{"id":"https://openalex.org/W4400409167","doi":"https://doi.org/10.1109/tdsc.2024.3424448","title":"A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction","display_name":"A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400409167","doi":"https://doi.org/10.1109/tdsc.2024.3424448"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3424448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3424448","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101461406","display_name":"Mingfeng Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingfeng Huang","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha, China","School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210113561","display_name":"National Center of Security and Protection","ror":"https://ror.org/01yfz8598","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210113561"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["National &#x0026; Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","National &amp; Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Col-lege of Information Science and Technology, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"National &#x0026; Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210113561"]},{"raw_affiliation_string":"National &amp; Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Col-lege of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075435434","display_name":"Anfeng Liu","orcid":"https://orcid.org/0000-0001-5190-4761"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anfeng Liu","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha, China","School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019726320","display_name":"Xinglin Zhang","orcid":"https://orcid.org/0000-0003-2592-6945"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinglin Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhemin Yang","orcid":"https://orcid.org/0000-0002-1854-639X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhemin Yang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China","School of Computer Science, Fu-dan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"School of Computer Science, Fu-dan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052437722","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-9714-5545"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China","School of Computer Science, Fu-dan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"School of Computer Science, Fu-dan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101461406"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":1.366,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83633742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"22","issue":"2","first_page":"997","last_page":"1010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8536999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8536999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.7493000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.7404999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5835127830505371},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.5323206782341003},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.49613484740257263},{"id":"https://openalex.org/keywords/data-extraction","display_name":"Data extraction","score":0.4643115997314453},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4460050165653229},{"id":"https://openalex.org/keywords/extraction","display_name":"Extraction (chemistry)","score":0.4262089431285858},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3326541781425476},{"id":"https://openalex.org/keywords/medline","display_name":"MEDLINE","score":0.12871423363685608},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1237102746963501},{"id":"https://openalex.org/keywords/chromatography","display_name":"Chromatography","score":0.11948022246360779},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09944188594818115},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.08917757868766785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5835127830505371},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.5323206782341003},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.49613484740257263},{"id":"https://openalex.org/C2777466982","wikidata":"https://www.wikidata.org/wiki/Q5227287","display_name":"Data extraction","level":3,"score":0.4643115997314453},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4460050165653229},{"id":"https://openalex.org/C4725764","wikidata":"https://www.wikidata.org/wiki/Q844704","display_name":"Extraction (chemistry)","level":2,"score":0.4262089431285858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3326541781425476},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.12871423363685608},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1237102746963501},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.11948022246360779},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09944188594818115},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.08917757868766785},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3424448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3424448","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5888125704","display_name":null,"funder_award_id":"62072475","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6896290437","display_name":null,"funder_award_id":"2024JJ6067","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G8718608543","display_name":null,"funder_award_id":"62032020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1505128236","https://openalex.org/W2031674781","https://openalex.org/W2034419870","https://openalex.org/W2095590184","https://openalex.org/W2159620259","https://openalex.org/W2333939496","https://openalex.org/W2342433611","https://openalex.org/W2515472799","https://openalex.org/W2574518752","https://openalex.org/W2596027621","https://openalex.org/W2605270919","https://openalex.org/W2613554997","https://openalex.org/W2734490561","https://openalex.org/W2744079410","https://openalex.org/W2890164172","https://openalex.org/W2930273944","https://openalex.org/W2958414115","https://openalex.org/W2971894738","https://openalex.org/W2973280498","https://openalex.org/W2992933757","https://openalex.org/W3010457411","https://openalex.org/W3011530370","https://openalex.org/W3036803688","https://openalex.org/W3106505424","https://openalex.org/W3117176175","https://openalex.org/W3146664580","https://openalex.org/W3166388230","https://openalex.org/W3197814746","https://openalex.org/W3206246976","https://openalex.org/W4200486839","https://openalex.org/W4214571486","https://openalex.org/W4285229621","https://openalex.org/W4300590317","https://openalex.org/W4396506390","https://openalex.org/W7072031773"],"related_works":["https://openalex.org/W2186048469","https://openalex.org/W1967509846","https://openalex.org/W3029267192","https://openalex.org/W4308662946","https://openalex.org/W2941073738","https://openalex.org/W2377297411","https://openalex.org/W2480059162","https://openalex.org/W2189632163","https://openalex.org/W3148217948","https://openalex.org/W4221068634"],"abstract_inverted_index":{"As":[0],"a":[1,54,121,167],"collaborative":[2],"and":[3,22,29,42,46,84,103,129,139,144,182],"open":[4],"network,":[5,35],"billions":[6],"of":[7,68,97,179],"devices":[8],"can":[9],"be":[10],"free":[11],"to":[12,116,174],"join":[13],"the":[14,34,66,136,150,158],"IoT-based":[15],"data":[16,20,44,62,70],"collection":[17,63],"network":[18],"for":[19,60],"perception":[21],"transmission.":[23],"Along":[24],"with":[25,40,141],"this":[26],"trend,":[27],"more":[28,30],"malicious":[31],"attackers":[32],"enter":[33],"they":[36],"steal":[37],"or":[38],"tamper":[39],"data,":[41],"hinder":[43],"exchange":[45],"communication.":[47],"To":[48],"address":[49],"these":[50,110],"issues,":[51],"we":[52],"propose":[53],"Proactive":[55],"Trust":[56],"Evaluation":[57],"System":[58],"(PTES)":[59],"secure":[61],"by":[64,119,156],"evaluating":[65],"trust":[67,78,81,85,91,111,146,153,160],"mobile":[69],"collectors.":[71],"Specifically,":[72],"PTES":[73,89,171],"guarantees":[74],"evaluation":[75],"accuracy":[76,181],"from":[77,100,105,135],"evidence":[79,82,92,131],"acquisition,":[80],"storage,":[83],"value":[86],"calculation.":[87],"First,":[88],"obtains":[90],"based":[93],"on":[94,166],"active":[95],"detection":[96,180],"drones,":[98],"feedbacks":[99],"interacted":[101],"objects,":[102],"recommendations":[104],"trusted":[106],"third":[107],"parties.":[108],"Then,":[109],"evidences":[112],"are":[113,133],"stored":[114],"according":[115],"interaction":[117],"time":[118],"adopting":[120],"sliding":[122],"window":[123],"mechanism.":[124],"After":[125],"that,":[126],"credible,":[127],"untrustworthy,":[128],"uncertain":[130],"sequences":[132],"extracted":[134],"storage":[137],"space,":[138],"assigned":[140],"positive,":[142],"negative,":[143],"tendentious":[145],"values,":[147],"respectively.":[148],"Consequently,":[149],"final":[151],"normalized":[152],"is":[154,172],"obtained":[155],"combining":[157],"three":[159],"values.":[161],"Finally,":[162],"extensive":[163],"experiments":[164],"conducted":[165],"real-world":[168],"dataset":[169],"demonstrate":[170],"superior":[173],"benchmark":[175],"methods":[176],"in":[177],"terms":[178],"profit.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
