abraham","year":"2007","journal-title":"J Netw Comput Appl"},{"key":"10.3233\/JIFS-233181_ref38","first-page":"32","article-title":"Network security: it\u2019s not just about computers anymore","volume":"37","author":"Adams","year":"2000","journal-title":"Commun. News"},{"key":"10.3233\/JIFS-233181_ref40","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0360-8352(98)00092-8","article-title":"A neural network based computer access security system for multiple users","volume":"35","author":"Anagun","year":"1998","journal-title":"Comput Ind Eng"},{"key":"10.3233\/JIFS-233181_ref41","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","article-title":"A hybrid intrusion detection system design for computer network security","volume":"35","author":"Aydin","year":"2009","journal-title":"Comput Electr Eng"},{"key":"10.3233\/JIFS-233181_ref42","first-page":"8","article-title":"Application of Data Encryption Technology in Computer Network Information Security","volume":"2022","author":"Li","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-233181_ref43","first-page":"10","article-title":"The Application of Data Encryption Technology in Computer Network Communication Security","volume":"2022","author":"Liu","year":"2022","journal-title":"Mob Inf Syst"},{"key":"10.3233\/JIFS-233181_ref44","first-page":"10","article-title":"Computer Network Confidential Information Security Based on Big Data Clustering Algorithm","volume":"2022","author":"Liu","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"10.3233\/JIFS-233181_ref45","first-page":"13","article-title":"The Construction Method of Computer Network Security Defense System Based on Multisource Big Data","volume":"2022","author":"Ma","year":"2022","journal-title":"Sci Program"},{"key":"10.3233\/JIFS-233181_ref46","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1007\/BF03253319","article-title":"Invisible watchmen: Network administrators and computer security","volume":"62","author":"Chateauraynaud","year":"2007","journal-title":"Ann Telecommun"},{"key":"10.3233\/JIFS-233181_ref47","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/s41284-020-00230-w","article-title":"Automated monitoring for security camera networks: promise from computer vision labs","volume":"34","author":"Chen","year":"2021","journal-title":"Secur J"},{"key":"10.3233\/JIFS-233181_ref48","doi-asserted-by":"crossref","first-page":"7871","DOI":"10.1007\/s00500-022-06813-6","article-title":"Computer application under the management of network information security technology using genetic algorithm","volume":"26","author":"Qiang","year":"2022","journal-title":"Soft Comput"},{"key":"10.3233\/JIFS-233181_ref49","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.future.2021.09.018","article-title":"AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis","volume":"127","author":"Shandilya","year":"2022","journal-title":"Futur Gener Comp Syst"},{"key":"10.3233\/JIFS-233181_ref50","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1109\/COMST.2021.3086475","article-title":"A Review of Computer Vision Methods in Network Security","volume":"23","author":"Zhao","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.3233\/JIFS-233181_ref51","first-page":"225","article-title":"Analysis of application strategies of computer information management technology in maintaining network security","volume":"125","author":"Zheng","year":"2019","journal-title":"Basic Clin Pharmacol Toxicol"},{"key":"10.3233\/JIFS-233181_ref52","first-page":"S286","article-title":"Optimization strategy of computer network information security from the perspective of cognitive impairment","volume":"34","author":"Zou","year":"2022","journal-title":"Psychiatr Danub"},{"key":"10.3233\/JIFS-233181_ref53","first-page":"202","article-title":"Security protection of computer network information under the background of big data","volume":"127","author":"Yang","year":"2020","journal-title":"Basic Clin Pharmacol Toxicol"},{"key":"10.3233\/JIFS-233181_ref54","doi-asserted-by":"crossref","first-page":"6889","DOI":"10.3233\/JIFS-189520","article-title":"Research on computer network information security based on improved machine learning","volume":"40","author":"Yu","year":"2021","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-233181_ref55","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1155\/2022\/1789222","article-title":"Encryption Technology for Computer Network Data Security Protection","volume":"2022","author":"Yu","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-233181_ref56","first-page":"7","article-title":"Application Research of Data Encryption Technology in Computer Network Information Security","volume":"2022","author":"Wang","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-233181_ref57","doi-asserted-by":"crossref","first-page":"4427","DOI":"10.3233\/JIFS-200414","article-title":"Methods for evaluating the computer network security withfuzzy number intuitionistic fuzzy dual Hamy mean operators","volume":"39","author":"Xu","year":"2020","journal-title":"JIntell Fuzzy Syst"},{"key":"10.3233\/JIFS-233181_ref58","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1155\/2022\/2794889","article-title":"Prediction of Computer Network Security Situation Based on Association Rules Mining","volume":"2022","author":"Xue","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"10.3233\/JIFS-233181_ref59","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1155\/2022\/3170164","article-title":"Computer Network Information Security Monitoring System Based on Big Data Era","volume":"2022","author":"Sun","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-233181_ref60","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/JGIM.295450","article-title":"Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime","volume":"30","author":"Wang","year":"2022","journal-title":"J Glob Inf Manag"},{"key":"10.3233\/JIFS-233181_ref61","first-page":"76","article-title":"The application of computer information management technology in maintaining network security","volume":"127","author":"Wang","year":"2020","journal-title":"Basic Clin Pharmacol Toxicol"},{"key":"10.3233\/JIFS-233181_ref62","first-page":"113","article-title":"TODIM: s and apllication to multicriteria ranking of projects with environmental impacts","volume":"16","author":"Gomes","year":"1991","journal-title":"Foundations of Control Engineering"},{"key":"10.3233\/JIFS-233181_ref65","doi-asserted-by":"crossref","first-page":"2342","DOI":"10.1080\/00207721.2014.994050","article-title":"Simplified neutrosophic sets and their applications in multi-criteria group decision-making problems","volume":"47","author":"Peng","year":"2016","journal-title":"International Journal of Systems Science"},{"key":"10.3233\/JIFS-233181_ref66","doi-asserted-by":"crossref","first-page":"144","DOI":"10.3390\/info8040144","article-title":"VIKOR Method for Interval Neutrosophic Multiple Attribute Group Decision-Making","volume":"8","author":"Huang","year":"2017","journal-title":"Information"},{"key":"10.3233\/JIFS-233181_ref67","first-page":"645953","article-title":"Interval Neutrosophic Sets and Their Application in Multicriteria Decision Making Problems","volume":"2014","author":"Zhang","year":"2014","journal-title":"Scientific World Journal"},{"key":"10.3233\/JIFS-233181_ref68","doi-asserted-by":"crossref","first-page":"165","DOI":"10.3233\/IFS-120724","article-title":"Similarity measures between interval neutrosophic sets and their applications in multicriteria decision-making","volume":"26","author":"Ye","year":"2014","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref69","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell System Technical Journal"},{"key":"10.3233\/JIFS-233181_ref70","doi-asserted-by":"crossref","first-page":"4891","DOI":"10.1007\/s00500-018-3088-y","article-title":"A novel interval-valued neutrosophic EDAS method: prioritization of the United Nations national sustainable development goals","volume":"22","author":"Karasan","year":"2018","journal-title":"Soft Comput"},{"key":"10.3233\/JIFS-233181_ref71","doi-asserted-by":"crossref","first-page":"10721","DOI":"10.3233\/JIFS-223370","article-title":"Research and evaluation on comprehensive obstacle-avoiding behavior for unmanned vehicles based on the interval neutrosophic number multiple attribute group decision making","volume":"44","author":"Li","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-233181_ref72","first-page":"33","article-title":"Multicriteria decision making approach by VIKOR under interval neutrosophic set environment","volume":"49","author":"Bausys","year":"2015","journal-title":"Econ Comput Econ Cybern Stud"},{"key":"10.3233\/JIFS-233181_ref74","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3390\/math7030257","article-title":"Multi-Attribute Decision-Making Based on Preference Perspective with Interval Neutrosophic Sets in Venture Capital","volume":"7","author":"Hong","year":"2019","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-233181_ref76","doi-asserted-by":"crossref","unstructured":"Gao Y. , Fan S. , Hu Z. , Li C.-C. and Dong Y. , Learning personalized individual semantics through the data of distributed linguistic preference relations: A two-stage method to support linguistic consensus reaching, Computers & Industrial Engineering 172 (2022).","DOI":"10.1016\/j.cie.2022.108581"},{"key":"10.3233\/JIFS-233181_ref77","doi-asserted-by":"crossref","first-page":"10052","DOI":"10.1109\/TCYB.2021.3085760","article-title":"Consistency Improvement With a Feedback Recommendation in Personalized Linguistic Group Decision Making","volume":"52","author":"Li","year":"2022","journal-title":"Ieee Transactions on Cybernetics"},{"key":"10.3233\/JIFS-233181_ref78","doi-asserted-by":"crossref","first-page":"3333","DOI":"10.1109\/TFUZZ.2021.3113571","article-title":"Consensus Reaching in Multiple Attribute Group Decision Making: A Multi-Stage Optimization Feedback Mechanism With Individual Bounded Confidences","volume":"30","author":"Zha","year":"2022","journal-title":"Ieee Transactions on Fuzzy Systems"}],"updated-by":[{"DOI":"10.3233\/jifs-219434","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"record-id":"64918"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-233181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:56:54Z","timestamp":1769673414000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-233181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":70,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-233181","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]}}}