We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Yu Zhang, Tong Yu. Mining Trust Relationships from Online Social Networks[J]. Journal of Computer Science and Technology, 2012, 27(3): 492-505. DOI: 10.1007/s11390-012-1238-8
Citation: Yu Zhang, Tong Yu. Mining Trust Relationships from Online Social Networks[J]. Journal of Computer Science and Technology, 2012, 27(3): 492-505. DOI: 10.1007/s11390-012-1238-8

Mining Trust Relationships from Online Social Networks

Funds: This work is supported by the National Natural Science Foundation of China under Grant No. 61100183, the Natural Science Foundation of Zhejiang Province of China under Grant No. Y1110477, and the Science Foundation of Zhejiang Sci-Tech University under Grant No. 0907838-Y.
More Information
  • Author Bio:

    Yu Zhang is an associate pro-fessor of Zhejiang Sci-Tech Univer-sity, China. She received her Ph.D. degree from Zhejiang University in 2009. She is a member of CCF and ACM. Her current research interests include trust computing, Semantic Web and online social network anal-ysis.

  • Received Date: August 30, 2011
  • Revised Date: December 17, 2011
  • Published Date: May 04, 2012
  • With the growing popularity of online social network, trust plays a more and more important role in connecting people to each other. We rely on our personal trust to accept recommendations, to make purchase decisions and to select transaction partners in the online community. Therefore, how to obtain trust relationships through mining online social networks becomes an important research topic. There are several shortcomings of existing trust mining methods. First, trust is category-dependent. However, most of the methods overlook the category attribute of trust relationships, which leads to low accuracy in trust calculation. Second, since the data in online social networks cannot be understood and processed by machines directly, traditional mining methods require much human effort and are not easily applied to other applications. To solve the above problems, we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically. We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing. We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships. We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort. We perform experiments on real-life data extracted from Epinions. The experimental results verify the effectiveness and wide application use of our proposed method.
  • [1]
    Guha R, Kumar R, Raghavan P, Tomkins A. Propagation oftrust and distrust. In Proc. the 13th Int. Conference onWorld Wide Web (WWW 2004), New York, NY, USA, May17-22, 2004, pp.403-412.
    [2]
    Golbeck J, Parsia B, Hendler J A. Trust networks on theSemantic Web. In Proc. the 7th Int. Workshop on Coop-erative Intelligent Agents, Helsinki, Finland, August 27-29,2003, pp.238-249.
    [3]
    Richardson M, Agrawal R, Domingos P. Trust managementfor the Semantic Web. In Proc. the 2nd Int. SemanticWeb Conference, Sanibel Island, Florida, USA, October 20-23, 2003, pp.351-368.
    [4]
    Massa P, Avesani P. Trust-aware collaborative filtering forrecommender systems. In Proc. Int. Conference on Coope-rative Information Systems, Larnaca, Cyprus, October 25-29,2004, pp.492-508.
    [5]
    Bizer C, Oldakowski R. Using context-and content-basedtrust policies on the Semantic Web. In Proc. the 13th Int.conference on World Wide Web, New York, NY, USA, May17-22, 2004, pp.228-229.
    [6]
    Tang J, Sun J, Wang C, Yang Z. Social influence analysisin large-scale networks. In Proc. the 15th ACM SIGKDDInt. Conference on Knowledge Discovery and Data Mining(SIGKDD 2009), Paris, France, June 28-July 1, 2009, pp.807-816.
    [7]
    Zhang Y, Wang Z Q, Xia C L. Identifying key users for tar-geted marketing by mining online social network. In Proc. the24th Int. Conference on Advanced Information Networkingand Applications Workshops, Perth, Australia, April 20-23,2010, pp.644-649.
    [8]
    Pan W, Liu N N, Xiang E W, Yang Q. Transfer learningto predict missing ratings via heterogeneous user feedbacks.In Proc. the 22nd Int. Joint Conference on Artificial In-telligence (IJCAI 2011), Barcelona, Spain, July 16-22, 2011,pp.2318-2323.
    [9]
    He Q, Pei J, Kifer D, Mitra P, Giles L. Context-aware ci-tation recommendation. In Proc. the 19th Int. Conferenceon World Wide Web, Raleigh, North Carolina, USA, April26-30, 2010, pp.421-430.
    [10]
    Wang X J, Yu M, Zhang L, Cai R, Ma W Y. Argo: Intelligentadvertising by mining a user's interest from his photo collec-tions. In Proc. the 3rd KDD Workshop on Data Mining andAudience Intelligence for Advertising, Paris, France, June 28,2009, pp.18-26.
    [11]
    Tang J, Lou T C, Kleinberg J. Inferring social ties acrossheterogeneous networks. In Proc. the 5th ACM Int. Confe-rence on Web Search and Data Mining (WSDM 2012), Seat-tle, Washington, February 8-12, 2012, pp.743-752.
    [12]
    Tang W B, Zhuang H L, Tang J. Learning to infer social tiesin large networks. In Proc. ECML/PKDD 2011, Athens,Greece, September 5-9, 2011, pp.381-397.
    [13]
    Leskovec J, Huttenlocher D, Kleinberg J. Predicting positiveand negative links in online social networks. In Proc. the 19thInternational World Wide Web Conference (WWW 2010),Raleigh, NC, USA, April 26-30, 2010, pp.641-650.
    [14]
    Leskovec J, Huttenlocher D, Kleinberg J. Signed networks insocial media. In Proc. the 28th Int. Conference on HumanFactors in Computing Systems (CHI 2010), Atlanta, Georgia,USA, April 10-15, 2010, pp.1361-1370.
    [15]
    Zolfaghar K, Aghaie A. Mining trust and distrust relation-ships in social web applications. In Proc. the 2010 IEEEInt. Conference on Intelligent Computer Communicationand Processing, Cluj-Napoca, Romania, Aug. 26-28, 2010,pp.73-80.
    [16]
    Nguyen V A, Lim E P, Jiang J, Sun A. To trust or not to trust?Predicting online trusts using trust antecedent framework. InProc. the 9th IEEE Int. Conference on Data Mining, Miami,Florida, USA, Dec. 6-9, 2009, pp.896-901.
    [17]
    Chua F C T, Lim E P. Trust network inference for on-line rating data using generative models. In Proc. the16th ACM SIGKDD Conference on Knowledge Discoveryand Data Mining, Washington, DC, USA, July 25-28, 2010,pp.889-898.
    [18]
    Nguyen V A, E P Lim, Tan H H, Jiang J, Sun A. Do youtrust to get trust? A study of trust reciprocity behaviors andreciprocal trust prediction. In Proc. the SIAM Int. Confer-ence on Data Mining, Columbus, Ohio, USA, April 29-May1, 2010, pp.72-83.
    [19]
    Liu H F, Lim E P, Lauw H W, Le M T, Sun A X, Srivas-tava J, Kim Y A. Predicting trusts among users of onlinecommunities: An Epinions case study. In Proc. the 9th ACMConference on Electronic Commerce, Chicago, Illinois, USA,July 8-12, 2008, pp.310-319.
    [20]
    Ma N, Lim E P, Nguyen V A, Sun A X, Liu H F. Trust re-lationship prediction using online product review data. InProc. the 1st ACM Int. Workshop on Complex NetworksMeet Information & Knowledge Management, Hong Kong,China, November 2-6 2009, pp.47-54.
    [21]
    Matsuo Y, Yamamoto H. Community gravity: Measuringbidirectional effects by trust and rating on online social net-works. In Proc. the 18th Int. Conference on World WideWeb, Madrid, Spain, April 20-24, 2009, pp.751-760.
    [22]
    Skopik F, Truong H L, Dustdar S. Trust and reputation min-ing in professional virtual communities. In Proc. the 9th Int.Conference on Web Engineering, San Sebastian, Spain, June22-26, 2009, pp.76-90.
    [23]
    Epinions. http://www.epinions.com, 2011.
    [24]
    The Foaf Project. http://www.foaf-project.org/, 2011.
    [25]
    SIOC core ontology specification. http://rdfs.org/sioc/spec/,2011.
    [26]
    GoodRelations: TheWeb vocabulary for e-commerce. http://www.heppnetz.de/projects/good relations/, 2011.
    [27]
    OWL Web ontology language guide. http://www.w3.org/TR/owl-guide/, 2011.
    [28]
    Defining n-ary relations on the Semantic Web: Use with indi-viduals. http://www.w3.org/2001/sw/BestPractices/OEP/n-aryRelations-20040623/, 2011.
    [29]
    Jena Semantic Web framework. http://jena.sourceforge.net/downloads.html, 2011.
  • Related Articles

    [1]Ming He, Yan Chen, Hong-Ke Zhao, Qi Liu, Le Wu, Yu Cui, Gui-Hua Zeng, Gui-Quan Liu. Composing Like an Ancient Chinese Poet: Learn to Generate Rhythmic Chinese Poetry[J]. Journal of Computer Science and Technology, 2023, 38(6): 1272-1287. DOI: 10.1007/s11390-023-1295-1
    [2]Lei Guo, Jun Ma, Hao-Ran Jiang, Zhu-Min Chen, Chang-Ming Xing. Social Trust Aware Item Recommendation for Implicit Feedback[J]. Journal of Computer Science and Technology, 2015, 30(5): 1039-1053. DOI: 10.1007/s11390-015-1580-8
    [3]Xi-Shun Zhao, Yu-Ping Shen. Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction[J]. Journal of Computer Science and Technology, 2007, 22(4): 562-568.
    [4]Xiu-Li Sun, Wen-Yin Zhang, Jin-Zhao Wu. Event-Based Operational Semantics and a Consistency Result for Real-Time Concurrent Processes with Action Refinement[J]. Journal of Computer Science and Technology, 2004, 19(6).
    [5]Jin-Zhao Wu, Harald Fecher. Symmetric Structure in Logic Programming[J]. Journal of Computer Science and Technology, 2004, 19(6).
    [6]WANG Kewen, ZHOU Lizhu. Closed World Assumption for Disjunctive Reasoning[J]. Journal of Computer Science and Technology, 2001, 16(4).
    [7]LI Layuan, LI Chunlin. A Semantics-Based Approach for Achieving Self Fault-Tolerance of Protocols[J]. Journal of Computer Science and Technology, 2000, 15(2): 176-183.
    [8]Hock C. Chan. Translational Semantics for a Conceptual Level Query Language[J]. Journal of Computer Science and Technology, 1995, 10(2): 175-187.
    [9]Zhu Mingyuan. Two Congruent Semantics for Prolog with CUT[J]. Journal of Computer Science and Technology, 1990, 5(1): 82-91.
    [10]Tang Tonggao, Zhao Zhaokeng. Stack Method in Program Semantics[J]. Journal of Computer Science and Technology, 1987, 2(1): 51-63.

Catalog

    Article views (33) PDF downloads (3369) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return