Author image not provided
 Qinyuan Feng

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.33
Citation Count39
Publication count9
Publication years2006-2012
Available for download2
Average downloads per article429.00
Downloads (cumulative)858
Downloads (12 Months)50
Downloads (6 Weeks)3
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


9 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 9 of 9
Sort by:

1 published by ACM
February 2012 ACM Transactions on Internet Technology (TOIT): Volume 11 Issue 3, January 2012
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 3,   Downloads (12 Months): 34,   Downloads (Overall): 624

Full text available: PDFPDF
Social trust and recommendation services are the most popular social rating systems today for service providers to learn about the social opinion or popularity of a product, item, or service, such as a book on Amazon, a seller on eBay, a story on Digg or a movie on Netflix. Such ...
Keywords: Rating system, trust mechanism, recommender system, reputation system

2
December 2010 IEEE Transactions on Knowledge and Data Engineering: Volume 22 Issue 12, December 2010
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 6

With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting ...
Keywords: trust mechanism, Voting system, reputation system, Voting system, trust mechanism, reputation system, security., security.

3
September 2009 IEEE Internet Computing: Volume 13 Issue 5, September 2009
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 4

Online product ranking is complicated by conflicting attributes. The authors propose a Rainbow ranking system to solve this problem in e-commerce. This approach extends eBay's one-to-one shopping paradigm to a flexible one with many-to-many transactions. The system demonstrates a 50 to 70 percent transaction increase over skyline and eBay ranking ...
Keywords: e-commerce, online shopping, online shopping, e-commerce, product ranking, Rainbow ranking, product ranking, Rainbow ranking

4
September 2009 Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications: Volume 24 Issue 5, September 2009
Publisher: Institute of Computing Technology
Bibliometrics:
Citation Count: 4

Recently, online rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but challenging problem. Many unfair rating detection approaches have been developed and evaluated against simple attack models. However, the lack of unfair rating data from real human users and realistic ...
Keywords: online rating system, attack, trust

5
April 2009 ICASSP '09: Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

User behavior models are important for building realistic simulation environment for research on P2P multimedia file-sharing systems. In this paper, we build a user download behavior model and a user removal behavior model, which can describe important user characteristics that are not captured in the existing models. The proposed download ...

6 published by ACM
September 2008 SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrks
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 0,   Downloads (12 Months): 16,   Downloads (Overall): 234

Full text available: PDFPDF
Reputation systems are playing critical roles in securing today's distributed computing and communication systems. Similar to other security mechanisms, reputation systems can be under attack. In this paper, we report the discovery of a new attack, named RepTrap(Reputation Trap), against feedback-based reputation systems, such as those used in P2P file-sharing ...
Keywords: attacks, feedback, reputation system, trust

7
June 2008 ICDCSW '08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rating detection approaches have been developed. Currently, these approaches are evaluated against simple attack models, but complicated attacking strategies can be used by attackers in the ...
Keywords: Rating system, Trust, Attack, Reputation

8
June 2007 ICDCSW '07: Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to ad- dress them respectively. In real systems however, a trust mechanism without incentive would face lack of users' enthusiasm and thus cause sparse relationship of direct ...
Keywords: trust, incentive, reputation, p2p

9
October 2006 GCCW '06: Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

This paper presents a universal approach using application layer gateway (ALG) mechanism to enable applications supporting both IPv4 and IPv6 network, which is simple and easy to implement as compared to solutions on networking layer. Maze is a P2P file sharing system, which is developed, deployed and operated by our ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us