{"id":"https://openalex.org/W2015791724","doi":"https://doi.org/10.4304/jcp.6.12.2567-2573","title":"Evaluation of Network Connection Credibility based on Neural Network","display_name":"Evaluation of Network Connection Credibility based on Neural Network","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2015791724","doi":"https://doi.org/10.4304/jcp.6.12.2567-2573","mag":"2015791724"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.6.12.2567-2573","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.6.12.2567-2573","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080439384","display_name":"Qingtao Wu","orcid":"https://orcid.org/0000-0003-1572-5293"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qingtao Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002304919","display_name":"Xintong Yang","orcid":"https://orcid.org/0009-0001-8403-0404"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xintong Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049802825","display_name":"Hua Bin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bin Hua","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5069590254","display_name":"Ruijuan Zheng","orcid":"https://orcid.org/0000-0002-0932-8788"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruijuan Zheng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080439384"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.78347363,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7860032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":"12","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/connection","display_name":"Connection (principal bundle)","score":0.8015512824058533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7185311317443848},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.7034066319465637},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6219894886016846},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3724448084831238},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1465916633605957}],"concepts":[{"id":"https://openalex.org/C13355873","wikidata":"https://www.wikidata.org/wiki/Q2920850","display_name":"Connection (principal bundle)","level":2,"score":0.8015512824058533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7185311317443848},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.7034066319465637},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6219894886016846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3724448084831238},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1465916633605957},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.6.12.2567-2573","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.6.12.2567-2573","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2001260626","https://openalex.org/W2040742598","https://openalex.org/W2054631140","https://openalex.org/W2094988080","https://openalex.org/W2099940443","https://openalex.org/W2111098531","https://openalex.org/W2161166082","https://openalex.org/W2169715329","https://openalex.org/W2357439189","https://openalex.org/W2388961484"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2388687352","https://openalex.org/W2370187191","https://openalex.org/W2369854048","https://openalex.org/W2374291020","https://openalex.org/W2355907197","https://openalex.org/W3171042291","https://openalex.org/W2390961115","https://openalex.org/W2388138913"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3],"innovative":[4],"method":[5,118],"to":[6,52,64,71],"evaluate":[7,65],"the":[8,30,54,66,72,83,86,93,97,100],"credibility":[9,69,101],"of":[10,85,102],"network":[11,16,21,75,103],"connections":[12,104],"based":[13,44],"on":[14,45,82],"neural":[15,56,74],"with":[17],"back":[18],"propagation":[19],"(BP)":[20],"model":[22],"and":[23,38,76,99],"Levenberg-Marquardt":[24],"(LM)":[25],"optimization":[26],"algorithm.":[27,113],"In":[28],"it,":[29],"second-level":[31],"index":[32],"values":[33,41],"are":[34,50,80],"taken":[35],"as":[36,42],"input":[37],"expected":[39],"evaluation":[40,87,122],"output,":[43],"which,":[46],"L":[47],"test":[48,53],"samples":[49],"used":[51],"trained":[55,73],"network.":[57],"At":[58],"last,":[59],"a":[60],"prediction":[61],"is":[62,90],"made":[63],"current":[67],"connection":[68],"according":[70],"corresponding":[77],"security":[78],"strategies":[79],"adopted":[81],"basis":[84],"values.":[88],"It":[89],"shown":[91],"that":[92],"nonlinear":[94],"relationship":[95],"between":[96],"attributes":[98],"can":[105],"be":[106],"established":[107],"by":[108],"training":[109],"neural-network":[110],"using":[111],"LM":[112],"Simulation":[114],"results":[115],"indicate":[116],"this":[117],"could":[119],"achieve":[120],"high":[121],"accuracy.":[123]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
