97 research outputs found

    Credibility-based social network recommendation: Follow the leader

    Get PDF
    In Web-based social networks (WBSN), social trust relationships between users indicate the similarity of their needs and opinions. Trust can be used to make recommendations on the web because trust information enables the clustering of users based on their credibility which is an aggregation of expertise and trustworthiness. In this paper, we propose a new approach to making recommendations based on leaders' credibility in the "Follow the Leader" model as Top-N recommenders by incorporating social network information into user-based collaborative filtering. To demonstrate the feasibility and effectiveness of "Follow the Leader" as a new approach to making recommendations, first we develop a new analytical tool, Social Network Analysis Studio (SNAS), that captures real data and used it to verify the proposed model using the Epinions dataset. The empirical results demonstrate that our approach is a significantly innovative approach to making effective collaborative filtering based recommendations especially for cold start users. © 2010 Al-Sharawneh & Williams

    The state-of-the-art in personalized recommender systems for social networking

    Get PDF
    With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0

    Three Essays on Trust Mining in Online Social Networks

    Get PDF
    This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships. In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer understanding of trusting behaviors in online social networks. I introduce new behavioral antecedents of trusting behaviors and redefine and integrate existing graph-based concepts to develop the proposed conceptual model. The empirical findings indicate that both socio-psychological and graph-based trust-related factors should be considered in studying trust formation in online social networks. In the second essay, I propose a theory-based predictive model to predict trust and distrust links in online social networks. Previous trust prediction models used limited network structural data to predict future trust/distrust relationships, ignoring the underlying behavioral trust-inducing factors. I identify a comprehensive set of behavioral and structural predictors of trust/distrust links based on related theories, and then build multiple supervised classification models to predict trust/distrust links in online social networks. The empirical results confirm the superior fit and predictive performance of the proposed model over the baselines. In the third essay, I propose a lexicon-based text mining model to mine trust related user-generated content (UGC). This is the first theory-based text mining model to examine important factors in online trusting decisions from UGC. I build domain-specific trustworthiness lexicons for online social networks based on related behavioral foundations and text mining techniques. Next, I propose a lexicon-based text mining model that automatically extracts and classifies trustworthiness characteristics from trust reviews. The empirical evaluations show the superior performance of the proposed text mining system over the baselines

    ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH AUXILIARY INFORMATION IMPUTATION

    Get PDF
    This dissertation studies the factors that negatively impact the accuracy of the collaborative filtering recommendation systems based on nonnegative matrix factorization (NMF). The keystone in the recommendation system is the rating that expresses the user\u27s opinion about an item. One of the most significant issues in the recommendation systems is the lack of ratings. This issue is called cold-start issue, which appears clearly with New-Users who did not rate any item and New-Items, which did not receive any rating. The traditional recommendation systems assume that users are independent and identically distributed and ignore the connections among users whereas the recommendation actually is a social activity. This dissertation aims to enhance NMF-based recommendation systems by utilizing the imputation method and limiting the errors that are introduced in the system. External information such as trust network and item categories are incorporated into NMF-based recommendation systems through the imputation. The proposed approaches impute various subsets of the missing ratings. The subsets are defined based on the total number of the ratings of the user or item before the imputation, such as impute the missing ratings of New-Users, New-Items, or cold-start users or items that suffer from the lack of the ratings. In addition, several factors are analyzed that affect the prediction accuracy when the imputation method is utilized with NMF-based recommendation systems. These factors include the total number of the ratings of the user or item before the imputation, the total number of imputed ratings for each user and item, the average of imputed rating values, and the value of imputed rating values. In addition, several strategies are applied to select the subset of missing ratings for the imputation that lead to increasing the prediction accuracy and limiting the imputation error. Moreover, a comparison is conducted with some popular methods that are in common with the proposed method in utilizing the imputation to handle the lack of ratings, but they differ in the source of the imputed ratings. Experiments on different large-size datasets are conducted to examine the proposed approaches and analyze the effects of the imputation on accuracy. Users and items are divided into three groups based on the total number of the ratings before the imputation is applied and their recommendation accuracy is calculated. The results show that the imputation enhances the recommendation system by capacitating the system to recommend items to New-Users, introduce New-Items to users, and increase the accuracy of the cold-start users and items. However, the analyzed factors play important roles in the recommendation accuracy and limit the error that is introduced from the imputation

    Choosing reputable resources in unstructured peer-to-peer networks using trust overlays

    Get PDF
    In recent years Peer-to-Peer Systems have gained popularity, and are best known as a convenient way of sharing content. However, even though they have existed for a considerable length of time, no method has yet been developed to measure the quality of the service they provide nor to identify cases of misbehaviour by individual peers. This thesis attempts to give to P2P systems some quality measures with the potential of giving querying peers criteria by which to judge and make predictions about the behaviour of their counterparts. The work includes the design of a reputation system from which querying peers can seek guidance before they commit to transaction with another peer. but usually as Reputation and Recommender systems have existed for years centralized services. Our innovation is the use of a distributed recommendation system which will be supported by the peers themselves. The system operates in the same manner as "word-of-mouth" in human societies does. In contrast to other reputation systems the word-of-mouth technique is itself decentralized since there is no need for central entities to exist as long as there are participants willing to be involved in the recommendation process. In order for a society to exist it is necessary that members have some way of knowing each other so that they can form relationships. The main element used to link members in an online community together is a virtual trust relationship that can be identified from the evidence that exists about their virtual partnerships. In our work we approximate the level of trust that could exist between any two parties by exploiting their similarity, constructing a network that is known as "web of trust". Using the transitivity property of trust, we make it possible for more peers to come in to contact through virtual trust relationships and thus get better results than in an ordinary system.EThOS - Electronic Theses Online ServiceGreek State Scholarships FoundationGBUnited Kingdo

    Study on Directed Trust Graph Based Recommendation for E-commerce System

    Get PDF
    Automated recommender systems have played a more and more important role in marketing and ever increasingly booming e-commerce systems. They provide useful predictions personalized recommendations according to customers’ characteristics and a variety of large and complex product offerings. In many of these recommendation technologies Collaborative Filtering (CF) has proven to be one of the most successful recommendation method, which has been widely used in many e-commerce systems. The success of CF recommendation depends mainly on locating similar neighbors to get recommendation items. However, many scholars have found that the process of finding similar neighbors often fail, due to some inherent weaknesses of CF based recommendation. In view of this, we propose a trust feedback recommendation algorithm based on directed trust graph (DTG), which is able to propagate trust relationship. In our approach, there is no need to compute similarity between users, but utilize the trust relation between them to conduct prediction calculation. Based on the analysis of human trust perception, we incorporate the process into our recommendation algorithm. Experimental evaluation on real life Epinions datasets shows that the effectiveness and practicability of our approach

    Improving accuracy of recommender systems through triadic closure

    Get PDF
    The exponential growth of social media services led to the information overload problem which information filtering and recommender systems deal by exploiting various techniques. One popular technique for making recommendations is based on trust statements between users in a social network. Yet explicit trust statements are usually very sparse leading to the need for expanding the trust networks by inferring new trust relationships. Existing methods exploit the propagation property of trust to expand the existing trust networks; however, their performance is strongly affected by the density of the trust network. Nevertheless, the utilisation of existing trust networks can model the users’ relationships, enabling the inference of new connections. The current study advances the existing methods and techniques on developing a trust-based recommender system proposing a novel method to infer trust relationships and to achieve a fully-expanded trust network. In other words, the current study proposes a novel, effective and efficient approach to deal with the information overload by expanding existing trust networks so as to increase accuracy in recommendation systems. More specifically, this study proposes a novel method to infer trust relationships, called TriadicClosure. The method is based on the homophily phenomenon of social networks and, more specifically, on the triadic closure mechanism, which is a fundamental mechanism of link formation in social networks via which communities emerge naturally, especially when the network is very sparse. Additionally, a method called JaccardCoefficient is proposed to calculate the trust weight of the inferred relationships based on the Jaccard Cofficient similarity measure. Both the proposed methods exploit structural information of the trust graph to infer and calculate the trust value. Experimental results on real-world datasets demonstrate that the TriadicClosure method outperforms the existing state-of-the-art methods by substantially improving prediction accuracy and coverage of recommendations. Moreover, the method improves the performance of the examined state-of-the-art methods in terms of accuracy and coverage when combined with them. On the other hand, the JaccardCoefficient method for calculating the weight of the inferred trust relationships did not produce stable results, with the majority showing negative impact on the performance, for both accuracy and coverage

    A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things

    Get PDF
    L'internet des Objets (IoT) est un paradigme qui a rendu les objets du quotidien, intelligents en leur offrant la possibilité de se connecter à Internet, de communiquer et d'interagir. L'intégration de la composante sociale dans l'IoT a donné naissance à l'Internet des Objets Social (SIoT), qui a permis de surmonter diverse problématiques telles que l'interopérabilité et la découverte de ressources. Dans ce type d'environnement, les participants rivalisent afin d'offrir une variété de services attrayants. Certains d'entre eux ont recours à des comportements malveillants afin de propager des services de mauvaise qualité. Ils lancent des attaques, dites de confiance, et brisent les fonctionnalités de base du système. Plusieurs travaux de la littérature ont abordé ce problème et ont proposé différents modèles de confiance. La majorité d'entre eux ont tenté de réappliquer des modèles de confiance conçus pour les réseaux sociaux ou les réseaux pair-à-pair. Malgré les similitudes entre ces types de réseaux, les réseaux SIoT présentent des particularités spécifiques. Dans les SIoT, nous avons différents types d'entités qui collaborent, à savoir des humains, des dispositifs et des services. Les dispositifs peuvent présenter des capacités de calcul et de stockage très limitées et leur nombre peut atteindre des millions. Le réseau qui en résulte est complexe et très dynamique et les répercussions des attaques de confiance peuvent être plus importantes. Nous proposons un nouveau modèle de confiance, multidimensionnel, dynamique et scalable, spécifiquement conçu pour les environnements SIoT. Nous proposons, en premier lieu, des facteurs permettant de décrire le comportement des trois types de nœuds impliqués dans les réseaux SIoT et de quantifier le degré de confiance selon les trois dimensions de confiance résultantes. Nous proposons, ensuite, une méthode d'agrégation basée sur l'apprentissage automatique et l'apprentissage profond qui permet d'une part d'agréger les facteurs proposés pour obtenir un score de confiance permettant de classer les nœuds, mais aussi de détecter les types d'attaques de confiance et de les contrer. Nous proposons, ensuite, une méthode de propagation hybride qui permet de diffuser les valeurs de confiance dans le réseau, tout en remédiant aux inconvénients des méthodes centralisée et distribuée. Cette méthode permet d'une part d'assurer la scalabilité et le dynamisme et d'autre part, de minimiser la consommation des ressources. Les expérimentations appliquées sur des de données synthétiques nous ont permis de valider le modèle proposé.The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
    corecore