Matlab source code for Experience and Reputation models in the Trust Platform
☆12Apr 11, 2017Updated 8 years ago
Alternatives and similar repositories for REK
Users that are interested in REK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago
- Trust-based Recruitment Mechanism in Mobile Crowd Sensing. This is the demonstration for our trust mechanism and recruitment algorithms.☆10Jun 13, 2018Updated 7 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 7 months ago
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆17Sep 4, 2020Updated 5 years ago
- Wireless Sensor Network is one of the growing technologies for sensing and also performing for different tasks. These types of networks a…☆18Sep 15, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simulations of Underwater Acoustic Sensor Networks localization techniques☆15Oct 5, 2017Updated 8 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- A decentralized and privacy preserving Mobile Crowdsensing system based on Blockchain Oracles.☆10May 23, 2021Updated 4 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Network Simulation - LEACH Protocol Source Code Fully Configured for NS-3☆10Dec 12, 2019Updated 6 years ago
- An OpenSSL Engine that interfaces with the TrouSerS tpm 1.2 stack (fork of official upstream on SourceForge, featuring OpenSSL 1.1 suppor…☆10Dec 30, 2024Updated last year
- This repository presents a blockchain-based framework, TrustFed, for Cross-Device Federated Learning systems to detect the model poisonin…☆13Mar 31, 2022Updated 3 years ago
- Implementation of a Channel-aware Routing Protocol in the Network Simulator for Underwater Acoustic Communication Networking☆11Mar 2, 2021Updated 5 years ago
- Code and results of the academic publication "Blockchain-enabled Network Sharing for O-RAN"☆11Jan 10, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Comparison of Alamouti & MRC Schemes over Rayleigh Channel☆12Feb 8, 2015Updated 11 years ago
- 一个关于待办事项提醒的项目☆14Apr 13, 2017Updated 8 years ago
- The code for NeurIPS 2020 paper: Adversarial Crowdsourcing Through Robust Rank-One Matrix Completion.☆10Oct 26, 2020Updated 5 years ago
- Official implementation of: Tha3aroon at NSURL-2019 Task 8: Semantic Question Similarity in Arabic☆13Aug 2, 2024Updated last year
- a implement and derivation of "CCS-TA: quality-guaranteed online task allocation in compressive crowdsensing"☆12Jun 12, 2022Updated 3 years ago
- A repository for high-quality QASRL data collected from crowd-workers.☆11Aug 10, 2023Updated 2 years ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Oct 18, 2025Updated 5 months ago
- MATLAB simulation of Depth-Based Routing(DBR) Protocol for UWSN☆10May 11, 2018Updated 7 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blockchain Based Approach for Trust Management in Intelligent Transportation Systems with Smart Contracts☆13Jul 19, 2022Updated 3 years ago
- implement a paper in Matlab: Detection of Cyber-attacks to indoor real time localization systems for autonomous robots☆13Dec 21, 2019Updated 6 years ago
- Email Classification using different machine learning algorithms.☆22Sep 24, 2020Updated 5 years ago
- Implementation of backpropagation algorithm in MATLAB to detect DDOS (Distributed Denial Of Service) Attack in NDN(Named Data Networking)…☆14Mar 8, 2017Updated 9 years ago
- Login feature data of more than 33M login attempts and 3M users (IP, UA, RTT)☆16Jun 29, 2022Updated 3 years ago
- Collection of MPC Protocols, mostly using libscapi☆13Nov 3, 2019Updated 6 years ago
- A tool for semantic relation extraction. The program finds pairs of semantically related words based on the text definitions coming from …☆26Jul 1, 2014Updated 11 years ago
- 亚洲人脸检索识别模型,支持人脸识别,人脸检索,支持各种平台,总模型大小9MB,ios、android、 pc(linux、windows、mac)总共(检测、对齐、特征计算)运行40ms,库独立,完全没有第三方库,方便部署,facial recognition system…☆12Dec 15, 2020Updated 5 years ago
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Repository to the DAGsim paper☆14Nov 16, 2021Updated 4 years ago
- A Multi-Agent Simulation Framework and Analysis of the IOTA Tangle - Python implementation and PDF of M.Sc. thesis, Imperial College Lond…☆16Jul 6, 2023Updated 2 years ago
- Blockchain's various consensus algorithm of go language implementation(区块链的各种共识算法的GO语言实现,包括dpos、pbft、pos、pow、raft)☆15Dec 11, 2021Updated 4 years ago
- 首先需要随机产生100个点,挑选出簇头以及每个簇头下的簇成员,需要注意一点的是,每个节点仅能当一次簇头,即本轮的簇头在以后的分簇中只能当簇成员,我将簇成员用*来表示,簇头用实心圆心来表示,且普通簇成员用‘黑色*’来表示,当过簇头的簇成员用‘蓝色*’,普通簇头用‘红色实心圆心…☆10Nov 23, 2018Updated 7 years ago
- ns3 implementation of the LEACH protocol for WSN☆53Jan 3, 2015Updated 11 years ago
- Fully Customized Side Menu☆11Jul 27, 2020Updated 5 years ago
- Blockchain reputation-based trust management system☆17Jul 14, 2019Updated 6 years ago