{"id":"https://openalex.org/W4393241197","doi":"https://doi.org/10.1109/jiot.2024.3382010","title":"A Trustworthiness Sequence Prediction Scheme Based on Neural Networks and Mathematical Calculations","display_name":"A Trustworthiness Sequence Prediction Scheme Based on Neural Networks and Mathematical Calculations","publication_year":2024,"publication_date":"2024-03-27","ids":{"openalex":"https://openalex.org/W4393241197","doi":"https://doi.org/10.1109/jiot.2024.3382010"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3382010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3382010","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044422475","display_name":"Xuefei Li","orcid":"https://orcid.org/0000-0003-3901-8972"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuefei Li","raw_affiliation_strings":["School of Computing, Inner Mongolia University, Hohhot, China"],"raw_orcid":"https://orcid.org/0000-0003-3901-8972","affiliations":[{"raw_affiliation_string":"School of Computing, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341279","display_name":"Qi Wang","orcid":"https://orcid.org/0000-0002-2749-2135"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Wang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-2749-2135","affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102751222","display_name":"Ru Li","orcid":"https://orcid.org/0000-0001-6660-5633"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Li","raw_affiliation_strings":["School of Computing, Inner Mongolia University, Hohhot, China"],"raw_orcid":"https://orcid.org/0000-0001-6660-5633","affiliations":[{"raw_affiliation_string":"School of Computing, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044422475"],"corresponding_institution_ids":["https://openalex.org/I2722730"],"apc_list":null,"apc_paid":null,"fwci":1.0744,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.78776071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"11","issue":"12","first_page":"22643","last_page":"22655"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8588608503341675},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.7338746786117554},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6360195875167847},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5653088092803955},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5491656064987183},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5417287349700928},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4649212658405304},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.43654322624206543},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34653007984161377},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33820390701293945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8588608503341675},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.7338746786117554},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6360195875167847},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5653088092803955},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5491656064987183},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5417287349700928},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4649212658405304},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.43654322624206543},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34653007984161377},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33820390701293945},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3382010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3382010","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G4213274774","display_name":null,"funder_award_id":"2021-KJXM-TZJW-04","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1859131989","https://openalex.org/W1968773071","https://openalex.org/W2040128811","https://openalex.org/W2096371059","https://openalex.org/W2113467413","https://openalex.org/W2122516858","https://openalex.org/W2123649966","https://openalex.org/W2149229264","https://openalex.org/W2219888463","https://openalex.org/W2542747939","https://openalex.org/W2795698770","https://openalex.org/W2804907169","https://openalex.org/W2895570089","https://openalex.org/W2934826843","https://openalex.org/W2947690458","https://openalex.org/W2965672543","https://openalex.org/W2982316333","https://openalex.org/W2988201662","https://openalex.org/W2992137023","https://openalex.org/W2995975985","https://openalex.org/W3011594683","https://openalex.org/W3030416048","https://openalex.org/W3033250580","https://openalex.org/W3049033023","https://openalex.org/W3092261462","https://openalex.org/W3100457262","https://openalex.org/W3101098008","https://openalex.org/W3108103912","https://openalex.org/W3108927103","https://openalex.org/W3111603885","https://openalex.org/W3113952141","https://openalex.org/W3124136430","https://openalex.org/W3129648592","https://openalex.org/W3135221028","https://openalex.org/W3135900239","https://openalex.org/W3162199680","https://openalex.org/W3164573579","https://openalex.org/W3184775560","https://openalex.org/W3195705537","https://openalex.org/W3209576441","https://openalex.org/W3210624065","https://openalex.org/W3215445770","https://openalex.org/W4205786215","https://openalex.org/W4213440380","https://openalex.org/W4285237258","https://openalex.org/W4285287462","https://openalex.org/W4285310054","https://openalex.org/W4312573180","https://openalex.org/W4312584511","https://openalex.org/W4312959111","https://openalex.org/W4385938240","https://openalex.org/W4386280834","https://openalex.org/W6639499047","https://openalex.org/W6673836303","https://openalex.org/W6736054481","https://openalex.org/W6759603643","https://openalex.org/W6796833363","https://openalex.org/W6804215311"],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W120741642","https://openalex.org/W138569904","https://openalex.org/W2390914021","https://openalex.org/W2389417819"],"abstract_inverted_index":{"Trust":[0,23],"management":[1],"of":[2,9,13,32,42,47,55,58,64,93,97,105,122,141,156,184],"network":[3,112],"nodes":[4],"can":[5,170],"protect":[6],"the":[7,29,40,45,53,56,89,102,106,110,119,139,142,157,168,181,196],"security":[8],"IoT,":[10],"e.g.,":[11,128,175],"detection":[12],"false":[14],"messages":[15],"and":[16,25,84,91,114],"malicious":[17,159,173],"nodes,":[18],"optimizing":[19],"IoT":[20],"services,":[21],"etc.":[22,132,163,179],"evaluation":[24,60],"trust":[26,33,59,65,71,78,94,126,144,151,185,198],"prediction":[27,72,79,92,145,186,199],"are":[28,36],"core":[30],"contents":[31],"management,":[34],"which":[35,192],"used":[37],"to":[38,52,67,87,137],"evaluate":[39],"trustworthiness":[41],"nodes.":[43],"However,":[44],"lack":[46],"trust-related":[48],"data":[49,115,176],"will":[50],"lead":[51],"failure":[54],"activation":[57],"mechanisms.":[61],"The":[62,164],"update":[63],"needs":[66],"be":[68],"solved":[69],"by":[70],"schemes.":[73,200],"This":[74],"paper":[75,100],"designs":[76],"a":[77],"scheme,":[80,108,146,158],"utilizing":[81,134],"neural":[82,111],"networks":[83],"mathematical":[85],"calculations":[86,121],"realize":[88],"classification":[90],"iterations.":[95],"First":[96],"all,":[98],"this":[99],"gives":[101],"detailed":[103],"architecture":[104],"designed":[107,143],"including":[109,147],"model":[113],"preprocessing.":[116],"Then":[117],"analyze":[118],"theoretical":[120],"related":[123,172],"variables":[124],"in":[125,150],"iterations,":[127,152],"mean":[129],"value,":[130],"variance,":[131],"Finally,":[133],"simulation":[135],"experiments":[136,165],"verify":[138],"performance":[140],"conserved":[148],"quantity":[149],"dataset":[153],"preprocessing,":[154],"testing":[155],"attack":[160],"resistance":[161],"analysis,":[162],"prove":[166],"that":[167],"scheme":[169],"resist":[171],"attacks,":[174,178],"tampering":[177],"Moreover,":[180],"residual":[182],"error":[183],"is":[187,193],"not":[188],"more":[189],"than":[190,195],"0.0075,":[191],"better":[194],"existing":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
