Skip to main content

and
  1. No Access

    Article

    Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks

    Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are ext...

    Qiyi Han, Hong Wen, Gang Feng, Bin Wu in Peer-to-Peer Networking and Applications (2016)

  2. No Access

    Article

    A topological potential weighted community-based recommendation trust model for P2P networks

    Peer-to-Peer (P2P) technology has experienced its great popularity for resource sharing in current network services. However, lacking of prior experience and knowledge about other peers’ reputation, P2P suffer...

    Qiyi Han, Hong Wen, Mengyin Ren, Bin Wu in Peer-to-Peer Networking and Applications (2015)

  3. No Access

    Chapter and Conference Paper

    Rumor Spreading and Security Monitoring in Complex Networks

    Rumor spreading is a typical phenomenon which poses security threats. Therefore, it is necessary to study the evolution mechanism of rumor spreading in complex networks. Considering the hesitating state in rum...

    Qiyi Han, Hong Wen, **song Wu, Mengyin Ren in Computational Social Networks (2015)