{"id":"https://openalex.org/W4416010676","doi":"https://doi.org/10.1109/tsc.2025.3630208","title":"Non-Subjective Trust Mechanism for Online Ride-Hailing Services","display_name":"Non-Subjective Trust Mechanism for Online Ride-Hailing Services","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4416010676","doi":"https://doi.org/10.1109/tsc.2025.3630208"},"language":null,"primary_location":{"id":"doi:10.1109/tsc.2025.3630208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3630208","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057412480","display_name":"Wei Tong","orcid":"https://orcid.org/0000-0002-6339-6722"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Tong","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-6339-6722","affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524","https://openalex.org/I168879160"]},{"raw_affiliation_string":"School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066750506","display_name":"Xuewen Dong","orcid":"https://orcid.org/0000-0001-5745-0545"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuewen Dong","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0001-5745-0545","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0519-9058","affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524","https://openalex.org/I168879160"]},{"raw_affiliation_string":"School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science &#x0026; Technology, Xidian University, Xi&#x2019;an, China","School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-8448-705X","affiliations":[{"raw_affiliation_string":"School of Computer Science &#x0026; Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113077687","display_name":"Zesong Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zesong Dong","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057412480"],"corresponding_institution_ids":["https://openalex.org/I1328775524","https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3441575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":"530","last_page":"544"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11942","display_name":"Transportation and Mobility Innovations","score":0.6611999869346619,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11942","display_name":"Transportation and Mobility Innovations","score":0.6611999869346619,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.23989999294281006,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.010400000028312206,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6739000082015991},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6229000091552734},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6055999994277954},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5404999852180481},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5404999852180481},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.5335999727249146},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.5309000015258789},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4934999942779541},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.45879998803138733},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.45719999074935913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8241000175476074},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6739000082015991},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6229000091552734},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6055999994277954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5526999831199646},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5404999852180481},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5404999852180481},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.5335999727249146},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.5309000015258789},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4934999942779541},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.45879998803138733},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.45719999074935913},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44530001282691956},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.43790000677108765},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.3874000012874603},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3871000111103058},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.3797999918460846},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C113839178","wikidata":"https://www.wikidata.org/wiki/Q7631418","display_name":"Subjective logic","level":3,"score":0.3393999934196472},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.31709998846054077},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3003999888896942},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.27160000801086426},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2711000144481659},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.26919999718666077},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.2515000104904175},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3630208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3630208","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2405502826","display_name":null,"funder_award_id":"ZDRC2202","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4295723053","display_name":null,"funder_award_id":"62402359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5767509517","display_name":null,"funder_award_id":"62220106004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1966731635","https://openalex.org/W2098290658","https://openalex.org/W2112138431","https://openalex.org/W2139051901","https://openalex.org/W2147880780","https://openalex.org/W2342658046","https://openalex.org/W2768174108","https://openalex.org/W2790664081","https://openalex.org/W2896441985","https://openalex.org/W2902423412","https://openalex.org/W2905257503","https://openalex.org/W2926987861","https://openalex.org/W2949915933","https://openalex.org/W2955344300","https://openalex.org/W2975193823","https://openalex.org/W2994992323","https://openalex.org/W3084991560","https://openalex.org/W3153812903","https://openalex.org/W3180989825","https://openalex.org/W3196839073","https://openalex.org/W3204774023","https://openalex.org/W3210519244","https://openalex.org/W3217440957","https://openalex.org/W4207044300","https://openalex.org/W4285818103","https://openalex.org/W4385380674","https://openalex.org/W4385453606","https://openalex.org/W4403420977"],"related_works":[],"abstract_inverted_index":{"Online":[0],"ride-hailing":[1],"services":[2],"(ORHS)":[3],"are":[4,41,199],"changing":[5],"the":[6,69,75,82,98,107,112,119,127,131,135,159,170,186],"travel":[7],"mode.":[8],"The":[9,27],"quality":[10,29,83],"evaluation":[11,30,51,65,178],"of":[12,32,77,84,102,111,130,138,172,177],"ORHS":[13,33,61],"is":[14,146,193],"essential":[15],"to":[16,43,62,80,96,124,148],"regulate":[17],"driver":[18],"behavior":[19],"and":[20,109,134,154,166,168,175,182,195],"guide":[21],"passengers":[22],"in":[23,49,158],"choosing":[24],"good":[25],"services.":[26],"existing":[28,64],"methods":[31],"rely":[34],"on":[35],"subjective":[36],"passenger":[37],"feedback,":[38,47],"while":[39],"they":[40],"susceptible":[42],"malicious":[44],"or":[45],"paranoid":[46],"resulting":[48],"untrustworthy":[50],"results.":[52,114,179],"This":[53,115],"paper":[54],"proposes":[55],"a":[56,94,144],"non-subjective":[57,78,99,139],"trust":[58,70,79,100,140,155,187],"mechanism":[59,73,116,192],"for":[60],"supplement":[63],"methods.":[66],"Inspired":[67],"by":[68,91,190],"machine,":[71],"this":[72,191],"defines":[74],"concept":[76],"measure":[81],"ORHS.":[85],"It":[86,161],"uses":[87],"trajectory":[88,132,150],"data":[89,133,151,174],"collected":[90],"infrastructure":[92],"as":[93],"parameter":[95],"calculate":[97],"value":[101,188],"ORHS,":[103],"which":[104],"can":[105],"ensure":[106,125],"trustworthiness":[108],"authenticity":[110],"calculation":[113,137],"also":[117],"improves":[118],"CKKS":[120],"homomorphic":[121],"encryption":[122],"algorithm":[123],"both":[126],"privacy":[128],"protection":[129],"effective":[136],"values.":[141],"In":[142],"addition,":[143],"blockchain":[145],"adopted":[147],"store":[149],"cipher":[152],"text":[153],"values":[156],"plaintext":[157],"infrastructure.":[160],"promotes":[162],"its":[163,196],"flexible":[164],"management":[165],"use":[167],"ensures":[169],"security":[171],"original":[173],"traceability":[176],"Theoretical":[180],"analysis":[181],"experiments":[183],"show":[184],"that":[185],"calculated":[189],"trustworthy,":[194],"time":[197],"costs":[198],"feasible.":[200]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-07T00:00:00"}
