default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- International Middleware Conference (Middleware)
- ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
- ACM-SIGPLAN Symposium on Programming Language Design and Implementation (PLDI)
- European Conference on Parallel Processing (Euro-Par)
- International Conference on Database and Expert Systems Applications (DEXA)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 3,821 matches
- 2025
- José Luis Corcuera Bárcena, Pietro Ducange, Francesco Marcelloni, Alessandro Renda:
Increasing trust in AI through privacy preservation and model explainability: Federated Learning of Fuzzy Regression Trees. Inf. Fusion 113: 102598 (2025) - Hengjie Zhang, Rong Zhang, Juan Liu, Yan Zhu:
Strategic manipulation behavior in graph model for conflict Resolution: The role of social trust network. Inf. Sci. 686: 121313 (2025) - 2024
- Gwanghyun Ahn, Jisoo Jang, Seho Choi, Dongkyoo Shin:
Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix. IEEE Access 12: 89291-89309 (2024) - Baptiste Beltzer, Emmanuel Conchon, Sylvain Giroux:
New Aggregators for Global Reputation on Bi-Lattice Based Trust Model. IEEE Access 12: 15713-15725 (2024) - Lauri Halla-aho, Jouni Isoaho, Seppo Virtanen:
Defining and Modeling Forced Trust and Its Dependencies in Smart Environments. IEEE Access 12: 105865-105877 (2024) - Zhaopeng Li, Mondher Bouazizi, Tomoaki Ohtsuki, Masakuni Ishii, Eri Nakahara:
Toward Building Trust in Machine Learning Models: Quantifying the Explainability by SHAP and References to Human Strategy. IEEE Access 12: 11010-11023 (2024) - Mahtab Modaber, Martijn Hendriks, Marc Geilen, Twan Basten, Jeroen Voeten:
A Method for Building Trustworthy Hybrid Performance Models for Cyber-Physical Systems of Systems. IEEE Access 12: 92733-92752 (2024) - Mimonah Al Qathrady, Muhammad Saeed, Rashid Amin, Mohammed S. Alshehri, Asma Hassan Alshehri, Samar M. Alqhtani:
Smart Healthcare: A Dynamic Blockchain-Based Trust Management Model Using Subarray Algorithm. IEEE Access 12: 49449-49463 (2024) - Kashif Naseer Qureshi, Hanaa Nafea, Ibrahim Tariq Javed, Kayhan Zrar Ghafoor:
Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks. IEEE Access 12: 95390-95401 (2024) - Yiying Wang, Xin Kang, Tieyan Li:
Toward an Open Trust Establishment Infrastructure for Future Network: Motivations, Models, and Technologies. IEEE Access 12: 111196-111205 (2024) - Yan Wang, Zenan Wu:
Trust Model Considering Uncertainty and Dynamics in Cloud Computing. IEEE Access 12: 96319-96331 (2024) - Jinglin Xu, Yang Peng, Cong Ye, Shang Gao, Ming Cheng:
Hospital Flow Simulation and Space Layout Planning Based on Low-Trust Social Force Model. IEEE Access 12: 90135-90144 (2024) - Chuanhua Wang, Quan Zhang, Xin Xu, Huimin Wang, Zhenyu Luo:
BPS-V: A blockchain-based trust model for the Internet of Vehicles with privacy-preserving. Ad Hoc Networks 163: 103566 (2024) - Xiaowei Huang, Wenjie Ruan, Wei Huang, Gaojie Jin, Yi Dong, Changshun Wu, Saddek Bensalem, Ronghui Mu, Yi Qi, Xingyu Zhao, Kaiwen Cai, Yanghao Zhang, Sihao Wu, Peipei Xu, Dengyu Wu, André Freitas, Mustafa A. Mustafa:
A survey of safety and trustworthiness of large language models through the lens of verification and validation. Artif. Intell. Rev. 57(7): 175 (2024) - Zichao Lin, Shuyan Guan, Wending Zhang, Huiyan Zhang, Yugang Li, Huaping Zhang:
Towards trustworthy LLMs: a review on debiasing and dehallucinating in large language models. Artif. Intell. Rev. 57(9): 243 (2024) - Kazuma Kobayashi, Yasuyuki Takamizawa, Mototaka Miyake, Sono Ito, Lin Gu, Tatsuya Nakatsuka, Yu Akagi, Tatsuya Harada, Yukihide Kanemitsu, Ryuji Hamamoto:
Can physician judgment enhance model trustworthiness? A case study on predicting pathological lymph nodes in rectal cancer. Artif. Intell. Medicine 154: 102929 (2024) - Benjamin Lambert, Florence Forbes, Senan Doyle, Harmonie Dehaene, Michel Dojat:
Trustworthy clinical AI solutions: A unified review of uncertainty quantification in Deep Learning models for medical image analysis. Artif. Intell. Medicine 150: 102830 (2024) - Michael Parker, Sat Gupta, Sadia Khalil:
A Mixture Quantitative Randomized Response Model That Improves Trust in RRT Methodology. Axioms 13(1): 11 (2024) - Ahtsham Zafar, Venkatesh Balavadhani Parthasarathy, Chan Le Van, Saad Shahid, Aafaq Iqbal khan, Arsalan Shahid:
Building Trust in Conversational AI: A Review and Solution Architecture Using Large Language Models and Knowledge Graphs. Big Data Cogn. Comput. 8(6): 70 (2024) - Changjoon Lee, Byoung-Chun Ha:
Relationship between trust, the investment model and logistics performance in supply chain management. Bus. Process. Manag. J. 30(2): 485-504 (2024) - Chung Yee Lai, Kwok Yip Cheung, Chee Seng Chan, Kuok Kei Law:
Integrating the adapted UTAUT model with moral obligation, trust and perceived risk to predict ChatGPT adoption for assessment support: A survey with students. Comput. Educ. Artif. Intell. 6: 100246 (2024) - Leiming Chen, Weishan Zhang, Cihao Dong, Ziling Huang, Yuming Nie, Zhaoxiang Hou, Sibo Qiao, Chee Wei Tan:
FedDRL: Trustworthy Federated Learning Model Fusion Method Based on Staged Reinforcement Learning. Comput. Informatics 43(1): 1-37 (2024) - Mirwan Ushada, Fitri Trapsilawati, Rosa Amalia, Nur Achmad Sulistyo Putro:
Modeling Trust Decision-Making of Indonesian Food and Beverage SME Groups in the Adoption of Industry 4.0. Cybern. Syst. 55(2): 534-550 (2024) - Runzhe Liang, Yueheng Han, Haoyang Hu, Bingzhen Chen, Zhihong Yuan, Lorenz T. Biegler:
Efficient trust region filter modeling strategies for computationally expensive black-box optimization. Comput. Chem. Eng. 189: 108816 (2024) - Abin Oommen Philip, M. U. Sreeja, Rosebell Paul, R. K. K. Saravanaguru:
Towards intelligent trust-based incident and evidence management models for Internet of Vehicles: A survey. Comput. Electr. Eng. 117: 109284 (2024) - Junshu Ma, Shumin Gao, Peng Wang, Yongfang Liu:
High level of self-disclosure on SNSs facilitates cooperation: A serial mediation model of psychological distance and trust. Comput. Hum. Behav. 150: 107976 (2024) - Mohd Akbar, Mohammed Mujtaba Waseem, Syeda Husna Mehanoor, Praveen Barmavatu:
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. Clust. Comput. 27(7): 9091-9105 (2024) - Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection. Comput. Networks 250: 110606 (2024) - Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - Vincent Frey, Julian Martinez:
Interpersonal trust modelling through multi-agent Reinforcement Learning. Cogn. Syst. Res. 83: 101157 (2024)
skipping 3,791 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 13:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint