Algorithm to Calculate trust among the nodes of the network and derivation of various properties of trust.
☆12May 21, 2021Updated 4 years ago
Alternatives and similar repositories for Trust-Network-and-Trust-Evaluation-Method
Users that are interested in Trust-Network-and-Trust-Evaluation-Method are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official code for the INFOCOM 2020 paper "Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks."☆11Jun 16, 2021Updated 4 years ago
- GitHub Desktop tutorial repository☆11Oct 27, 2023Updated 2 years ago
- Proof of concept blockchain platform for transparent trust evaluation in healthcare.☆11Feb 11, 2022Updated 4 years ago
- Implementation of most common reputation systems (EigenTrust, HonestPeer, PeerTrust, Absolute Trust). Fuzzy extension of PeerTrust. Exper…☆16Apr 20, 2019Updated 6 years ago
- 基于负载均衡的云计算资源调度算法☆15Apr 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- 基于Spring Boot,Spring Cloud(Eureka,Gateway,Ribbon,Feign),Spring Security,JWT,MyBatis、Redis以及区块链技术实现多个token验证登录的大数据网关,大数据网关作为访问控制的节点,集成对用户身…☆12Dec 13, 2022Updated 3 years ago
- FShop是一款基于Spring Boot + Mybatis + Dubbo + Zookeeper + RabbitMQ + Redis + Nginx的高并发秒杀系统。☆15Sep 29, 2020Updated 5 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 8 years ago
- RayCloudSim: A Simulator Written in Python for Cloud, Fog, or Edge Computing☆96Sep 5, 2025Updated 6 months ago
- ☆18Oct 9, 2022Updated 3 years ago
- Repository to the DAGsim paper☆14Nov 16, 2021Updated 4 years ago
- A Multi-Agent Simulation Framework and Analysis of the IOTA Tangle - Python implementation and PDF of M.Sc. thesis, Imperial College Lond…☆16Jul 6, 2023Updated 2 years ago
- Matlab implementation of the EM and MCMC algorithm for SVMs as introduced in the paper "Data augmentation for support vector machines"☆18Dec 2, 2014Updated 11 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago
- This is the study of an interface with PyQT☆14Oct 2, 2020Updated 5 years ago
- Mostly recording papers about models' trustworthy applications. Intending to include topics like model evaluation & analysis, security, c…☆21May 30, 2023Updated 2 years ago
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆17Sep 4, 2020Updated 5 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 6 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆10Jun 27, 2020Updated 5 years ago
- A robust video watermarking technique using SVD and DWT in Open CV Python☆18May 5, 2020Updated 5 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆42Jan 30, 2025Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- "Learning Stable Classifiers by Transferring Unstable Features" ICML 2022☆14Jul 24, 2022Updated 3 years ago
- A Retrieval-Augmented Generation (RAG) system running DeepSeek R1 Distill LLama 70B model using Groq's fast inference API.☆13Jan 29, 2025Updated last year
- ☆11May 9, 2023Updated 2 years ago
- Implicit Model Specialization through DAG-based Decentralized Federated Learning☆20Nov 2, 2021Updated 4 years ago
- SNA on various social graphs including trading networks & Facebook friendship networks.☆11Jun 17, 2020Updated 5 years ago
- A library for group signatures.☆29Sep 17, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Binary Ninja Call Graph plugin☆24Apr 20, 2022Updated 3 years ago
- Gradient-based Adaptive Markov chain Monte Carlo☆31Oct 26, 2019Updated 6 years ago
- JPBC_Optimize_IBE by JPBC☆22Apr 9, 2019Updated 6 years ago
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Mondrian for L-diveristy. It's not available now.☆20May 27, 2019Updated 6 years ago
- Silm your kernel with better configuration.☆39May 3, 2024Updated last year