{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:33Z","timestamp":1750309413748,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,19]]},"DOI":"10.1145\/3674225.3674289","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T18:23:05Z","timestamp":1722450185000},"page":"357-363","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Method for Multi-Attribute Trust Assessment of Terminals in New Energy Power Plants"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7667-5309","authenticated-orcid":false,"given":"Hao","family":"Yang","sequence":"first","affiliation":[{"name":"State Grid Jiangxi Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3391-2762","authenticated-orcid":false,"given":"Jian","family":"Xu","sequence":"additional","affiliation":[{"name":"State Grid Jiangxi Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6830-9489","authenticated-orcid":false,"given":"Yongcai","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Grid Jiangxi Electric Power Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2150-0309","authenticated-orcid":false,"given":"Shenjian","family":"Qiu","sequence":"additional","affiliation":[{"name":"State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905550"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2674"},{"issue":"9","key":"e_1_3_2_1_3_1","first-page":"2354","volume":"28","author":"You J","year":"2017","unstructured":"You J, Shangguan J, Xu S, Distributed Dynamic Trust Management Model Based on Trust Reliability[J]. Journal of Software, 2017, 28(9):2354-2369.","journal-title":"Journal of Software"},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Survey on data security and privacy-preserving for the research of edge computing[J]","volume":"39","author":"Zhang J","year":"2018","unstructured":"Zhang J, Zhao Y, Chen B, Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018, 39(3):1-21.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Chen L Xu J. Socially trusted collaborative edge computing in ultra dense networks[C] \/\/ Proceedings of the second ACM\/IEEE symposium on edge computing. 2017: 1-11.","DOI":"10.1145\/3132211.3134451"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769878"},{"key":"e_1_3_2_1_7_1","volume-title":"Beijing University of Posts and Telecommunications","author":"Ma X.","year":"2019","unstructured":"Ma X. Research on trusted collaboration mechanism based on edge computing[D]. Beijing University of Posts and Telecommunications, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Trust evaluation model in edge computing based on integrated trust[C] \/\/ Proceedings of the 2018 International Conference on Algorithms","volume":"2018","author":"Ma X","unstructured":"Ma X, Li X. Trust evaluation model in edge computing based on integrated trust[C] \/\/ Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence. 2018: 1-6.","journal-title":"Computing and Artificial Intelligence."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831898"},{"issue":"4","key":"e_1_3_2_1_10_1","first-page":"23626","article-title":"IoT node trust comprehensive evaluation model[J]","volume":"46","author":"Xie L","year":"2019","unstructured":"Xie L, Wei R. IoT node trust comprehensive evaluation model[J]. Journal of Xidian University, 2019, 46(4):23626-23638.","journal-title":"Journal of Xidian University"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2952035"},{"issue":"5","key":"e_1_3_2_1_12_1","first-page":"8","article-title":"Trust system based on node behaviour detection in Internet of Things[J]","volume":"35","author":"Liu Y","year":"2014","unstructured":"Liu Y, Gong X, Feng Y. Trust system based on node behaviour detection in Internet of Things[J]. Journal on Communications, 2014, 35(5):8-15.","journal-title":"Journal on Communications"},{"issue":"7","key":"e_1_3_2_1_13_1","first-page":"197","article-title":"Trust evaluation model for distributed home photovoltaic collection scenarios in new power system[J]","volume":"44","author":"Li L","year":"2023","unstructured":"Li L, Wang X, Zhang Z, Trust evaluation model for distributed home photovoltaic collection scenarios in new power system[J]. Journal on Communications, 2023, 44(7):197-206.","journal-title":"Journal on Communications"},{"issue":"5","key":"e_1_3_2_1_14_1","first-page":"158","article-title":"Information entropy based multi-source power IoT terminal equipment trust degree evaluation method[J]","volume":"55","author":"Zhai F","year":"2020","unstructured":"Zhai F, Feng Y, Cheng K, Information entropy based multi-source power IoT terminal equipment trust degree evaluation method[J]. Electric Power, 2020, 55(5):158-165.","journal-title":"Electric Power"}],"event":{"name":"PEAI 2024: 2024 International Conference on Power Electronics and Artificial Intelligence","acronym":"PEAI 2024","location":"Xiamen China"},"container-title":["2024 International Conference on Power Electronics and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674225.3674289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674225.3674289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:14Z","timestamp":1750294694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674225.3674289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":14,"alternative-id":["10.1145\/3674225.3674289","10.1145\/3674225"],"URL":"https:\/\/doi.org\/10.1145\/3674225.3674289","relation":{},"subject":[],"published":{"date-parts":[[2024,1,19]]},"assertion":[{"value":"2024-07-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}