[1]MEEKER M.Internet trends 2017 reports[EB/OL].[2017-12-10].http://www.kpcb.com/internet-trends.br/
[2]GOOD D.Individuals,interpersonal relations,and trust[EB/OL].[2017-12-10].http://pdfs.semanticschol ar.org/cb13/6769a21cb774a960cba162039fc1368215da.pdf.br/
[3]LIU G,WANG Y,ORGUN M A.Trust transitivity in complex social networks[C]//Proceedings of AAAI Conference on Artificial Intelligence.[S.l.]:AAAI Press,2011:1222-1229.br/
[4]SHERCHAN W,NEPAL S,PARIS C.A survey of trust in social networks[J].ACM Computing Surveys,2013,45(4):1-33.br/
[5]张波,向阳,黄震华.一种社交网络中的个体间推荐信任度计算方法[J].南京航空航天大学学报,2013,45(4):563-569.br/
[6]林军,姜文君,王国军.P2P环境中基于信誉与云理论的信任模型[J].计算机工程,2012,38(2):141-143.br/
[7]甘早斌,丁倩,李开,等.基于声誉的多维度信任计算算法[J].软件学报,2011,22(10):2401-2411.br/
[8]王刚,桂小林.社会网络中交易节点的选取及其信任关系计算[J].计算机学报,2013,36(2):368-383.br/
[9]谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,34(4):812-817.br/
[10]GOLBECK J.Computing and applying trust in Web-based social networks[D].Maryland,USA:University of Maryland,2005.br/
[11]MASSA P,AVESANI P.Trust metrics on controversial users:balancing between tytanny of the majority and echo chambers[J].International Journal on Semantic Web and Information Systems,2007,3(1):39-64.br/
[12]JIANG W,WU J,LI F,et al.Trust evaluation in online social networks using generalized network flow[J].IEEE Transactions on Computers,2016,65(3):952-963.br/
[13]JIANG W,WANG G,WU J.Generating trusted graphs for trust evaluation in online social networks[J].Future Generation Computer Systems,2014,31(1):48-58.br/
[14]RICHARDSON M,AGRAWAL R,DOMINGOS P.Trust management for the semantic Web[C]//Proceedings of the 2nd International Semantic Web Conference.Berlin,Germany:Springer,2003:351-368.br/
[15]STEPHENSON K,ZELEN M.Rethinking centrality:methods and examples[J].Social Networks,1989,11(1):1-37.br/
[16]BORGATTI S.Centrality and network flow[J].Social Networks,2005,27(1):55-71.br/
[17]POULIN R,BOILY M,MASSE B.Dynamical systems to define centrality in social networks[J].Social Networks,2000,22(3):187-220.br/
[18]CHEN D,L L,SHANG M,et al.Identifying influential nodes in complex networks[J].Physical A:Statistical Mechanics and Its Applications,2012,391(4):1777-1787.br/
[19]张宇.在线社会网络信任计算与挖掘分析中若干模型与算法研究[D].杭州:浙江大学,2009.br/
[20]TANG J L.Trust/Distrust computing[EB/OL].[2017-12-10].http://www.cse.msu.edu/~tangjili//trust.html.br/ |