6 results on '"Shancang Li"'
Search Results
2. Robust Collaborative Filtering Recommendation With User-Item-Trust Records
- Author
-
Lianyong Qi, Fan Wang, Gautam Srivastava, Mohammad Reza Khosravi, Haibin Zhu, and Shancang Li
- Subjects
business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Recommender system ,Complex network ,Machine learning ,computer.software_genre ,Popularity ,Preference ,Human-Computer Interaction ,Data set ,Robustness (computer science) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Collaborative filtering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Social Sciences (miscellaneous) - Abstract
The ever-increasing popularity of recommendation systems allows users to find appropriate services without excessive effort. However, due to the unstable and complex network environment, the historical behavior data of users are quite sparse in most cases. The inherent drawbacks render preference prediction infeasible for cold-start users and have become a crucial issue to be resolved in recommendation systems. To deal with the problems, we first present a Trust-based Collaborative Filtering (TbCF) algorithm to perform basic rating prediction in a manner consistent with the existing CF methods. Then, we propose the Hybrid Collaborative Filtering Recommendation approach with User-Item-Trust Records (UIThybrid), a novel approach that incorporates user trust into the existing CF-based methods in a harmonious way to supplement rating information. UIThybrid employs multiple perspectives to extract proper services and achieves a good tradeoff between the robustness, accuracy, and diversity of the recommendation. We conduct extensive real-world experiments on the Epinions data set to demonstrate the feasibility and efficiency of UIThybrid.
- Published
- 2022
- Full Text
- View/download PDF
3. Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
- Author
-
Victor S. Sheng, Lianyong Qi, Surya Nepal, Shancang Li, Xuyun Zhang, Wenmin Lin, and Weimin Li
- Subjects
Service (business) ,Information privacy ,Computer science ,Process (engineering) ,Quality of service ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Recommender system ,computer.software_genre ,Human-Computer Interaction ,World Wide Web ,Information sensitivity ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Quality (business) ,Web service ,computer ,Social Sciences (miscellaneous) ,media_common - Abstract
With the ever-increasing maturity and popularization of the Internet of Things (IoT), tremendous business applications developed by distinct enterprises or organizations have been encapsulated into lightweight web services that can easily be accessed or invoked remotely. However, the big volume of candidate web services places a heavy burden on the users’ service selection decision-making process. Under the circumstance, a variety of intelligent recommendation solutions have been developed to reduce the high decision-making cost. Traditional resolutions usually challenge in two aspects. First, the recommendation parameters, i.e., the quality of services (QoS), usually relies on user/service location heavily; therefore, low-quality recommended results may be returned to users if user/service location information is overlooked. Second, historical QoS data often contain partial sensitive information of users; therefore, it becomes a necessity to protect the sensitive QoS data while making accurate recommendation decisions. To tackle the above challenges, we introduce the concepts of user/service location information and locality-sensitive hashing (LSH) in the domain and propose a location-aware recommendation approach with privacy-preservation capability. A wide range of experiments is set up based on the popular WS-DREAM data set, whose results prove the effectiveness and efficiency of our approach.
- Published
- 2021
- Full Text
- View/download PDF
4. Blockchain Enabled Industrial Internet of Things Technology
- Author
-
Yufeng Yao, Shancang Li, and Shanshan Zhao
- Subjects
Blockchain ,business.industry ,Computer science ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Human-Computer Interaction ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,Industrial systems ,Industrial Internet ,Internet of Things ,business ,computer ,Social Sciences (miscellaneous) - Abstract
The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past few years, many more applications in industrial IoT (IIoT) have emerged and the blockchain technologies have attracted huge amounts of attention from both industrial and academic researchers. In this paper, we address the integration of blockchain and IIoT from the industrial prospective. A blockchain-enabled IIoT framework is introduced and involved fundamental techniques are presented. Moreover, the main applications and key challenges are addressed. A comprehensive analysis for the most recent research trends and open issues is provided associated with the blockchain-enabled IIoT.
- Published
- 2019
- Full Text
- View/download PDF
5. Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT
- Author
-
Shancang Li, Jun Jason Zhang, Erwu Liu, Ramesh Ramadoss, Bill Buchanan, and Yong Yuan
- Subjects
Computer science ,business.industry ,Volume (computing) ,Online identity ,Trusted Computing ,Business model ,Computer security ,computer.software_genre ,Human-Computer Interaction ,Ask price ,Modeling and Simulation ,The Internet ,Architecture ,business ,Internet of Things ,computer ,Social Sciences (miscellaneous) - Abstract
The Internet of Things (IoT) is expected to connect a massive number of smart devices to the Internet. The existing centralized architecture for handling the huge volume of data created in the IoT is facing many research challenges, including security and privacy, trustworthiness, operational challenges, business models and the practical aspects, and legal and compliance issues. These challenges ask for new approaches to online identity, trustworthy transactions, and resilient networks.
- Published
- 2019
- Full Text
- View/download PDF
6. Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems
- Author
-
Geyong Min, Tao Qin, and Shancang Li
- Subjects
021110 strategic, defence & security studies ,Immutability ,Traceability ,Computer science ,business.industry ,Digital forensics ,0211 other engineering and technologies ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Audit ,Computer security ,computer.software_genre ,Transparency (behavior) ,Human-Computer Interaction ,Identification (information) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Resilience (network) ,business ,computer ,Social Sciences (miscellaneous) - Abstract
The decentralized nature of blockchain technologies can well match the needs of integrity and provenances of evidences collecting in digital forensics (DF) across jurisdictional borders. In this paper, a novel blockchain-based DF investigation framework in the Internet of Things (IoT) and social systems environment is proposed, which can provide proof of existence and privacy preservation for evidence items examination. To implement such features, we present a block-enabled forensics framework for IoT, namely, IoT forensic chain (IoTFC), which can offer forensic investigation with good authenticity, immutability, traceability, resilience, and distributed trust between evidential entitles as well as examiners. The IoTFC can deliver a guarantee of traceability and track provenance of evidence items. Details of evidence identification, preservation, analysis, and presentation will be recorded in chains of block. The IoTFC can increase trust of both evidence items and examiners by providing transparency of the audit train. The use case demonstrated the effectiveness of the proposed method.
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.