{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:23:11Z","timestamp":1764872591224,"version":"3.45.0"},"reference-count":18,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062556","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:28:16Z","timestamp":1744259296000},"page":"4239-4256","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Quantification Mechanism of Data Source Reliability Based on Trust Evaluation"],"prefix":"10.32604","volume":"83","author":[{"given":"Gaoshang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Fa","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Zixiang","family":"Tang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2014 25th International Workshop on Database and Expert Systems Applications","first-page":"278","article-title":"Trust and big data: a roadmap for research","author":"Sanger","year":"2014 Sep\n\n1\u20135"},{"key":"ref2","first-page":"1","article-title":"Convergence of big energy thinking and big data thinking (I) big data and power big data","volume":"40","author":"Xue","year":"2016","journal-title":"Power System Automation"},{"key":"ref3","series-title":"Contemporary Computing: 4th International Conference, IC3 2011","first-page":"301","article-title":"Opinion based trust evaluation model in MANETs","author":"Poonam","year":"2011 Aug 8\u201310"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2029","DOI":"10.1007\/s12652-021-03414-3","volume":"14","author":"Hosmani","year":"2023","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref5","series-title":"MATEC Web of Conferences","article-title":"Research on software trustworthiness measurement evaluation model based on data driven","author":"Xu","year":"2021 Feb 15"},{"key":"ref6","series-title":"2013 International Conference on Cloud Computing and Big Data","first-page":"538","article-title":"Trust evaluation based content filtering in social interactive data","author":"Xu","year":"2013 Dec 16\u201319"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1049\/cje.2021.07.028","article-title":"Trusted network evaluation model based on comprehensive trust","volume":"30","author":"Ansheng","year":"2021","journal-title":"Chin J Electron"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.cogsys.2019.02.005","article-title":"SEAT-DSR: spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks","volume":"58","author":"Mythili","year":"2019","journal-title":"Cogn Syst Res"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4092","DOI":"10.17485\/IJST\/v13i39.1522","article-title":"Performance and evaluation of location energy aware trusted distance source routing protocol for secure routing in WSNs","volume":"13","author":"Rajasekaran","year":"2020","journal-title":"Indian J Sci Technol"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"101937","DOI":"10.1016\/j.cose.2020.101937","article-title":"Achieving secure big data collection based on trust evaluation and true data discovery","volume":"96","author":"Lv","year":"2020","journal-title":"Comput Secur"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11280-015-0324-6","article-title":"Behavior evaluation for trust management based on formal distributed network monitoring","volume":"19","author":"Lopez","year":"2016","journal-title":"World Wide Web"},{"key":"ref12","series-title":"2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K)","first-page":"1","article-title":"Data centric trust evaluation and prediction framework for IoT","author":"Jayasinghe","year":"2017 Nov 27\u201329"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3431","DOI":"10.1007\/s12083-021-01200-8","article-title":"NTSC: a novel trust-based service computing scheme in social internet of things","volume":"14","author":"Li","year":"2021","journal-title":"Peer Peer Netw Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.inffus.2021.09.001","article-title":"Data fusion and transfer learning empowered granular trust evaluation for internet of things","volume":"78","author":"Lin","year":"2022","journal-title":"Inf Fusion"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"Aldini A. A formal framework for modeling trust and reputation in collective adaptive systems. arXiv:1607.02232. 2016.","DOI":"10.4204\/EPTCS.217.4"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.3390\/s110201345","article-title":"A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory","volume":"11","author":"Feng","year":"2011","journal-title":"Sensors"},{"key":"ref17","series-title":"2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)","first-page":"1","article-title":"Computational trust assessment of open media data","author":"Belov","year":"2013 Jul 15\u201319"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"13999","DOI":"10.1109\/ACCESS.2019.2893657","article-title":"Info-trust: a multicriteria and adaptive trustworthiness calculation mechanism for information sources","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_62556\/TSP_CMC_62556.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:54Z","timestamp":1763342994000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":18,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062556","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}