TrustGNN: Graph Neural Network-Based Trust Evaluation via Learnable Propagative and Composable Nature

被引:14
作者
Huo, Cuiying [1 ]
He, Dongxiao [1 ]
Liang, Chundong [1 ]
Jin, Di [1 ]
Qiu, Tie [1 ]
Wu, Lingfei [2 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[2] Pinterest, Content & Knowledge Graph Grp, New York, NY 10018 USA
基金
中国国家自然科学基金;
关键词
Social networking (online); Task analysis; Knowledge graphs; Graph neural networks; Wireless sensor networks; Learning systems; Computational modeling; Graph neural networks (GNNs); social networks; social trust evaluation; trust chains;
D O I
10.1109/TNNLS.2023.3275634
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trust evaluation is critical for many applications such as cyber security, social communication, and recommender systems. Users and trust relationships among them can be seen as a graph. Graph neural networks (GNNs) show their powerful ability for analyzing graph-structural data. Very recently, existing work attempted to introduce the attributes and asymmetry of edges into GNNs for trust evaluation, while failed to capture some essential properties (e.g., the propagative and composable nature) of trust graphs. In this work, we propose a new GNN-based trust evaluation method named TrustGNN, which integrates smartly the propagative and composable nature of trust graphs into a GNN framework for better trust evaluation. Specifically, TrustGNN designs specific propagative patterns for different propagative processes of trust, and distinguishes the contribution of different propagative processes to create new trust. Thus, TrustGNN can learn comprehensive node embeddings and predict trust relationships based on these embeddings. Experiments on some widely-used real-world datasets indicate that TrustGNN significantly outperforms the state-of-the-art methods. We further perform analytical experiments to demonstrate the effectiveness of the key designs in TrustGNN.
引用
收藏
页码:14205 / 14217
页数:13
相关论文
共 62 条
[1]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[2]   User trustworthiness in online social networks: A systematic review [J].
Alkhamees, Majed ;
Alsaleem, Saleh ;
Al-Qurishi, Muhammad ;
Al-Rubaian, Majed ;
Hussain, Amir .
APPLIED SOFT COMPUTING, 2021, 103
[3]  
Almogbel Razan Saleh, 2022, International Journal of Interactive Mobile Technologies, V16, P38, DOI [10.3991/ijim.v16i01.27763, 10.3991/ijim.v16i01.27763]
[4]   A Fuzzy Logic Trust Model for Secure Routing in Smart Grid Networks [J].
Alnasser, Aljawharah ;
Sun, Hongjian .
IEEE ACCESS, 2017, 5 :17896-17903
[5]   A 61-million-person experiment in social influence and political mobilization [J].
Bond, Robert M. ;
Fariss, Christopher J. ;
Jones, Jason J. ;
Kramer, Adamd. I. ;
Marlow, Cameron ;
Settle, Jaime E. ;
Fowler, James H. .
NATURE, 2012, 489 (7415) :295-298
[6]  
Bordes A., 2013, P 26 INT C NEURAL IN, P2787
[7]  
Bruna J., 2013, SPECTRAL NETWORKS LO
[8]   Multi-level Graph Convolutional Networks for Cross-platform Anchor Link Prediction [J].
Chen, Hongxu ;
Yin, Hongzhi ;
Sun, Xiangguo ;
Chen, Tong ;
Gabrys, Bogdan ;
Musial, Katarzyna .
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, :1503-1511
[9]  
Chen Yu, 2020, INT C LEARNING REPRE, P26
[10]  
Chen Zhao-Min, 2019, PROC CVPR IEEE, P5172, DOI [DOI 10.1109/CVPR.2019.00532, 10.1109/CVPR.2019.00532]