2020
DOI: 10.1007/s11277-020-07879-x
|View full text |Cite
|
Sign up to set email alerts
|

mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Then comprehensively consider the application task's QoS target constraints and user expectations and based on a membership function, apply the method described to convert the application task's multiple QoS target constraints into a single-objective constraint optimization problem. Finally, the reconstructed genetic algorithm is applied to approximate the optimal solution of the mentioned single-objective optimization problem [ 21 ]. The calculated result is the final scheduling decision plan, which is returned to the scheduler.…”
Section: Linear Equations Solution Methods and Task Scheduling Methodsmentioning
confidence: 99%
“…Then comprehensively consider the application task's QoS target constraints and user expectations and based on a membership function, apply the method described to convert the application task's multiple QoS target constraints into a single-objective constraint optimization problem. Finally, the reconstructed genetic algorithm is applied to approximate the optimal solution of the mentioned single-objective optimization problem [ 21 ]. The calculated result is the final scheduling decision plan, which is returned to the scheduler.…”
Section: Linear Equations Solution Methods and Task Scheduling Methodsmentioning
confidence: 99%
“…Simulations demonstrate that the proposed approach can achieve better channel utilization and transmit more data packets compared to other conventional approaches. In [145], an unsupervised learning approach is developed to filter spam voice calls by assigning trust scores among users. In particular, the approach extracts data from call logs to determine trust scores using an MLP model.…”
Section: Other Security Issuesmentioning
confidence: 99%
“…4) Transfer a General Model: In many aforementioned TL approaches, a baseline model trained with a large amount of labeled data is transferred to the target task for fine-tuning. For example, the TL approaches in [168] and [145] propose to transfer a model trained with a large amount of generalized data. The obtained results show that this TL strategy helps to improve the performance of the task models to various extents.…”
Section: Challenges Open Issues and Future Research Directionsmentioning
confidence: 99%
“…The other node with which the trustor communicates is called the trustee. Digital trust evaluates past behavior or evidence of the behavior of a device concerning its self-defined level of trustworthiness, which helps perceive its upcoming activities [ 17 ]. It is a presupposition to enhance the decision-making for successful cooperation between two agents.…”
Section: Introductionmentioning
confidence: 99%