An automata algorithm for generating trusted graphs in online social networks

Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods,...

Full description

Saved in:
Bibliographic Details
Published inApplied soft computing Vol. 118; p. 108475
Main Authors Fatehi, Nina, Shahhoseini, Hadi Shahriar, Wei, Jesse, Chang, Ching-Ter
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.03.2022
Subjects
Online AccessGet full text
ISSN1568-4946
1872-9681
DOI10.1016/j.asoc.2022.108475

Cover

Abstract Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods, in which the trust value can be calculated through a trusted graph. However, this approach usually lacks the ability to find all trusted paths, and needs to put some restrictions to admit the process of finding trusted paths, causing trusted relations to be unreachable and leading to reduced coverage and accuracy. In this paper, graph-based and artificial intelligence approaches are combined to formulate a hybrid model for improving the coverage and accuracy of OSNs. In this approach, a distributed learning automata, which can be used to find all trusted relations without limitation, is employed instead of well-known graphic-based searching algorithms such as breadth-first search. Simulation results, conducted on real dataset of Epinions.com, illustrate an improvement of accuracy and coverage in comparison with state-of-the-art algorithms. The accuracy of the proposed algorithm is 0.9398, a 6% increase in accuracy over existing comparable algorithms. Furthermore, by the successful removal of imposed restrictions in the existing searching process for finding trusted paths, this algorithm also leads to a 10% improvement in coverage, reaching approximately 95% of all existing trusted paths. •A hybrid model for evaluating trust relationship by incorporating graph-based and artificial intelligence approaches is proposed.•The proposed algorithm searches trustworthy and reliable users in an online social network.•Simulation results of the proposed algorithm are prepared with three well-known algorithms from literature on the Epinions dataset.
AbstractList Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods, in which the trust value can be calculated through a trusted graph. However, this approach usually lacks the ability to find all trusted paths, and needs to put some restrictions to admit the process of finding trusted paths, causing trusted relations to be unreachable and leading to reduced coverage and accuracy. In this paper, graph-based and artificial intelligence approaches are combined to formulate a hybrid model for improving the coverage and accuracy of OSNs. In this approach, a distributed learning automata, which can be used to find all trusted relations without limitation, is employed instead of well-known graphic-based searching algorithms such as breadth-first search. Simulation results, conducted on real dataset of Epinions.com, illustrate an improvement of accuracy and coverage in comparison with state-of-the-art algorithms. The accuracy of the proposed algorithm is 0.9398, a 6% increase in accuracy over existing comparable algorithms. Furthermore, by the successful removal of imposed restrictions in the existing searching process for finding trusted paths, this algorithm also leads to a 10% improvement in coverage, reaching approximately 95% of all existing trusted paths. •A hybrid model for evaluating trust relationship by incorporating graph-based and artificial intelligence approaches is proposed.•The proposed algorithm searches trustworthy and reliable users in an online social network.•Simulation results of the proposed algorithm are prepared with three well-known algorithms from literature on the Epinions dataset.
ArticleNumber 108475
Author Fatehi, Nina
Wei, Jesse
Chang, Ching-Ter
Shahhoseini, Hadi Shahriar
Author_xml – sequence: 1
  givenname: Nina
  surname: Fatehi
  fullname: Fatehi, Nina
  email: nina.fatehi@wayne.edu
  organization: School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran
– sequence: 2
  givenname: Hadi Shahriar
  orcidid: 0000-0002-6042-0993
  surname: Shahhoseini
  fullname: Shahhoseini, Hadi Shahriar
  email: shahhoseini@iust.ac.ir
  organization: School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran
– sequence: 3
  givenname: Jesse
  surname: Wei
  fullname: Wei, Jesse
  email: jessew13@email.unc.edu
  organization: School of Arts and Sciences, University of North Carolina at Chapel Hill, Chapel Hill, NC 27599, USA
– sequence: 4
  givenname: Ching-Ter
  orcidid: 0000-0001-8137-8838
  surname: Chang
  fullname: Chang, Ching-Ter
  email: chingter@mail.cgu.edu.tw
  organization: Department of Information Management, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan 333, Taiwan, ROC
BookMark eNp9kM9OAyEQh4mpiW31BTzxAlthl2Uh8dI0_ktqvOiZsDC7pW6hAarx7d2mnjz0NJNJvpn5fTM08cEDQreULCih_G670CmYRUnKchwI1tQXaEpFUxaSCzoZ-5qLgknGr9AspS0ZIVmKKXpdeqwPOex01lgPfYgub3a4CxH34CHq7HyPczykDBb3Ue83CTuPgx-cBzwedXrAHvJ3iJ_pGl12ekhw81fn6OPx4X31XKzfnl5Wy3VhKkJy0Wjd2LauWGsYowKatqaCVrYlLWk6yVgFUMmu4gKk5dJoQjtrCBO0BC46U82ROO01MaQUoVPG5fHV4HPUblCUqKMWtVVHLeqoRZ20jGj5D91Ht9Px5zx0f4JgDPXlIKpkHHgD1kUwWdngzuG_PhV_UA
CitedBy_id crossref_primary_10_1109_TCSS_2024_3392613
crossref_primary_10_1155_2022_9474323
crossref_primary_10_1007_s00521_023_08651_5
crossref_primary_10_1016_j_asoc_2024_112416
crossref_primary_10_1049_cds2_12138
crossref_primary_10_1007_s13278_022_00998_2
crossref_primary_10_1515_jisys_2022_0215
crossref_primary_10_3390_app14062643
crossref_primary_10_1016_j_knosys_2023_110770
Cites_doi 10.1016/j.knosys.2017.06.034
10.1109/ICCKE50421.2020.9303641
10.1109/TC.2015.2435785
10.1109/CISP-BMEI51763.2020.9263509
10.1080/00207720802145924
10.1016/j.knosys.2011.06.009
10.1145/1183463.1183470
10.1016/j.jnca.2011.03.016
10.1016/j.knosys.2015.02.023
10.1016/j.inffus.2020.03.006
10.1016/j.ins.2019.08.055
10.1016/j.dss.2005.05.019
10.4018/jswis.2007010103
10.1016/j.asoc.2015.04.053
10.1016/j.future.2012.06.010
10.1007/s12652-018-0928-7
10.1016/j.jocs.2017.05.018
10.1007/s11704-011-0323-4
10.1109/INFOCOM41043.2020.9155370
10.1111/j.1467-8640.2009.00334.x
10.1016/j.websem.2009.11.003
10.1007/978-3-540-39718-2_23
10.1109/MWC.001.1900440
10.1016/j.future.2010.04.015
10.1016/j.socnet.2019.01.004
10.1016/j.ejor.2019.10.035
ContentType Journal Article
Copyright 2022 Elsevier B.V.
Copyright_xml – notice: 2022 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.asoc.2022.108475
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-9681
ExternalDocumentID 10_1016_j_asoc_2022_108475
S1568494622000357
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
23M
4.4
457
4G.
53G
5GY
5VS
6J9
7-5
71M
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
UHS
UNMZH
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c300t-7aa7db534bc4418e7b51813db0b07f9443ee39f368e9d69ca01fdc04812e68fc3
IEDL.DBID .~1
ISSN 1568-4946
IngestDate Wed Oct 29 21:19:22 EDT 2025
Thu Apr 24 23:09:42 EDT 2025
Fri Feb 23 02:40:28 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Evaluation
Learning automata
Trust
Online social network
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c300t-7aa7db534bc4418e7b51813db0b07f9443ee39f368e9d69ca01fdc04812e68fc3
ORCID 0000-0002-6042-0993
0000-0001-8137-8838
ParticipantIDs crossref_citationtrail_10_1016_j_asoc_2022_108475
crossref_primary_10_1016_j_asoc_2022_108475
elsevier_sciencedirect_doi_10_1016_j_asoc_2022_108475
PublicationCentury 2000
PublicationDate March 2022
2022-03-00
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: March 2022
PublicationDecade 2020
PublicationTitle Applied soft computing
PublicationYear 2022
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Jøsang, Ismail, Boyd (b12) 2007; 43
Massa, Avesani (b13) 2007; 3
Golbeck, Hendler (b22) 2006; 6
Jiang, Wu, Li, Wang, Zheng (b14) 2015; 65
Xu, Liu, Jiao, Li, Feng, Liang (b16) 2020; 27
Kim, Song (b30) 2011; 24
Wang, Luo, Jia, Liu, Xie (b7) 2019
Jiang, Wang, Bhuiyan, Wu (b11) 2016; 49
Kim (b26) 2015; 82
Golbeck (b10) 2005
Ghavipour, Meybodi (b34) 2018; 143
Wang, Wu (b21) 2011; 5
Cai, Yan, Gong, Wei (b5) 2020
W. Lin, Z. Gao, B. Li, Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks, in: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 914–923.
Jøsang, Gray, Kinateder (b27) 2006; 4
Lesani, Montazeri (b28) 2009; 25
Wang, Wu (b25) 2011; 27
Cormen, Leiserson, Rivest, Stein (b31) 2009
Jiang, Wang, Wu (b1) 2014; 31
X. Zhuang, X. Tong, A Local Trust Inferring Algorithm based on Reinforcement Learning DoubleDQN in Online Social Networks, in: 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI, 2020, pp. 1064–1069.
Cho, Swami, Chen (b29) 2012; 35
Rezvanian, Moradabadi, Ghavipour, Khomami, Meybodi (b32) 2019
Gong, Wang, Guo, Gong, Wei (b15) 2020; 508
Granovetter (b37) 1977
Ureña, Chiclana, Herrera-Viedma (b19) 2020
Gong, Guo, Herrera-Viedma, Gong, Wei (b4) 2020; 283
M. Richardson, R. Agrawal, P. Domingos, Trust management for the semantic web, in: International Semantic Web Conference, 2003, pp. 351–368.
Chen, Yuan, Orgun, Lu (b18) 2020
Narendra, Thathachar (b24) 2012
Beigy, Meybodi (b33) 2009; 40
Zhang, Wen, Wang, Zhao (b8) 2018; 26
Guo, Liu, Ota, Dong, Deng, Xiong (b17) 2021
Shekarpour, Katebi (b36) 2010; 8
N. Fatehi, H. Shahhoseini, A Hybrid Algorithm for Evaluating Trust in Online Social Networks, in: 2020 10th International Conference on Computer and Knowledge Engineering, ICCKE, 2020, pp. 158–162.
Jiang, Cheng, Yang, Li, Yan, Wang (b3) 2019; 10
Huang, Heidergott, Lindner (b23) 2019; 58
Tahta, Sen, Can (b6) 2015; 34
Jiang (10.1016/j.asoc.2022.108475_b1) 2014; 31
Jiang (10.1016/j.asoc.2022.108475_b11) 2016; 49
Beigy (10.1016/j.asoc.2022.108475_b33) 2009; 40
Cho (10.1016/j.asoc.2022.108475_b29) 2012; 35
Gong (10.1016/j.asoc.2022.108475_b15) 2020; 508
Gong (10.1016/j.asoc.2022.108475_b4) 2020; 283
Jøsang (10.1016/j.asoc.2022.108475_b12) 2007; 43
Xu (10.1016/j.asoc.2022.108475_b16) 2020; 27
Wang (10.1016/j.asoc.2022.108475_b7) 2019
Golbeck (10.1016/j.asoc.2022.108475_b22) 2006; 6
Kim (10.1016/j.asoc.2022.108475_b30) 2011; 24
Cormen (10.1016/j.asoc.2022.108475_b31) 2009
10.1016/j.asoc.2022.108475_b20
Jiang (10.1016/j.asoc.2022.108475_b3) 2019; 10
Wang (10.1016/j.asoc.2022.108475_b21) 2011; 5
Shekarpour (10.1016/j.asoc.2022.108475_b36) 2010; 8
Narendra (10.1016/j.asoc.2022.108475_b24) 2012
Kim (10.1016/j.asoc.2022.108475_b26) 2015; 82
Ghavipour (10.1016/j.asoc.2022.108475_b34) 2018; 143
Cai (10.1016/j.asoc.2022.108475_b5) 2020
Wang (10.1016/j.asoc.2022.108475_b25) 2011; 27
Huang (10.1016/j.asoc.2022.108475_b23) 2019; 58
Massa (10.1016/j.asoc.2022.108475_b13) 2007; 3
Jiang (10.1016/j.asoc.2022.108475_b14) 2015; 65
Granovetter (10.1016/j.asoc.2022.108475_b37) 1977
10.1016/j.asoc.2022.108475_b2
Tahta (10.1016/j.asoc.2022.108475_b6) 2015; 34
Rezvanian (10.1016/j.asoc.2022.108475_b32) 2019
Golbeck (10.1016/j.asoc.2022.108475_b10) 2005
Zhang (10.1016/j.asoc.2022.108475_b8) 2018; 26
10.1016/j.asoc.2022.108475_b35
10.1016/j.asoc.2022.108475_b9
Ureña (10.1016/j.asoc.2022.108475_b19) 2020
Lesani (10.1016/j.asoc.2022.108475_b28) 2009; 25
Chen (10.1016/j.asoc.2022.108475_b18) 2020
Jøsang (10.1016/j.asoc.2022.108475_b27) 2006; 4
Guo (10.1016/j.asoc.2022.108475_b17) 2021
References_xml – volume: 40
  start-page: 101
  year: 2009
  end-page: 118
  ident: b33
  article-title: A learning automata-based algorithm for determination of the number of hidden units for three-layer neural networks
  publication-title: Internat. J. Systems Sci.
– volume: 143
  start-page: 307
  year: 2018
  end-page: 316
  ident: b34
  article-title: Trust propagation algorithm based on learning automata for inferring local trust in online social networks
  publication-title: Knowl.-Based Syst.
– reference: N. Fatehi, H. Shahhoseini, A Hybrid Algorithm for Evaluating Trust in Online Social Networks, in: 2020 10th International Conference on Computer and Knowledge Engineering, ICCKE, 2020, pp. 158–162.
– volume: 26
  start-page: 468
  year: 2018
  end-page: 477
  ident: b8
  article-title: A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory
  publication-title: J. Comput. Sci.
– volume: 49
  start-page: 10
  year: 2016
  ident: b11
  article-title: Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
  publication-title: ACM Comput. Surv.
– volume: 65
  start-page: 952
  year: 2015
  end-page: 963
  ident: b14
  article-title: Trust evaluation in online social networks using generalized network flow
  publication-title: IEEE Trans. Comput.
– reference: W. Lin, Z. Gao, B. Li, Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks, in: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 914–923.
– volume: 58
  start-page: 1
  year: 2019
  end-page: 11
  ident: b23
  article-title: Naïve learning in social networks with random communication
  publication-title: Social Networks
– volume: 10
  start-page: 3023
  year: 2019
  end-page: 3034
  ident: b3
  article-title: A trust-based collaborative filtering algorithm for E-commerce recommendation system
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 43
  start-page: 618
  year: 2007
  end-page: 644
  ident: b12
  article-title: A survey of trust and reputation systems for online service provision
  publication-title: Decis. Support Syst.
– volume: 6
  start-page: 497
  year: 2006
  end-page: 529
  ident: b22
  article-title: Inferring binary trust relationships in web-based social networks
  publication-title: ACM Trans. Internet Technol. (TOIT)
– year: 2005
  ident: b10
  article-title: Computing and Applying Trust in Web-Based Social Networks
– volume: 27
  start-page: 72
  year: 2020
  end-page: 78
  ident: b16
  article-title: Trust2Privacy: a novel fuzzy trust-to-privacy mechanism for mobile social networks
  publication-title: IEEE Wirel. Commun.
– volume: 35
  start-page: 1001
  year: 2012
  end-page: 1012
  ident: b29
  article-title: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
  publication-title: J. Netw. Comput. Appl.
– start-page: 1
  year: 2020
  end-page: 24
  ident: b5
  article-title: A voting mechanism designed for talent shows in mass media: Weighted preference of group decision makers in social networks using fuzzy measures and choquet integral
  publication-title: Group Decis. Negot.
– reference: X. Zhuang, X. Tong, A Local Trust Inferring Algorithm based on Reinforcement Learning DoubleDQN in Online Social Networks, in: 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI, 2020, pp. 1064–1069.
– year: 2021
  ident: b17
  article-title: ITCN: an intelligent trust collaboration network system in IoT
  publication-title: IEEE Trans. Netw. Sci. Eng.
– volume: 34
  start-page: 693
  year: 2015
  end-page: 704
  ident: b6
  article-title: GenTrust: A genetic trust management model for peer-to-peer systems
  publication-title: Appl. Soft Comput.
– volume: 5
  start-page: 181
  year: 2011
  ident: b21
  article-title: FlowTrust: Trust inference with network flows
  publication-title: Front. Comput. Sci. China
– volume: 283
  start-page: 290
  year: 2020
  end-page: 307
  ident: b4
  article-title: Consistency and consensus modeling of linear uncertain preference relations
  publication-title: European J. Oper. Res.
– volume: 3
  start-page: 39
  year: 2007
  end-page: 64
  ident: b13
  article-title: Trust metrics on controversial users: Balancing between tyranny of the majority
  publication-title: Int. J. Semant. Web Inform. Syst. (IJSWIS)
– reference: M. Richardson, R. Agrawal, P. Domingos, Trust management for the semantic web, in: International Semantic Web Conference, 2003, pp. 351–368.
– year: 2020
  ident: b19
  article-title: DeciTrustNET: A graph based trust and reputation framework for social networks
  publication-title: Inf. Fusion
– year: 2020
  ident: b18
  article-title: A topic-sensitive trust evaluation approach for users in online communities
  publication-title: Knowl.-Based Syst.
– volume: 27
  start-page: 529
  year: 2011
  end-page: 538
  ident: b25
  article-title: Multi-dimensional evidence-based trust management with multi-trusted paths
  publication-title: Future Gener. Comput. Syst.
– volume: 82
  start-page: 20
  year: 2015
  end-page: 28
  ident: b26
  article-title: An enhanced trust propagation approach with expertise and homophily-based trust networks
  publication-title: Knowl.-Based Syst.
– year: 2009
  ident: b31
  article-title: Introduction to Algorithms
– start-page: 347
  year: 1977
  end-page: 367
  ident: b37
  article-title: The strength of weak ties
  publication-title: Social Networks
– volume: 508
  start-page: 154
  year: 2020
  end-page: 172
  ident: b15
  article-title: Measuring trust in social networks based on linear uncertainty theory
  publication-title: Inform. Sci.
– year: 2012
  ident: b24
  article-title: Learning Automata: An Introduction
– volume: 4
  start-page: 139
  year: 2006
  end-page: 161
  ident: b27
  article-title: Simplification and analysis of transitive trust networks
  publication-title: Web Intell. Agent Syst. Int. J.
– volume: 25
  start-page: 51
  year: 2009
  end-page: 83
  ident: b28
  article-title: Fuzzy trust aggregation and personalized trust inference in virtual social networks
  publication-title: Comput. Intell.
– volume: 24
  start-page: 1360
  year: 2011
  end-page: 1371
  ident: b30
  article-title: Strategies for predicting local trust based on trust propagation in social networks
  publication-title: Knowl.-Based Syst.
– volume: 8
  start-page: 26
  year: 2010
  end-page: 36
  ident: b36
  article-title: Modeling and evaluation of trust with an extension in semantic web
  publication-title: Web Semant. Sci. Serv. Ag. World Wide Web
– year: 2019
  ident: b7
  article-title: MTES: An intelligent trust evaluation scheme in sensor-cloud enabled industrial internet of things
  publication-title: IEEE Trans. Ind. Inf.
– volume: 31
  start-page: 48
  year: 2014
  end-page: 58
  ident: b1
  article-title: Generating trusted graphs for trust evaluation in online social networks
  publication-title: Future Gener. Comput. Syst.
– start-page: 1
  year: 2019
  end-page: 49
  ident: b32
  article-title: Introduction to learning automata models
  publication-title: Learning Automata Approach for Social Networks
– year: 2009
  ident: 10.1016/j.asoc.2022.108475_b31
– volume: 143
  start-page: 307
  year: 2018
  ident: 10.1016/j.asoc.2022.108475_b34
  article-title: Trust propagation algorithm based on learning automata for inferring local trust in online social networks
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2017.06.034
– ident: 10.1016/j.asoc.2022.108475_b2
  doi: 10.1109/ICCKE50421.2020.9303641
– volume: 65
  start-page: 952
  year: 2015
  ident: 10.1016/j.asoc.2022.108475_b14
  article-title: Trust evaluation in online social networks using generalized network flow
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2015.2435785
– ident: 10.1016/j.asoc.2022.108475_b20
  doi: 10.1109/CISP-BMEI51763.2020.9263509
– volume: 40
  start-page: 101
  year: 2009
  ident: 10.1016/j.asoc.2022.108475_b33
  article-title: A learning automata-based algorithm for determination of the number of hidden units for three-layer neural networks
  publication-title: Internat. J. Systems Sci.
  doi: 10.1080/00207720802145924
– volume: 24
  start-page: 1360
  year: 2011
  ident: 10.1016/j.asoc.2022.108475_b30
  article-title: Strategies for predicting local trust based on trust propagation in social networks
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2011.06.009
– volume: 6
  start-page: 497
  year: 2006
  ident: 10.1016/j.asoc.2022.108475_b22
  article-title: Inferring binary trust relationships in web-based social networks
  publication-title: ACM Trans. Internet Technol. (TOIT)
  doi: 10.1145/1183463.1183470
– volume: 35
  start-page: 1001
  year: 2012
  ident: 10.1016/j.asoc.2022.108475_b29
  article-title: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2011.03.016
– year: 2012
  ident: 10.1016/j.asoc.2022.108475_b24
– volume: 82
  start-page: 20
  year: 2015
  ident: 10.1016/j.asoc.2022.108475_b26
  article-title: An enhanced trust propagation approach with expertise and homophily-based trust networks
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2015.02.023
– year: 2020
  ident: 10.1016/j.asoc.2022.108475_b19
  article-title: DeciTrustNET: A graph based trust and reputation framework for social networks
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2020.03.006
– year: 2005
  ident: 10.1016/j.asoc.2022.108475_b10
– year: 2021
  ident: 10.1016/j.asoc.2022.108475_b17
  article-title: ITCN: an intelligent trust collaboration network system in IoT
  publication-title: IEEE Trans. Netw. Sci. Eng.
– volume: 508
  start-page: 154
  year: 2020
  ident: 10.1016/j.asoc.2022.108475_b15
  article-title: Measuring trust in social networks based on linear uncertainty theory
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2019.08.055
– start-page: 1
  year: 2020
  ident: 10.1016/j.asoc.2022.108475_b5
  article-title: A voting mechanism designed for talent shows in mass media: Weighted preference of group decision makers in social networks using fuzzy measures and choquet integral
  publication-title: Group Decis. Negot.
– volume: 43
  start-page: 618
  year: 2007
  ident: 10.1016/j.asoc.2022.108475_b12
  article-title: A survey of trust and reputation systems for online service provision
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2005.05.019
– volume: 3
  start-page: 39
  year: 2007
  ident: 10.1016/j.asoc.2022.108475_b13
  article-title: Trust metrics on controversial users: Balancing between tyranny of the majority
  publication-title: Int. J. Semant. Web Inform. Syst. (IJSWIS)
  doi: 10.4018/jswis.2007010103
– volume: 34
  start-page: 693
  year: 2015
  ident: 10.1016/j.asoc.2022.108475_b6
  article-title: GenTrust: A genetic trust management model for peer-to-peer systems
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2015.04.053
– volume: 31
  start-page: 48
  year: 2014
  ident: 10.1016/j.asoc.2022.108475_b1
  article-title: Generating trusted graphs for trust evaluation in online social networks
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2012.06.010
– volume: 10
  start-page: 3023
  year: 2019
  ident: 10.1016/j.asoc.2022.108475_b3
  article-title: A trust-based collaborative filtering algorithm for E-commerce recommendation system
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-018-0928-7
– start-page: 1
  year: 2019
  ident: 10.1016/j.asoc.2022.108475_b32
  article-title: Introduction to learning automata models
– volume: 26
  start-page: 468
  year: 2018
  ident: 10.1016/j.asoc.2022.108475_b8
  article-title: A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory
  publication-title: J. Comput. Sci.
  doi: 10.1016/j.jocs.2017.05.018
– volume: 5
  start-page: 181
  year: 2011
  ident: 10.1016/j.asoc.2022.108475_b21
  article-title: FlowTrust: Trust inference with network flows
  publication-title: Front. Comput. Sci. China
  doi: 10.1007/s11704-011-0323-4
– start-page: 347
  year: 1977
  ident: 10.1016/j.asoc.2022.108475_b37
  article-title: The strength of weak ties
– volume: 49
  start-page: 10
  year: 2016
  ident: 10.1016/j.asoc.2022.108475_b11
  article-title: Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
  publication-title: ACM Comput. Surv.
– ident: 10.1016/j.asoc.2022.108475_b9
  doi: 10.1109/INFOCOM41043.2020.9155370
– volume: 25
  start-page: 51
  year: 2009
  ident: 10.1016/j.asoc.2022.108475_b28
  article-title: Fuzzy trust aggregation and personalized trust inference in virtual social networks
  publication-title: Comput. Intell.
  doi: 10.1111/j.1467-8640.2009.00334.x
– volume: 8
  start-page: 26
  year: 2010
  ident: 10.1016/j.asoc.2022.108475_b36
  article-title: Modeling and evaluation of trust with an extension in semantic web
  publication-title: Web Semant. Sci. Serv. Ag. World Wide Web
  doi: 10.1016/j.websem.2009.11.003
– year: 2019
  ident: 10.1016/j.asoc.2022.108475_b7
  article-title: MTES: An intelligent trust evaluation scheme in sensor-cloud enabled industrial internet of things
  publication-title: IEEE Trans. Ind. Inf.
– ident: 10.1016/j.asoc.2022.108475_b35
  doi: 10.1007/978-3-540-39718-2_23
– volume: 27
  start-page: 72
  year: 2020
  ident: 10.1016/j.asoc.2022.108475_b16
  article-title: Trust2Privacy: a novel fuzzy trust-to-privacy mechanism for mobile social networks
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.001.1900440
– volume: 27
  start-page: 529
  year: 2011
  ident: 10.1016/j.asoc.2022.108475_b25
  article-title: Multi-dimensional evidence-based trust management with multi-trusted paths
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2010.04.015
– volume: 4
  start-page: 139
  year: 2006
  ident: 10.1016/j.asoc.2022.108475_b27
  article-title: Simplification and analysis of transitive trust networks
  publication-title: Web Intell. Agent Syst. Int. J.
– volume: 58
  start-page: 1
  year: 2019
  ident: 10.1016/j.asoc.2022.108475_b23
  article-title: Naïve learning in social networks with random communication
  publication-title: Social Networks
  doi: 10.1016/j.socnet.2019.01.004
– year: 2020
  ident: 10.1016/j.asoc.2022.108475_b18
  article-title: A topic-sensitive trust evaluation approach for users in online communities
  publication-title: Knowl.-Based Syst.
– volume: 283
  start-page: 290
  year: 2020
  ident: 10.1016/j.asoc.2022.108475_b4
  article-title: Consistency and consensus modeling of linear uncertain preference relations
  publication-title: European J. Oper. Res.
  doi: 10.1016/j.ejor.2019.10.035
SSID ssj0016928
Score 2.4228814
Snippet Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 108475
SubjectTerms Evaluation
Learning automata
Online social network
Trust
Title An automata algorithm for generating trusted graphs in online social networks
URI https://dx.doi.org/10.1016/j.asoc.2022.108475
Volume 118
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-9681
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016928
  issn: 1568-4946
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier Science Direct Journals
  customDbUrl:
  eissn: 1872-9681
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016928
  issn: 1568-4946
  databaseCode: AIKHN
  dateStart: 20010601
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect (LUT)
  customDbUrl:
  eissn: 1872-9681
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016928
  issn: 1568-4946
  databaseCode: ACRLP
  dateStart: 20010601
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Science Direct
  customDbUrl:
  eissn: 1872-9681
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016928
  issn: 1568-4946
  databaseCode: .~1
  dateStart: 20010601
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-9681
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016928
  issn: 1568-4946
  databaseCode: AKRWK
  dateStart: 20010601
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENhSax8xqriqq8KgRU6hbZjlOKSlqpZeW3c2c7FUioA1OU6GxFX5y7z8l3d4RcBkGssYk1pigzjxei8GScKk9KoK_wYspSG4HsMB6M-N04GjdIr86FQVml8_3Wpxtv7a50HJqdxXTaeYGdR8phvjA0_8Mwo5zzBLsYXH-tZR5BnJn-qmjsobVLnLEaLwEIwB4xDFFqx1Fr-Fdw-hFw-ntkxzFF2rU3s08aujogu3UXBupeykPy2K2o-FzNgXoKKmaTOWz33z4okFE6MTWlUdhMTW6FLqgpUL2k04raGhnUfjSnlZWDL4_IqH_z2ht4rkmCp5jvr7xEiKSQEeNSAbNJdSIjCNqskL70kzLjnGnNspLFqc6KOFPCD8pCYZWYUMdpqdgxaVbzSp8QGjDBg6RUWVjCXGCcZCoMGEwMNAaCXYsENTq5chXEsZHFLK-lYu85IpojorlFtEWu1mMWtn7GRuuoBj3_tQpycPAbxp3-c9wZ2cYzqyk7J014FvoCSMZKts0qapOtbu_54QmPt_eD4TfT0NIB
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKGWDhjShPD2woNLGdOBmrClSg7UIrdYtsx4GiklZqWfntnB-pQEIMrMmdFX2x75F8d4fQdRQl2gyxNiXKNGCFKAKZpCqQEsJXOJiy1JYgO0x6Y_Y4iScN1K1rYQyt0tt-Z9OttfZX2h7N9mI6bT9D5pEyWI8Q-z-Mb6BNFhNuMrDbzzXPI0oyO2DVSAdG3FfOOJKXAAggSSTEcO2YIRv-5p2-eZz7PbTjQ0XccU-zjxq6OkC79RgG7E_lIRp0Kiw-VnOIPQUWs5c55Puv7xiiUfxim0obZjO2xRW6wLZD9RJPK-yaZGD31RxXjg--PELj-7tRtxf4KQmBomG4CrgQvJAxZVJBaJNqLmPw2rSQoQx5mTFGtaZZSZNUZ0WSKRFGZaFMmxiik7RU9Bg1q3mlTxCOqGARL1VGSlgLhHmmSERhYYhjwNu1UFSjkyvfQtxMspjlNVfsLTeI5gbR3CHaQjdrnYVroPGndFyDnv_YBjlY-D_0Tv-pd4W2eqNBP-8_DJ_O0La54whm56gJ70VfQMSxkpd2R30BS-nSAQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+automata+algorithm+for+generating+trusted+graphs+in+online+social+networks&rft.jtitle=Applied+soft+computing&rft.au=Fatehi%2C+Nina&rft.au=Shahhoseini%2C+Hadi+Shahriar&rft.au=Wei%2C+Jesse&rft.au=Chang%2C+Ching-Ter&rft.date=2022-03-01&rft.issn=1568-4946&rft.volume=118&rft.spage=108475&rft_id=info:doi/10.1016%2Fj.asoc.2022.108475&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_asoc_2022_108475
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1568-4946&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1568-4946&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1568-4946&client=summon