Resource Type

Journal Article 12

Conference Videos 1

Year

2022 2

2019 2

2018 1

2017 3

2014 1

2012 1

2010 1

2008 1

open ︾

Keywords

Authority trust level 1

Chameleon hash function 1

Chinese physicians 1

Digital signature 1

Doppler shift 1

Double-authentication-preventing signatures 1

Dynamic grouping 1

Homophily effect 1

Interaction behaviors 1

Internet hospitals 1

Mobile P2P networks 1

Provable security 1

Secure connectivity 1

Sparse learning 1

Super peer 1

Trust management 1

Trust model 1

Trust network 1

Unmanned aerial vehicle networks (UAVNs) 1

open ︾

Search scope:

排序: Display mode:

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Frontiers of Medicine 2019, Volume 13, Issue 4,   Pages 504-510 doi: 10.1007/s11684-018-0666-4

Abstract: Studies examining the trends in public trust in physicians have provided a considerable amount of valuableThis study investigated changes in public trust in physicians in China based on two cross-sectional nationalThe results indicated 83.4% of respondents in 2011 reported trust or strong trust in physicians in ChinaThe results of ordinal logistic regression demonstrated that public trust in physicians in China hadThe findings of this study suggest that decreasing public trust in physicians deserves considerable attention

Keywords: trust in physicians     public trust     physician-patient relationship     health system performance    

Research of trust valuation based on cloud model

Lu Feng,Wu Huizhong

Strategic Study of CAE 2008, Volume 10, Issue 10,   Pages 84-90

Abstract:

At present, the existing descriptions of trust by trust valuation modelsthis problem, this paper discusses the co-existence and integration of fuzziness and randomness of trustcloud, a trust evaluation model based on cloud theory.This model provides the algorithms of trust information transfer and combination described by digitalCompared with traditional trust valuation models, trust values obtained in this model contains more semantic

Keywords: trust valuation     trust model     cloud model     cloud generator    

Building trust networks in the absence of trust relations Article

Xin WANG, Ying WANG, Jian-hua GUO

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1591-1600 doi: 10.1631/FITEE.1601341

Abstract: User-specified trust relations are often very sparse and dynamic, making them difficult to accuratelyIn addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networksIn this study, we investigate whether we can predict trust relations via a sparse learning model, andpropose to build a trust network without trust relations using only pervasively available interaction

Keywords: Trust network     Sparse learning     Homophily effect     Interaction behaviors    

Clinical decision-making by the emergency department resident physicians for critically ill patients

Tengda Xu, Jun Xu, Xuezhong Yu, Sui Ma, Zhong Wang

Frontiers of Medicine 2012, Volume 6, Issue 1,   Pages 89-93 doi: 10.1007/s11684-012-0183-9

Abstract: Pattern recognition and hypothetic-deductive methods were the most common techniques applied by emergency physicians

Keywords: clinical decision-making     emergency medicine     critically ill patient     resident     methodology    

Effectively cultivate the next generation of competent Chinese physicians: a perspective from a physician

Zongyu John CHEN,

Frontiers of Medicine 2010, Volume 4, Issue 4,   Pages 473-476 doi: 10.1007/s11684-010-0290-4

DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks Article

Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4,   Pages 559-569 doi: 10.1631/FITEE.1601535

Abstract: Trust management becomes an essential component of MP2P networks to promote peer transactions.Thus, it is difficult to establish long-term and effective trust relationships among peers.In this paper, we propose a dynamic grouping based trust model (DGTM) to classify peers.Within a group, mobile peers share resources and tend to keep stable trust relationships.(intragroup trust and intergroup trust).

Keywords: Mobile P2P networks     Trust management     Dynamic grouping     Super peer    

Delivering food safety

Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 1,   Pages 1-4 doi: 10.15302/J-FASE-2016123

Abstract: Systems and technology provide the necessary base, on which culture and then trust can be built to facilitate

Keywords: culture     food safety     systems     technology     trust    

Investigating the effect of online and offline reputation on the provision of online counseling services: A case study of the Internet hospitals in China

Frontiers of Engineering Management   Pages 563-576 doi: 10.1007/s42524-022-0198-0

Abstract: development of Internet hospitals and e-health platforms relies on the participation of patients and physicians, especially on the provision of health counseling services by physicians.The objective of our study is to explore the factors motivating Chinese physicians to provide onlineWe collect the data of 141029 physicians from 6173 offline hospitals located in 350 cities in China.online reputation and incorporate physicians’ offline professional status as physicians’ offline reputation

Keywords: Internet hospitals     physicians’ online counseling     online reputation     offline reputation    

Atypical manifestations of acute coronary syndrome — throat discomfort: a multi-center observational study

Frontiers of Medicine 2022, Volume 16, Issue 4,   Pages 651-658 doi: 10.1007/s11684-021-0859-0

Abstract: To present the clinical characteristics and the misdiagnosis rate of acute coronary syndrome manifested primarily as throat discomfort, we conducted a multicentric and retrospective study in the cardiology and otorhinolaryngology departments. Records of patients with primary complaint of throat discomfort, absence of chest pain at onset, and an ultimate diagnosis of acute coronary syndrome, as well as patients with pharyngitis (as controls) were collected from May 2015 to April 2016. The patients’ main manifestations were compared. Logistic regression results showed that chest tightness, dyspnea, perspiring, and exertional throat symptoms were significantly associated with acute coronary syndrome, with odds ratios of 8.3 (95% CI 2.2−31.5), 10.9 (95% CI 1.8−66.9), 25.4 (95% CI 3.6−179.9), and 81.2 (95% CI 13.0−506.7). A total of 25 (56.82%) out of 44 acute coronary syndrome patients, who were first admitted to the otorhinolaryngology department, were misdiagnosed, with a 12% (3/25) mortality rate. Throat discomfort can be the principal manifestation of acute coronary syndrome. Such patients exhibit high misdiagnosis and mortality rates. Exertional throat symptoms, chest tightness, perspiring, and dyspnea were important indicators of acute coronary syndrome in patients whose main complaint was throat discomfort. The awareness of this condition will result in prompt diagnosis and reduce morbidity and mortality.

Keywords: coronary syndrome (ACS)     throat discomfort (TD)     throat pain     cardiology departments     non-cardiologic physicians    

gum or patch treatment for smoking cessation and smoking reduction: a multi-centre study in Chinese physicians

Dan Xiao, Nanshan Zhong, Chunxue Bai, Qingyu Xiu, Canmao Xie, Dayi Hu, Yun Mao, Roland Perfekt, Elisabeth Kruse, Qing Li, John Jiangnan Liu, Chen Wang

Frontiers of Medicine 2014, Volume 8, Issue 1,   Pages 84-90 doi: 10.1007/s11684-014-0311-9

Abstract:

In China, around 23% of physicians (41% male, 3% female) currently smoke.

Keywords: nicotine replacement therapy     smoking cessation     Chinese physicians    

Secure connectivity analysis in unmanned aerial vehicle networks None

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 409-422 doi: 10.1631/FITEE.1700032

Abstract: In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility patternThe proposed trust model consists of four parts: direct trust section, indirect trust section, integratedtrust section, and trust update section.Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when thereis both a physical link and a trust link between two UAVs.

Keywords: Unmanned aerial vehicle networks (UAVNs)     Trust model     Secure connectivity     Doppler shift    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security     Authority trust    

Title Author Date Type Operation

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Journal Article

Research of trust valuation based on cloud model

Lu Feng,Wu Huizhong

Journal Article

Building trust networks in the absence of trust relations

Xin WANG, Ying WANG, Jian-hua GUO

Journal Article

Clinical decision-making by the emergency department resident physicians for critically ill patients

Tengda Xu, Jun Xu, Xuezhong Yu, Sui Ma, Zhong Wang

Journal Article

Effectively cultivate the next generation of competent Chinese physicians: a perspective from a physician

Zongyu John CHEN,

Journal Article

DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks

Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU

Journal Article

Delivering food safety

Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM

Journal Article

Investigating the effect of online and offline reputation on the provision of online counseling services: A case study of the Internet hospitals in China

Journal Article

Atypical manifestations of acute coronary syndrome — throat discomfort: a multi-center observational study

Journal Article

gum or patch treatment for smoking cessation and smoking reduction: a multi-centre study in Chinese physicians

Dan Xiao, Nanshan Zhong, Chunxue Bai, Qingyu Xiu, Canmao Xie, Dayi Hu, Yun Mao, Roland Perfekt, Elisabeth Kruse, Qing Li, John Jiangnan Liu, Chen Wang

Journal Article

Secure connectivity analysis in unmanned aerial vehicle networks

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

Interpretation of Global Engineering Frontier and Engineering Management Frontier - Research on Man-Machine Trust

6 Jan 2022

Conference Videos