{"id":"https://openalex.org/W3109602373","doi":"https://doi.org/10.1109/cisp-bmei51763.2020.9263498","title":"Research Progress of Trust Evaluation","display_name":"Research Progress of Trust Evaluation","publication_year":2020,"publication_date":"2020-10-17","ids":{"openalex":"https://openalex.org/W3109602373","doi":"https://doi.org/10.1109/cisp-bmei51763.2020.9263498","mag":"3109602373"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei51763.2020.9263498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei51763.2020.9263498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100322712","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0002-5344-1884"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Wang","raw_affiliation_strings":["Yantai University,School Computer and Control Engineering,Yantai,China,264005"],"affiliations":[{"raw_affiliation_string":"Yantai University,School Computer and Control Engineering,Yantai,China,264005","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072895530","display_name":"Xiangrong Tong","orcid":"https://orcid.org/0000-0003-4855-3723"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangrong Tong","raw_affiliation_strings":["Yantai University,School Computer and Control Engineering,Yantai,China,264005"],"affiliations":[{"raw_affiliation_string":"Yantai University,School Computer and Control Engineering,Yantai,China,264005","institution_ids":["https://openalex.org/I18452120"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100322712"],"corresponding_institution_ids":["https://openalex.org/I18452120"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16098071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"42","issue":null,"first_page":"1081","last_page":"1086"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.825953483581543},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.6712708473205566},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6129064559936523},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.592484712600708},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.5583467483520508},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5579233765602112},{"id":"https://openalex.org/keywords/social-trust","display_name":"Social trust","score":0.5066564679145813},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4612848162651062},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.312999427318573},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26406246423721313},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.07985308766365051}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.825953483581543},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.6712708473205566},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6129064559936523},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.592484712600708},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.5583467483520508},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5579233765602112},{"id":"https://openalex.org/C2985797017","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Social trust","level":3,"score":0.5066564679145813},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4612848162651062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.312999427318573},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26406246423721313},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.07985308766365051},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C68062652","wikidata":"https://www.wikidata.org/wiki/Q214693","display_name":"Social capital","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei51763.2020.9263498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei51763.2020.9263498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1534784017","https://openalex.org/W1854663754","https://openalex.org/W1965688895","https://openalex.org/W1980251021","https://openalex.org/W1987051331","https://openalex.org/W2003274231","https://openalex.org/W2018597607","https://openalex.org/W2030144199","https://openalex.org/W2032741002","https://openalex.org/W2034422204","https://openalex.org/W2036827708","https://openalex.org/W2045049260","https://openalex.org/W2054539343","https://openalex.org/W2055779760","https://openalex.org/W2058447404","https://openalex.org/W2061886770","https://openalex.org/W2068227386","https://openalex.org/W2117079761","https://openalex.org/W2124591829","https://openalex.org/W2155106456","https://openalex.org/W2156523427","https://openalex.org/W2171813380","https://openalex.org/W2266294848","https://openalex.org/W2292892649","https://openalex.org/W2313273281","https://openalex.org/W2336195973","https://openalex.org/W2382321339","https://openalex.org/W2396967885","https://openalex.org/W2398661578","https://openalex.org/W2406470551","https://openalex.org/W2493904836","https://openalex.org/W2594718649","https://openalex.org/W2613709413","https://openalex.org/W2749626486","https://openalex.org/W2773238158","https://openalex.org/W2797148637","https://openalex.org/W2807874642","https://openalex.org/W2887940528","https://openalex.org/W2897955872","https://openalex.org/W2898719808","https://openalex.org/W2910618689","https://openalex.org/W2920102957","https://openalex.org/W2970841909","https://openalex.org/W2981260853","https://openalex.org/W2998228178","https://openalex.org/W3000758232","https://openalex.org/W3006944545","https://openalex.org/W4254761308","https://openalex.org/W4301347335","https://openalex.org/W6703662942","https://openalex.org/W6735050833","https://openalex.org/W6743718877","https://openalex.org/W6753574927"],"related_works":["https://openalex.org/W2772628444","https://openalex.org/W1484355083","https://openalex.org/W2735929803","https://openalex.org/W4220714703","https://openalex.org/W2098758514","https://openalex.org/W3008845055","https://openalex.org/W2170391450","https://openalex.org/W4376854386","https://openalex.org/W2202724490","https://openalex.org/W2508671622"],"abstract_inverted_index":{"Trust":[0],"evaluation":[1,70,78,92],"is":[2,21,57,76,90],"one":[3],"of":[4,68],"the":[5,16,22,65,106,137],"most":[6],"important":[7],"issues":[8],"in":[9,35,51,71],"trust":[10,17,32,48,53,69,77,91,120],"related":[11],"research.":[12,33],"How":[13],"to":[14,131,143,147],"evaluate":[15],"between":[18],"two":[19,72],"users":[20,50],"main":[23],"problem":[24],"faced":[25],"by":[26],"many":[27,36],"current":[28],"recommendation":[29,149],"systems":[30],"and":[31,44,86,101,116,141,145],"Currently":[34],"applications,":[37],"such":[38,82,97],"as":[39,83,98],"movie":[40],"recommendation,":[41],"spam":[42],"detection,":[43],"online":[45],"borrowing,":[46],"evaluating":[47],"among":[49],"a":[52,58],"social":[54],"network":[55],"(TSN)":[56],"key":[59],"issue.":[60],"Therefore,":[61],"this":[62],"paper":[63],"introduces":[64],"development":[66],"process":[67],"aspects.":[73],"The":[74,88],"first":[75],"under":[79],"different":[80,95],"factors,":[81],"user":[84,123,134],"information":[85],"evidence.":[87],"second":[89],"based":[93],"on":[94],"methods,":[96],"neural":[99,114],"networks":[100,115],"collaborative":[102],"filtering":[103],"methods.":[104],"In":[105],"future,":[107],"more":[108,139,148],"factors":[109],"can":[110,128],"be":[111,129],"combined":[112,130],"with":[113],"reinforcement":[117],"learning":[118],"for":[119],"assessment.":[121],"For":[122],"privacy":[124],"protection,":[125],"blockchain":[126],"technology":[127],"better":[132],"encrypt":[133],"information,":[135],"making":[136],"results":[138],"accurate":[140],"close":[142],"reality,":[144],"apply":[146],"systems.":[150]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
