Strategies for predicting local trust based on trust propagation in social networks

被引:114
作者
Kim, Young Ae [2 ]
Song, Hee Seok [1 ]
机构
[1] Hannam Univ, Dept Management Informat Syst, Taejon, South Korea
[2] Univ Minnesota, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA
基金
新加坡国家研究基金会;
关键词
Trust propagation; Social network; Reinforcement Learning; Trust path; Level of trust; REPUTATION;
D O I
10.1016/j.knosys.2011.06.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trust plays a critical role in determining social interactions in both online and offline networks, and reduces information overload, uncertainties and risk from unreliable users. In a social network, even if two users are not directly connected, one user can still trust the other user if there exists at least one path between the two users through friendship networks. This is the result of trust propagation based on the transitivity property of trust, which is "A trusts B and B trusts C, so A will trust C". It is important to provide a trust inference model to find reliable trust paths from a source user to an unknown target user, and to systematically combine multiple trust paths leading to a target user. We propose strategies for estimating level of trust based on Reinforcement Learning, which is particularly well suited to predict a long-term goal (i.e. indirect trust value on long-distance user) with short-term reward (i.e. direct trust value between directly connected users). In other words, we compare and evaluate how the length of available trust paths and aggregation methods affects prediction accuracy and then propose the best strategy to maximize the prediction accuracy. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1360 / 1371
页数:12
相关论文
共 22 条
[1]   Can reputation migrate? On the propagation of reputation in multi-context communities [J].
Bagheri, Ebrahim ;
Zafarani, Reza ;
Barouni-Ebrahimi, M. .
KNOWLEDGE-BASED SYSTEMS, 2009, 22 (06) :410-420
[2]  
CHAWATHE Y, 2003, ACM SIGCOMM, P407
[3]  
ELLEY Y, 2001, 10 ANN NETW DISTR SY
[4]  
Gabor Z., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P197
[5]  
Golbeck J, 2004, LECT NOTES COMPUT SC, V3257, P116
[6]  
Golbeck J.A., 2005, COMPUTING APPL TRUST
[7]  
Guha R, 2004, 5TH WORLD WIRELESS CONGRESS, PROCEEDINGS, P340
[8]  
HUYNH TD, 2004, 7 INT WORKSH TRUST A
[9]  
JIANG H, 2005, 13 IEEE INT C NETW P, P122
[10]  
Josang A., 2006, Web Intelligence and Agent Systems, V4, P139