[1]. Fatehi, H.S.Shahhoseini, J.Wei, C.T.Chang, "An automata algorithm for generating trusted graphs in online social networks." Applied Soft Computing 118 : 108475, 2022.
[2]. Xu, Z.Feng, X.Zhou, M.Xing, H.Wu, X.Xue, L.Qi, “Attention-based neural networks for trust evaluation in online social networks”, Information Sciences, 630, pp.507-522, 2023.
[3]. Fatehi, H.Shahhoseini, ”A hybrid algorithm for evaluating trust in online social networks”, in: 2020 10th International Conference on Computer and Knowledge Engineering, ICCKE(IEEE), pp.158–162, 2020.
[4]. Shakeri, A.Ghaemi Bafghi, “A Layer Model of a Confidence-aware Trust Management System”, International Journal of Information Science and Intelligent System, Vol. 3, pp. 73-90, 2014.
[5]. Alamir, N.Jafari, “Trust Management by Quality of Service & History of Contact in Social Networks”, EFTA, Vol.8, pp.53-66, 2013.
[6]. Cholvy, "A Trust Model in the Logical Belief Function Theory", Journal of Applied Logic 13, no. 4, 441-457, 2015.
[7]. Zhang, S.Zhu, J.Tang, N.Xiong, “A Novel Trust Management Scheme Based on Dempster–Shafer Evidence Theory for Malicious Nodes Detection in Wireless Sensor Networks”, Springer, Volume 74, Issue 4, pp 1779–1801, 2018.
[8]. Zolfaghar, A.Aghaie, “Evolution Of trust Networks in Social Web Applications Using Supervised Learning”, Elsevier Procedia Computer Science, Vol. 3, pp. 833-839, 2011.
[9]. Jiang, G.Wang, J.Wu, “Generating Trusted Graphs for Trust Evaluation in Online Social Networks”, Future generation computer systems 31, pp.48-58. Elsevier, 2014.
[10] Mahajan, Z.Guo, J.H.Cho, I.R.Chen,“Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social Networks”, 2023.
[11] بهشید شایسته، وصال حکمی، سید اکبر مصطفوی، احمد اکبری ازیرانی، «ارائه روشی نوین برای محاسبه اعتماد در کاربردهای اینترنت اشیا»، مجله مهندسی برق دانشگاه تبریز، جلد ۵۰، شماره ۲، صفحات ۷۴۳-۷۵۵، ۱۳۹۹.
[12] مریم فیاض، حامد وحدت نژاد، مهدی خرد، «استنتاج اعتماد در شبکههای اجتماعی با ترکیب شبکه عصبی و الگوریتم ژنتیک»، مجله مهندسی برق دانشگاه تبریز، جلد ۵۰، شماره ۱، صفحات ۳۳۱-۳۴۰، ۱۳۹۹.
[13] Qiu, L.Zhang,S.Wang, “A Trust Transitivity Model Based-on Dempster-Shafer Theory”, Journal of Networks,Vol. 5, No. 9, 2010.
[14] VS, M.MSK, “Efficient trust management with Bayesian Evidence theorem to secure public key infrastructure-based mobile ad hoc networks”, EURASIP Journal on Wireless Communications and Networking, pp.1-27, 2018.
[15] Abdelghani, I.Amous, C.A.Zayani, F.Sèdes, G.Roman-Jimenez, "Dynamic and scalable multi-level trust management model for Social Internet of Things".The Journal of Supercomputing, 78(6), 8137-8193, 2022.
[16] Amiri-Zarandi, R.A.Dara, E.Fraser, “LBTM: A lightweight blockchain-based trust management system for social internet of things”. The Journal of Supercomputing, pp.1-19, 2022.
[17] Ma, “Towards Effective Genetic Trust Evaluation in Open Network”, IEEE 20th International Conference on High Performance Computing and Communications, 2018.
[18] Ahmadian, M.Afsharchi, M. Meghdadi, "an effective social recommendation method based on user reputation model and rating profile enhancement." Journal of Information Science, pp. 1–36, 2018.
[19] Mo, T.Wang, S.Zhang, J.Zhang, “An active and verifiable trust evaluation approach for edge, computing”, Journal of Cloud computing Advances, Systems and Applications, pp.1-19, 2020.
[20] U.Nasir, T.H.Kim, “Trust Computation in Online Social Networks Using Co-Citation and Transpose Trust Propagation”, IEEE Access, Vol 8, pp.41362-41371, 2020.
[21] Wang, X.Tong, “Trust Prediction Based on Extreme Learning Machine and Asymmetric Tri-Training”, IEEE Access, pp.64358-64367, Vol 9, 2021.
[22] Saeidi, "A new model for calculating the maximum trust in Online Social Networks and solving by Artifcial Bee Colony algorithm." Computational Social Networks, Vol 7, No, 3, 2020.
[23] Wu, L.Tian, Y.Zhang, Z.Wang, “Web User Trust Evaluation: A Novel Approach Using Fuzzy Petri Net and Behavior Analysis”, MDPI, Symmetry Journal, No 13, p.1487, 2021.
[24] Zhang, J.Li, Q.Sun, A.Zhou, “A Comprehensive and Efficient Trust Evaluation Framework for Distributed Networks”, Journal of Internet Technology, Vol.19, No.7, 2018.
[25] Dubois, H.Prade, “Rough fuzzy sets and fuzzy rough sets”, International Journal of General System, 17(2-3), 191-209, 1990.
[26] Zadeh, “Fuzzy sets”. Information Control, PP.338–353, 1965.
[27] Pawlak, ” Rough sets”, International journal of computer & information sciences, 11, pp.341-356, 1982.
[28] Verbiest, C.Cornelis, F.Herrera, “FRPS: a fuzzy rough prototype selection method”, Pattern Recognit, no.10, pp.2770–2782, 2013.
[29] G.Liu, J. Dezert, Q.Pan, G.Mercier, “Combination of sources of evidence with different discounting factors based on a new dissimilarity measure”. Decis Support Syst NO.52(1),PP.133–141, 2011.
[30] Liu, Q.Pan, J.Dezert, G.Mercier, “Credal c-means clustering method based on belief functions”. Knowl Based Syst 74, PP.119–132, 2015.
[31] G.Liu, Q.Pan, J.Dezert, A. Martin, “Adaptive imputation of missing values for incomplete pattern classification”. Pattern Recognit 52:85–95,2016.