Trust Prediction Modeling Based on Social Theories
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [27]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    With the pervasion of social media, trust, as the basis of human interactions, has been playing an important role in addressing information sharing, experience communication, and public opinions. However, trust is a complex and abstract concept influenced by many factors, and it is difficult to identify the inducing factors and analyze the formation mechanism. Recognizing that social theories from social sciences are helpful to explain social phenomena, and social networks reflect user correlations in real world, this paper investigatethes trust prediction problem from the perspective of social science, and constructs trust prediction model by studying the disciplines of trust relations occurring and developing based on social status theory and homophily theory. Firstly, it gives a brief introduction to social status theory and homophily theory, and verifies the existence of social status theory and homophily theory in social networks. Then, it proposes social status regularization and homophily regularization according to the effects of social status theory and homophily theory in predicting trust relations. Lastly, it models trust prediction by incorporating non-negative matrix tri-factorization, social status theory and homophily theory, and establishes trust prediction model SocialTrust. Experimental results demonstratethe effectiveness of the proposed method in trust prediction with a higher accuracy than other baseline methods.

    Reference
    [1] Mayayise T, Olusegun OI. E-Commerce assurance models and trustworthiness issues: An empirical study. Journal of Information Management & Computer Security, 2014,22(1):76-96. [doi: 10.1108/IMCS-01-2013-0001]
    [2] Zhang J, Cohen R. A framework for trust modeling in multiagent electronic marketplaces with buying advisors to consider varying seller behavior and the limiting of seller bids. ACM Trans. on Intelligent Systems and Technology (TIST), 2013,4(2):1-33. [doi: 10.1145/2438653.2438659]
    [3] Hoogendoorn M, Jaffry SW, van Maanen PP, Treur J. Design and validation of a relative trust model. Knowledge-Based Systems (KBS), 2014,57:81-94. [doi: 10.1016/j.knosys.2013.12.012]
    [4] Kennedy WG, Krueger F. Building a cognitive model of social trust within ACT-R. In: Proc. of the AAAI Conf. on Artificial Intelligence (AAAI). Palo Alto: AI Access Foundation, 2013. 29-34.
    [5] Ivanov I, Vajda P, Korshunov P, Ebrahimi T. Comparative study of trust modeling for automatic landmark tagging. IEEE Trans. on Information Forensics and Security (TIFS), 2013,8(6):911-923. [doi: 10.1109/TIFS.2013.2242889]
    [6] Liu YH, Sun Y, Liu SY, Kot AC. Securing online reputation systems through trust modeling and temporal analysis. IEEE Trans. on Information Forensics and Security (TIFS), 2013,8(6):936-948. [doi: 10.1109/TIFS.2013.2238929]
    [7] Kuter U, Golbeck J. Using probabilistic confidence models for trust inference in Web-based social networks. ACM Trans. on Internet Technology, 2010,10(2):1-23. [doi: 10.1145/1754393.1754397]
    [8] Tang J, Lou TC, Kleinberg J. Inferring social ties across heterogeneous networks. In: Proc. of the 5th ACM Int'l Conf. on Web Search and Data Mining (WSDM). Seattle: Association for Computing Machinery, 2012. 743-752. [doi: 10.1145/2124295. 2124382]
    [9] Rettinger A, Nickles M, Tresp V. Statistical relational learning of trust. Machine Learning, 2011,82(2):191-209. [doi: 10.1007/ s10994-010-5211-x]
    [10] Hamed K, Bashah IN, Jamalul-lail AM. A unified trust model for pervasive environments-simulation and analysis. KSII Trans. on Internet & Information Systems, 2013,7(7):1569-1584. [doi: 10.3837/tiis.2013.07.003]
    [11] Lee MKO, Efraim T. A trust model for consumer Internet shopping. Int'l Journal of Electronic Commerce, 2001,6(1):75-92.
    [12] Surya N, Paris C, Bista SK, Sherchan W. A trust model based analysis of social networks. Int'l Journal of Trust Management in Computing and Communications, 2013,1(1):3-22.
    [13] Liu HF, Lim EP, Lauw HW, Le MT, Sun AX, Srivastava J, Kim YA. Predicting trusts among users of online communities: An epinions case study. In: Proc. of the 9th ACM Conf. on Electronic Commerce. Chicago: Association for Computing Machinery, 2008. 310-319. [doi: 10.1145/1386790.1386838]
    [14] Kiyana Z, Abdollah A. A syntactical approach for interpersonal trust prediction in social Web applications: Combining contextual and structural data. Knowledge-Based Systems (KBS), 2012,26:93-102. [doi: 10.1016/j.knosys.2010.10.007]
    [15] Borzymek P, Sydow M, Wierzbicki A. Enriching trust prediction model in social network with user rating similarity. In: Proc. of the Int'l Conf. on Computational Aspects of Social Networks. Fontainbleu: IEEE Computer Society, 2009. 40-47. [doi: 10.1109/ CASoN.2009.30]
    [16] Xiang RJ, Neville J, Rogati M. Modeling relationship strength in online social networks. In: Proc. of the Int'l Conf. on World Wide Web (WWW). Raleigh: Association for Computing Machinery, 2010. 981-990. [doi: 10.1145/1772690.1772790]
    [17] Liu GF, Wang Y, Orgun MA. Social context-aware trust network discovery in complex contextual social networks. In: Proc. of the AAAI Conf. on Artificial Intelligence (AAAI). Toronto: AI Access Foundation, 2012. 101-107.
    [18] Huang J, Nie F, Huang H, Lei Y, Ding C. Social trust prediction using rank-k matrix recovery. In: Proc. of the Int'l Joint Conf. on Artificial Intelligence (IJCAI). Beijing: Int'l Joint Conf. on Artificial Intelligence, 2013. 2647-2653.
    [19] Tang JL, Gao HJ, Hu X, Liu H. Exploiting homophily effect for trust prediction. In: Proc. of the Int'l Conf. on Web Search and Data Mining (WSDM). Rome: Association for Computing Machinery, 2013. 53-62. [doi: 10.1145/2433396.2433405]
    [20] Tang JL, Gao HJ, Liu H. mTrust: Discerning multi-faceted trust in a connected world. In: Proc. of the Int'l Conf. on Web Search and Data Mining (WSDM). Seattle: Association for Computing Machinery, 2012. 93-102. [doi: 10.1145/2124295.2124309]
    [21] Fang H, Bao Y, Zhang J. Leveraging decomposed trust in probabilistic matrix factorization for effective recommendation. In: Proc. of the Int'l Joint Conf. on Artificial Intelligence (AAAI). Quebec: Association for the Advancement of Artificial Intelligence, 2014. 30-36.
    [22] Leskovec J, Huttenlocher D, Kleinberg J. Signed networks in social media. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems. Atlanta: Association for Computing Machinery, 2010. 1361-1370. [doi: 10.1145/1753326.1753532]
    [23] Lee DD, Seung HS. Learning the parts of objects by non-negative matrix factorization. Nature, 1999,401(6755):788-791. [doi: 10.1038/44565]
    [24] Huang J, Nie F, Huang H, Tu YC. Trust prediction via aggregating heterogeneous social networks. In: Proc. of the 21st ACM Int'l Conf. on Information and Knowledge Management. Maui: Association for Computing Machinery, 2012. 1774-1778. [doi: 10.1145/ 2396761.2398515]
    [25] Ye JJ. Constraint qualifications and KKT conditions for bilevel programming problems. Mathematics of Operations Research, 2006, 31(4):811-824. [doi: 10.1287/moor.1060.0219]
    [26] Lin CJ. Projected gradient methods for nonnegative matrix factorization. Neural Computation, 2007,19(10):2756-2779. [doi: 10.1162/neco.2007.19.10.2756]
    [27] Liben-Nowell D, Kleinberg J. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology, 2007,58(7):1019-1031. [doi: 10.1002/asi.20591]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

王英,王鑫,左万利.基于社会学理论的信任关系预测模型.软件学报,2014,25(12):2893-2904

Copy
Share
Article Metrics
  • Abstract:7202
  • PDF: 9205
  • HTML: 2570
  • Cited by: 0
History
  • Received:May 06,2014
  • Revised:August 21,2014
  • Online: December 04,2014
You are the first2034576Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063