2022
DOI: 10.1016/j.icte.2022.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Peer-to-peer trust management in intelligent transportation system: An Aumann’s agreement theorem based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%
“…When different models produce consistent results, it indicates that they have a similar understanding of the categories and can be expected to perform consistently [14,37]. Notwithstanding, it is imperative to consider that attaining agreement does not invariably guarantee validity; nevertheless, it is probable that they would agree on reliable samples to a greater extent [2,31,37,54]. Whilst our work draws inspiration from the aforementioned approaches, our fundamental aim is to address the issue of noisy label image classification through the application of a novel sample selection.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, clean data are likely to have high predictive probability agreement in (1). According to the theory of peer classifier agree-ment [24,54,61], it is advisable that clean data should be selected based on high peer classifier agreement, but noisy data should be cautiously selected based on low peer classifier agreement. Leveraging the aforementioned remark, we partition the training set D into the clean set Dclean and noisy set Dnoisy using the cosine similarity in (1).…”
Section: Reliability Based Sample Selectionmentioning
confidence: 99%
“…Binary scores, i.e., 0 or 1, are not the best indicators to evaluate studies. However, we somewhat followed the authors' method to use fuzzy linear variables [9][10][11][12][13][14][15]. However, instead of using a crisp set, we chose a numeric set ranging from 0 to 4 for each question.…”
Section: Quality Assessment Criteriamentioning
confidence: 99%