請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47024完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 陳光禎(Kwang-Cheng Chen) | |
| dc.contributor.author | Tzu-Yu Chuang | en |
| dc.contributor.author | 莊子由 | zh_TW |
| dc.date.accessioned | 2021-06-15T05:45:31Z | - |
| dc.date.available | 2020-08-23 | |
| dc.date.copyright | 2010-08-20 | |
| dc.date.issued | 2010 | |
| dc.date.submitted | 2010-08-19 | |
| dc.identifier.citation | [1] H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. New York: Springer, 1994.
[2] H. V. Poor and O. Hadjiliadis, Quickest Detection. New York: Cambridge University Press, 2009. [3] F. V. Redondo, Complex Social Networks. New York: Cambridage University Press, 2007. [4] L. Garton, C. Haythornthwaite, and B. Wellman, 'Studying on-line social networks,' in Doing Internet Research, S. Jones, Ed. Thousand Oaks ,CA: Sage,1999. [5] D. J.Watts and S. H. Strogatz, 'Collective dynamics of 'small-world' networks,' Nature, vol. 393, Jun. 1998. [6] R. Albert, H. Jeong, and A.-L. Barabasi, 'Diameter of the world-wide web,' Nature, vol. 401, Sep. 1999. [7] C. Castelfranchi and Y.-H. Tan, 'The role of trust and deception in virtual societies,' International Journal of Electronic Commerce, vol. 6, no. 3, 2002. [8] A. O'Cass and T. Fenech, 'Webretailing adoption: exploring the nature of internet users webretailing behaviour,' Journal of Retailing and Consumer Services, vol. 10, 2003. [9] P. Resnick and R. Zeckhauser, 'Trust among strangers in internet transactions: Empirical analysis of ebays reputation system,' Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, vol. 11, pp. 127-157, Nov. 2000. [10] E. H. Erikson, Childhood and Society. New York: Norton, 1950. [11] A. Baier, 'Trust and antitrust,' Ethics, vol. 96, no. 2, Jan. 1986. [12] J. S. Coleman, Fundations of Social Theory. Belknap, MA: Cambridge, 1990. [13] Z. Yan and S. Holtmanns, 'Trust modeling and management:from social trust to digital trust,' in Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. IGI Global, 2007. [14] D. Artz and Y. Gil, 'A survey of trust in computer science and the semantic web,' Journal of Web Semantics: Science, Services and Agents on the World Wide Web, vol. 5, pp. 58-71, 2007. [15] Y. Wang and J. Vassileva, 'Trust and reputation model in peer-to-peer networks,' in the Third International Conference on Peer-to-Peer Computing, 2003. [16] Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, 'Information theoretic framework of trust modeling and evaluation for ad hoc networks,' Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006. [17] G. Theodorakopoulos and J. S. Baras, 'Trust evaluation in ad-hoc networks,' in ACM Workshop on Wireless Security, Oct. 2004, pp. 1-10. [18] K. C. Chen, P. Y. Chen, N. Prasad, Y. C. Liang, and S. Sun, 'Trusted cognitive radio networking,' Wiley: Wireless Communications and Mobile Computing, 2009. [19] D. Acemoglu, M. Dahleh, I. Lobel, and A. E. Ozdaglar, 'Baysian learning in social networks,' NBER Working Paper, no. W14040, May 2008. [Online]. Available: http://ssrn.com/abstract=1139356 [20] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, 'Propagation of trust and distrust,' in the 13th Annual International World Wide Web Conference, 2003. [21] A. J sang, 'The beta reputation system,' in 15th Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Jun. 2002. [22] L. Mui, M. Mohtashemi, and A. Halberstadt, 'A computational model of trust and reputation,' in the 35th Hawaii International Conference on System Sciences, 2002. [23] R. T. Cox, 'Probability, frequency and reasonable expectation,' American Journal of Physics, vol. 14, Jan. 1946. [24] J. Y. Halpern, 'Cox's theorem revisited,' Journal of Arti cial Intelligence Re-search, vol. 11, pp. 429{435, Dec. 1999. [25] K. S. V. Horn, 'Constructing a logic of plausible inference: a guide to cox's theorem,' International Journal of Approximate Reasoning, vol. 34, pp. 3-24, 2003. [26] P. J. Carrington, J. Scott, and S.Wasserman, Models and methods in social network analysis. New York: Cambridge University Press, 2005. [27] K. C. Chen, B. K. Cetin, Y. C. Peng, N. Prasad, J. Wang, and S. Y. Lee, 'Routing for cognitive radio networks consisting of opportunistic links,' Wiley: Wireless Communications and Mobile Computing, 2009. [28] G. Cacella and R. L. Berger, Statistical Inference. Duxbury, 2002. [29] E. Geraniotis and Y. A. Chau, 'On minimax robust data fusion,' in 1988 Conference of Information Science System, Mar. 1988, pp. 354-360. [30] V. V. Veeravalli, T. Basar, and H. V. Poor, 'Minimax robust decentralized detection,' IEEE Transaction on Information Theory, vol. 40, no. 1, Jan. 1994. [31] S.-Y. Tu and K.-C. Chen, 'General spectrum sensing in cognitive radio networks,' CoRR, vol. abs/0907.2859, 2009. [32] (2010) Yahoo!r auction. [Online]. Available: http://tw.bid.yahoo.com/ | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47024 | - |
| dc.description.abstract | 在電子商務和其他網際網路的應用中,網際網路、甚至社交網路的使用者之間的信任關係有著重要的作用。然而,建立信任精確的數學模型,亦或在電子商務系統上以信任為基礎開發出的應用一直沒有得到令人滿意結果。在本文中,我們提出了一個以機率理論為基礎的框架,定量的描述信任為一數學推理量,進而模擬在電子商務系統中,消費者和銷售商的之間的信任行為模式。我們首先討論網際網路和社交網路上信任的性質。然後,我們構造電子商務系統的拓撲並應用統計推論得出更可靠的信任值。進而開發出一個可以有效抵抗惡意行為的賣家的可靠演算法。通過社交網絡上的學習及分散決策的概念,我們提出了可以保持信任估計的準確性且同時更好地防止潛在的惡意行為的演算法。模擬的結果顯現我們所提出的方案在電子商務中具有良好的估計準確度,在面臨的一個惡意用戶時能夠並保持強勁的性能水平。此外,以一個相當有系統的方式來討論從不同的網站收集來帶有不確定性的資訊的信任衡量。透過收集更多的資料,也提出一個連續檢測方法以提供更好的性能。模擬的結果也顯示在實際上運用研究結果與設計現實世界中的應用程式的可能性。 | zh_TW |
| dc.description.abstract | Trust among Internet users and thus social networks plays an important role in e-commerce and other Internet applications. However, the precise mathematical model of trust and thus applications based on trust in e-commerce system has not been satisfactorily established yet. In this paper, we present a probability theoretic framework to quantitatively measure trust as mathematical reasoning and to model the behaviors of consumers and sellers in the e-commerce system based on trust measure. We rst summarize properties of trust in Internet users and their social networking. Then we construct the topology of e-commerce system and apply the statistical inference to derive more reliable trust measure. A reliable algorithm, which is robust to malicious behaviors of the sellers, is therefore developed. Via social network learning, distributed decision is proposed to maintain the accuracy of trust estimation and to better against potential malicious behaviors. Simulations demonstrate that our proposed scheme shows good accuracy in estimation of confi dence level and retains robust performance facing a number of malicious users in the e-commerce system. Besides, trust measure with uncertain information, usually collecting from di erent websites, is develop in a systematic way. A sequential detection approach is also proposed to better o the decision performance by collecting more data. Simulations also show a possibility for practical application designing with real world data. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T05:45:31Z (GMT). No. of bitstreams: 1 ntu-99-R97942053-1.pdf: 1005394 bytes, checksum: 899bb407e5a5eefeb451c193e6795be5 (MD5) Previous issue date: 2010 | en |
| dc.description.tableofcontents | Acknowledgement i
Chinese Abstract ii Abstract iii Contents v List of Figures vii List of Tables viii 1 Introduction 1 1.1 Existing Social Networks Involving the Internet 1 1.2 Challenge in E-commerce 3 1.3 Related Work 4 1.4 Organization 5 2 Preliminary 6 2.1 Elements of Hypothesis Testing [1] 6 2.2 Sequential Detection [2] 8 2.2.1 Optimal Detection 8 2.2.2 Performance Analysis [2] 11 3 Property of Trust 13 3.1 Quantitative Description of Trust 13 3.2 Network Model 16 4 Trust with Certain Information 18 4.1 Trust Modeling 18 4.1.1 Probability of Information Flipping 19 4.1.2 Information Fusion 21 5 Trust with Uncertain Information 31 5.1 Comments Selection 31 5.2 Cooperative Decision 36 5.3 Sequential Analysis 39 6 Conclusions and Future Works 42 Bibliography 43 | |
| dc.language.iso | en | |
| dc.subject | 合作式通信 | zh_TW |
| dc.subject | 統計推論 | zh_TW |
| dc.subject | 社交網路 | zh_TW |
| dc.subject | 電子商務 | zh_TW |
| dc.subject | 信任 | zh_TW |
| dc.subject | 學習 | zh_TW |
| dc.subject | Trust | en |
| dc.subject | social network | en |
| dc.subject | learning | en |
| dc.subject | e-commerce | en |
| dc.subject | cooperative communication | en |
| dc.subject | statistical inference | en |
| dc.title | 在電子商務中透過資訊網路整合的信任模型 | zh_TW |
| dc.title | Trust with Information Networking in E-Commerce | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 98-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 林嘉慶,楊谷章,陳曉華,鄭士康 | |
| dc.subject.keyword | 信任,合作式通信,學習,電子商務,社交網路,統計推論, | zh_TW |
| dc.subject.keyword | Trust,cooperative communication,learning,e-commerce,social network,statistical inference, | en |
| dc.relation.page | 46 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2010-08-19 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-99-1.pdf 未授權公開取用 | 981.83 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
