Follow
Tim Muller
Tim Muller
University of Oxford
Verified email at ntu.edu.sg - Homepage
Title
Cited by
Cited by
Year
Towards robust and effective trust management for security: A survey
D Wang, T Muller, Y Liu, J Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
812014
On beta models with trust chains
T Muller, P Schweitzer
Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM …, 2013
292013
Using Information Theory to Improve the Robustness of Trust Systems.
D Wang, T Muller, AA Irissappane, J Zhang, Y Liu
AAMAS, 791-799, 2015
262015
Expressiveness modulo bisimilarity of regular expressions with parallel composition
JCM Baeten, B Luttik, T Muller, P Van Tilburg
Mathematical Structures in Computer Science 26 (6), 933-968, 2016
222016
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory
D Wang, T Muller, J Zhang, Y Liu
Proceedings of the 24th International Joint Conference on Artificial …, 2015
172015
On robustness of trust systems
T Muller, Y Liu, S Mauw, J Zhang
Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014
172014
Trust revision for conflicting sources
A Jøsang, M Ivanovska, T Muller
2015 18th International Conference on Information Fusion (Fusion), 550-557, 2015
162015
Semantics of trust
T Muller
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
132011
The fallacy of endogenous discounting of trust recommendations
T Muller, Y Liu, J Zhang
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
72015
Information theory for subjective logic
T Muller, D Wang, A Jøsang
Modeling Decisions for Artificial Intelligence: 12th International …, 2015
72015
A formal derivation of composite trust
T Muller, P Schweitzer
International Symposium on Foundations and Practice of Security, 132-148, 2012
72012
Information theoretical analysis of unfair rating attacks under subjectivity
D Wang, T Muller, J Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 15, 816-828, 2019
62019
Is It Harmful When Advisors Only Pretend to Be Honest?
D Wang, T Muller, J Zhang, Y Liu
30th AAAI Conference on Artificial Intelligence (AAAI), 2016
62016
The reputation lag attack
S Sirur, T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
52019
An unforeseen equivalence between uncertainty and entropy
T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
42019
The foul adversary: formal models
N Dong, T Muller
Formal Methods and Software Engineering: 20th International Conference on …, 2018
32018
How to use information theory to mitigate unfair rating attacks
T Muller, D Wang, Y Liu, J Zhang
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016
32016
Provably robust decisions based on potentially malicious sources of information
T Muller, D Wang, J Sun
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020
22020
A language for trust modelling
T Muller, J Zhang, Y Liu
Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary …, 2016
22016
Regulation, Policy and Cybersecurity: Hardware Security
V Benson, S Furnell, D Masi, T Muller
12021
The system can't perform the operation now. Try again later.
Articles 1–20