Identifying vulnerabilities in trust and reputation systems
Authors: Taha D. Güneş, Long Tran-Thanh, Timothy J. Norman
IJCAI 2019 | Conference PDF | Archive PDF | Plain Text | LLM Run Details
| Reproducibility Variable | Result | LLM Response |
|---|---|---|
| Research Type | Experimental | In order to evaluate our model for identifying trust and reputation system vulnerabilities we provide a simulation environment, through which controlled experiments can be conducted for attacks focused on a target decision maker, δ. This simulation and analysis environment, along with implementations of the trust models used in this section, is freely available [Gunes et al., 2019]. |
| Researcher Affiliation | Academia | Taha D. Gunes , Long Tran-Thanh and Timothy J. Norman Electronics and Computer Science, University of Southampton, UK |
| Pseudocode | No | The paper describes methods and models but does not include any structured pseudocode or algorithm blocks. |
| Open Source Code | Yes | This simulation and analysis environment, along with implementations of the trust models used in this section, is freely available [Gunes et al., 2019]. (Referring to [Gunes et al., 2019] which links to https://doi.org/10.5258/SOTON/D0937, containing 'src.zip') |
| Open Datasets | Yes | Observations made by witnesses are drawn from Bernoulli distributions characterising the behaviour of each provider. The parameters of these Bernoulli distributions are drawn from either a Uniform distribution or a Dirichlet with all its parameters set to 20 to produce providers that behave in a similar manner. This simulation and analysis environment...is freely available [Gunes et al., 2019]. |
| Dataset Splits | No | The paper describes running 3000 different instances for each experimental condition with dynamically generated data, but it does not specify traditional training/validation/test dataset splits. |
| Hardware Specification | No | The paper mentions 'the use of IRIDIS HPC facility at the University of Southampton' but does not provide specific hardware details such as GPU or CPU models, or memory specifications. |
| Software Dependencies | No | The paper does not provide specific software dependencies with version numbers, only mentioning that implementations and the simulation environment are available. |
| Experiment Setup | Yes | Parameter Value Description |P| 20 The number of provider agents |W| 20 The number of witness agents s 2 The number of witnesses under the attacker’s control t 10 The number of provider observations made by each witness. ... We consider four experimental variables: the strategy used to search for attacks (MCS or HS); the connectivity between witnesses and providers (d); the power of the attacker (ρ); and the behaviour of witnesses (θci). Other parameters are fixed as specified in Table 1. |