An automata algorithm for generating trusted graphs in online social networks
Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods,...
Saved in:
| Published in | Applied soft computing Vol. 118; p. 108475 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.03.2022
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1568-4946 1872-9681 |
| DOI | 10.1016/j.asoc.2022.108475 |
Cover
| Abstract | Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods, in which the trust value can be calculated through a trusted graph. However, this approach usually lacks the ability to find all trusted paths, and needs to put some restrictions to admit the process of finding trusted paths, causing trusted relations to be unreachable and leading to reduced coverage and accuracy. In this paper, graph-based and artificial intelligence approaches are combined to formulate a hybrid model for improving the coverage and accuracy of OSNs. In this approach, a distributed learning automata, which can be used to find all trusted relations without limitation, is employed instead of well-known graphic-based searching algorithms such as breadth-first search. Simulation results, conducted on real dataset of Epinions.com, illustrate an improvement of accuracy and coverage in comparison with state-of-the-art algorithms. The accuracy of the proposed algorithm is 0.9398, a 6% increase in accuracy over existing comparable algorithms. Furthermore, by the successful removal of imposed restrictions in the existing searching process for finding trusted paths, this algorithm also leads to a 10% improvement in coverage, reaching approximately 95% of all existing trusted paths.
•A hybrid model for evaluating trust relationship by incorporating graph-based and artificial intelligence approaches is proposed.•The proposed algorithm searches trustworthy and reliable users in an online social network.•Simulation results of the proposed algorithm are prepared with three well-known algorithms from literature on the Epinions dataset. |
|---|---|
| AbstractList | Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and algorithms to improve users’ quality of service and quality of experience. Graph-based approaches make up a major portion of existing methods, in which the trust value can be calculated through a trusted graph. However, this approach usually lacks the ability to find all trusted paths, and needs to put some restrictions to admit the process of finding trusted paths, causing trusted relations to be unreachable and leading to reduced coverage and accuracy. In this paper, graph-based and artificial intelligence approaches are combined to formulate a hybrid model for improving the coverage and accuracy of OSNs. In this approach, a distributed learning automata, which can be used to find all trusted relations without limitation, is employed instead of well-known graphic-based searching algorithms such as breadth-first search. Simulation results, conducted on real dataset of Epinions.com, illustrate an improvement of accuracy and coverage in comparison with state-of-the-art algorithms. The accuracy of the proposed algorithm is 0.9398, a 6% increase in accuracy over existing comparable algorithms. Furthermore, by the successful removal of imposed restrictions in the existing searching process for finding trusted paths, this algorithm also leads to a 10% improvement in coverage, reaching approximately 95% of all existing trusted paths.
•A hybrid model for evaluating trust relationship by incorporating graph-based and artificial intelligence approaches is proposed.•The proposed algorithm searches trustworthy and reliable users in an online social network.•Simulation results of the proposed algorithm are prepared with three well-known algorithms from literature on the Epinions dataset. |
| ArticleNumber | 108475 |
| Author | Fatehi, Nina Wei, Jesse Chang, Ching-Ter Shahhoseini, Hadi Shahriar |
| Author_xml | – sequence: 1 givenname: Nina surname: Fatehi fullname: Fatehi, Nina email: nina.fatehi@wayne.edu organization: School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran – sequence: 2 givenname: Hadi Shahriar orcidid: 0000-0002-6042-0993 surname: Shahhoseini fullname: Shahhoseini, Hadi Shahriar email: shahhoseini@iust.ac.ir organization: School of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran – sequence: 3 givenname: Jesse surname: Wei fullname: Wei, Jesse email: jessew13@email.unc.edu organization: School of Arts and Sciences, University of North Carolina at Chapel Hill, Chapel Hill, NC 27599, USA – sequence: 4 givenname: Ching-Ter orcidid: 0000-0001-8137-8838 surname: Chang fullname: Chang, Ching-Ter email: chingter@mail.cgu.edu.tw organization: Department of Information Management, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan 333, Taiwan, ROC |
| BookMark | eNp9kM9OAyEQh4mpiW31BTzxAlthl2Uh8dI0_ktqvOiZsDC7pW6hAarx7d2mnjz0NJNJvpn5fTM08cEDQreULCih_G670CmYRUnKchwI1tQXaEpFUxaSCzoZ-5qLgknGr9AspS0ZIVmKKXpdeqwPOex01lgPfYgub3a4CxH34CHq7HyPczykDBb3Ue83CTuPgx-cBzwedXrAHvJ3iJ_pGl12ekhw81fn6OPx4X31XKzfnl5Wy3VhKkJy0Wjd2LauWGsYowKatqaCVrYlLWk6yVgFUMmu4gKk5dJoQjtrCBO0BC46U82ROO01MaQUoVPG5fHV4HPUblCUqKMWtVVHLeqoRZ20jGj5D91Ht9Px5zx0f4JgDPXlIKpkHHgD1kUwWdngzuG_PhV_UA |
| CitedBy_id | crossref_primary_10_1109_TCSS_2024_3392613 crossref_primary_10_1155_2022_9474323 crossref_primary_10_1007_s00521_023_08651_5 crossref_primary_10_1016_j_asoc_2024_112416 crossref_primary_10_1049_cds2_12138 crossref_primary_10_1007_s13278_022_00998_2 crossref_primary_10_1515_jisys_2022_0215 crossref_primary_10_3390_app14062643 crossref_primary_10_1016_j_knosys_2023_110770 |
| Cites_doi | 10.1016/j.knosys.2017.06.034 10.1109/ICCKE50421.2020.9303641 10.1109/TC.2015.2435785 10.1109/CISP-BMEI51763.2020.9263509 10.1080/00207720802145924 10.1016/j.knosys.2011.06.009 10.1145/1183463.1183470 10.1016/j.jnca.2011.03.016 10.1016/j.knosys.2015.02.023 10.1016/j.inffus.2020.03.006 10.1016/j.ins.2019.08.055 10.1016/j.dss.2005.05.019 10.4018/jswis.2007010103 10.1016/j.asoc.2015.04.053 10.1016/j.future.2012.06.010 10.1007/s12652-018-0928-7 10.1016/j.jocs.2017.05.018 10.1007/s11704-011-0323-4 10.1109/INFOCOM41043.2020.9155370 10.1111/j.1467-8640.2009.00334.x 10.1016/j.websem.2009.11.003 10.1007/978-3-540-39718-2_23 10.1109/MWC.001.1900440 10.1016/j.future.2010.04.015 10.1016/j.socnet.2019.01.004 10.1016/j.ejor.2019.10.035 |
| ContentType | Journal Article |
| Copyright | 2022 Elsevier B.V. |
| Copyright_xml | – notice: 2022 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.asoc.2022.108475 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-9681 |
| ExternalDocumentID | 10_1016_j_asoc_2022_108475 S1568494622000357 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 23M 4.4 457 4G. 53G 5GY 5VS 6J9 7-5 71M 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SDF SDG SES SEW SPC SPCBC SST SSV SSZ T5K UHS UNMZH ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c300t-7aa7db534bc4418e7b51813db0b07f9443ee39f368e9d69ca01fdc04812e68fc3 |
| IEDL.DBID | .~1 |
| ISSN | 1568-4946 |
| IngestDate | Wed Oct 29 21:19:22 EDT 2025 Thu Apr 24 23:09:42 EDT 2025 Fri Feb 23 02:40:28 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Evaluation Learning automata Trust Online social network |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c300t-7aa7db534bc4418e7b51813db0b07f9443ee39f368e9d69ca01fdc04812e68fc3 |
| ORCID | 0000-0002-6042-0993 0000-0001-8137-8838 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_asoc_2022_108475 crossref_primary_10_1016_j_asoc_2022_108475 elsevier_sciencedirect_doi_10_1016_j_asoc_2022_108475 |
| PublicationCentury | 2000 |
| PublicationDate | March 2022 2022-03-00 |
| PublicationDateYYYYMMDD | 2022-03-01 |
| PublicationDate_xml | – month: 03 year: 2022 text: March 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Applied soft computing |
| PublicationYear | 2022 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Jøsang, Ismail, Boyd (b12) 2007; 43 Massa, Avesani (b13) 2007; 3 Golbeck, Hendler (b22) 2006; 6 Jiang, Wu, Li, Wang, Zheng (b14) 2015; 65 Xu, Liu, Jiao, Li, Feng, Liang (b16) 2020; 27 Kim, Song (b30) 2011; 24 Wang, Luo, Jia, Liu, Xie (b7) 2019 Jiang, Wang, Bhuiyan, Wu (b11) 2016; 49 Kim (b26) 2015; 82 Golbeck (b10) 2005 Ghavipour, Meybodi (b34) 2018; 143 Wang, Wu (b21) 2011; 5 Cai, Yan, Gong, Wei (b5) 2020 W. Lin, Z. Gao, B. Li, Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks, in: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 914–923. Jøsang, Gray, Kinateder (b27) 2006; 4 Lesani, Montazeri (b28) 2009; 25 Wang, Wu (b25) 2011; 27 Cormen, Leiserson, Rivest, Stein (b31) 2009 Jiang, Wang, Wu (b1) 2014; 31 X. Zhuang, X. Tong, A Local Trust Inferring Algorithm based on Reinforcement Learning DoubleDQN in Online Social Networks, in: 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI, 2020, pp. 1064–1069. Cho, Swami, Chen (b29) 2012; 35 Rezvanian, Moradabadi, Ghavipour, Khomami, Meybodi (b32) 2019 Gong, Wang, Guo, Gong, Wei (b15) 2020; 508 Granovetter (b37) 1977 Ureña, Chiclana, Herrera-Viedma (b19) 2020 Gong, Guo, Herrera-Viedma, Gong, Wei (b4) 2020; 283 M. Richardson, R. Agrawal, P. Domingos, Trust management for the semantic web, in: International Semantic Web Conference, 2003, pp. 351–368. Chen, Yuan, Orgun, Lu (b18) 2020 Narendra, Thathachar (b24) 2012 Beigy, Meybodi (b33) 2009; 40 Zhang, Wen, Wang, Zhao (b8) 2018; 26 Guo, Liu, Ota, Dong, Deng, Xiong (b17) 2021 Shekarpour, Katebi (b36) 2010; 8 N. Fatehi, H. Shahhoseini, A Hybrid Algorithm for Evaluating Trust in Online Social Networks, in: 2020 10th International Conference on Computer and Knowledge Engineering, ICCKE, 2020, pp. 158–162. Jiang, Cheng, Yang, Li, Yan, Wang (b3) 2019; 10 Huang, Heidergott, Lindner (b23) 2019; 58 Tahta, Sen, Can (b6) 2015; 34 Jiang (10.1016/j.asoc.2022.108475_b1) 2014; 31 Jiang (10.1016/j.asoc.2022.108475_b11) 2016; 49 Beigy (10.1016/j.asoc.2022.108475_b33) 2009; 40 Cho (10.1016/j.asoc.2022.108475_b29) 2012; 35 Gong (10.1016/j.asoc.2022.108475_b15) 2020; 508 Gong (10.1016/j.asoc.2022.108475_b4) 2020; 283 Jøsang (10.1016/j.asoc.2022.108475_b12) 2007; 43 Xu (10.1016/j.asoc.2022.108475_b16) 2020; 27 Wang (10.1016/j.asoc.2022.108475_b7) 2019 Golbeck (10.1016/j.asoc.2022.108475_b22) 2006; 6 Kim (10.1016/j.asoc.2022.108475_b30) 2011; 24 Cormen (10.1016/j.asoc.2022.108475_b31) 2009 10.1016/j.asoc.2022.108475_b20 Jiang (10.1016/j.asoc.2022.108475_b3) 2019; 10 Wang (10.1016/j.asoc.2022.108475_b21) 2011; 5 Shekarpour (10.1016/j.asoc.2022.108475_b36) 2010; 8 Narendra (10.1016/j.asoc.2022.108475_b24) 2012 Kim (10.1016/j.asoc.2022.108475_b26) 2015; 82 Ghavipour (10.1016/j.asoc.2022.108475_b34) 2018; 143 Cai (10.1016/j.asoc.2022.108475_b5) 2020 Wang (10.1016/j.asoc.2022.108475_b25) 2011; 27 Huang (10.1016/j.asoc.2022.108475_b23) 2019; 58 Massa (10.1016/j.asoc.2022.108475_b13) 2007; 3 Jiang (10.1016/j.asoc.2022.108475_b14) 2015; 65 Granovetter (10.1016/j.asoc.2022.108475_b37) 1977 10.1016/j.asoc.2022.108475_b2 Tahta (10.1016/j.asoc.2022.108475_b6) 2015; 34 Rezvanian (10.1016/j.asoc.2022.108475_b32) 2019 Golbeck (10.1016/j.asoc.2022.108475_b10) 2005 Zhang (10.1016/j.asoc.2022.108475_b8) 2018; 26 10.1016/j.asoc.2022.108475_b35 10.1016/j.asoc.2022.108475_b9 Ureña (10.1016/j.asoc.2022.108475_b19) 2020 Lesani (10.1016/j.asoc.2022.108475_b28) 2009; 25 Chen (10.1016/j.asoc.2022.108475_b18) 2020 Jøsang (10.1016/j.asoc.2022.108475_b27) 2006; 4 Guo (10.1016/j.asoc.2022.108475_b17) 2021 |
| References_xml | – volume: 40 start-page: 101 year: 2009 end-page: 118 ident: b33 article-title: A learning automata-based algorithm for determination of the number of hidden units for three-layer neural networks publication-title: Internat. J. Systems Sci. – volume: 143 start-page: 307 year: 2018 end-page: 316 ident: b34 article-title: Trust propagation algorithm based on learning automata for inferring local trust in online social networks publication-title: Knowl.-Based Syst. – reference: N. Fatehi, H. Shahhoseini, A Hybrid Algorithm for Evaluating Trust in Online Social Networks, in: 2020 10th International Conference on Computer and Knowledge Engineering, ICCKE, 2020, pp. 158–162. – volume: 26 start-page: 468 year: 2018 end-page: 477 ident: b8 article-title: A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory publication-title: J. Comput. Sci. – volume: 49 start-page: 10 year: 2016 ident: b11 article-title: Understanding graph-based trust evaluation in online social networks: Methodologies and challenges publication-title: ACM Comput. Surv. – volume: 65 start-page: 952 year: 2015 end-page: 963 ident: b14 article-title: Trust evaluation in online social networks using generalized network flow publication-title: IEEE Trans. Comput. – reference: W. Lin, Z. Gao, B. Li, Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks, in: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 914–923. – volume: 58 start-page: 1 year: 2019 end-page: 11 ident: b23 article-title: Naïve learning in social networks with random communication publication-title: Social Networks – volume: 10 start-page: 3023 year: 2019 end-page: 3034 ident: b3 article-title: A trust-based collaborative filtering algorithm for E-commerce recommendation system publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 43 start-page: 618 year: 2007 end-page: 644 ident: b12 article-title: A survey of trust and reputation systems for online service provision publication-title: Decis. Support Syst. – volume: 6 start-page: 497 year: 2006 end-page: 529 ident: b22 article-title: Inferring binary trust relationships in web-based social networks publication-title: ACM Trans. Internet Technol. (TOIT) – year: 2005 ident: b10 article-title: Computing and Applying Trust in Web-Based Social Networks – volume: 27 start-page: 72 year: 2020 end-page: 78 ident: b16 article-title: Trust2Privacy: a novel fuzzy trust-to-privacy mechanism for mobile social networks publication-title: IEEE Wirel. Commun. – volume: 35 start-page: 1001 year: 2012 end-page: 1012 ident: b29 article-title: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks publication-title: J. Netw. Comput. Appl. – start-page: 1 year: 2020 end-page: 24 ident: b5 article-title: A voting mechanism designed for talent shows in mass media: Weighted preference of group decision makers in social networks using fuzzy measures and choquet integral publication-title: Group Decis. Negot. – reference: X. Zhuang, X. Tong, A Local Trust Inferring Algorithm based on Reinforcement Learning DoubleDQN in Online Social Networks, in: 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI, 2020, pp. 1064–1069. – year: 2021 ident: b17 article-title: ITCN: an intelligent trust collaboration network system in IoT publication-title: IEEE Trans. Netw. Sci. Eng. – volume: 34 start-page: 693 year: 2015 end-page: 704 ident: b6 article-title: GenTrust: A genetic trust management model for peer-to-peer systems publication-title: Appl. Soft Comput. – volume: 5 start-page: 181 year: 2011 ident: b21 article-title: FlowTrust: Trust inference with network flows publication-title: Front. Comput. Sci. China – volume: 283 start-page: 290 year: 2020 end-page: 307 ident: b4 article-title: Consistency and consensus modeling of linear uncertain preference relations publication-title: European J. Oper. Res. – volume: 3 start-page: 39 year: 2007 end-page: 64 ident: b13 article-title: Trust metrics on controversial users: Balancing between tyranny of the majority publication-title: Int. J. Semant. Web Inform. Syst. (IJSWIS) – reference: M. Richardson, R. Agrawal, P. Domingos, Trust management for the semantic web, in: International Semantic Web Conference, 2003, pp. 351–368. – year: 2020 ident: b19 article-title: DeciTrustNET: A graph based trust and reputation framework for social networks publication-title: Inf. Fusion – year: 2020 ident: b18 article-title: A topic-sensitive trust evaluation approach for users in online communities publication-title: Knowl.-Based Syst. – volume: 27 start-page: 529 year: 2011 end-page: 538 ident: b25 article-title: Multi-dimensional evidence-based trust management with multi-trusted paths publication-title: Future Gener. Comput. Syst. – volume: 82 start-page: 20 year: 2015 end-page: 28 ident: b26 article-title: An enhanced trust propagation approach with expertise and homophily-based trust networks publication-title: Knowl.-Based Syst. – year: 2009 ident: b31 article-title: Introduction to Algorithms – start-page: 347 year: 1977 end-page: 367 ident: b37 article-title: The strength of weak ties publication-title: Social Networks – volume: 508 start-page: 154 year: 2020 end-page: 172 ident: b15 article-title: Measuring trust in social networks based on linear uncertainty theory publication-title: Inform. Sci. – year: 2012 ident: b24 article-title: Learning Automata: An Introduction – volume: 4 start-page: 139 year: 2006 end-page: 161 ident: b27 article-title: Simplification and analysis of transitive trust networks publication-title: Web Intell. Agent Syst. Int. J. – volume: 25 start-page: 51 year: 2009 end-page: 83 ident: b28 article-title: Fuzzy trust aggregation and personalized trust inference in virtual social networks publication-title: Comput. Intell. – volume: 24 start-page: 1360 year: 2011 end-page: 1371 ident: b30 article-title: Strategies for predicting local trust based on trust propagation in social networks publication-title: Knowl.-Based Syst. – volume: 8 start-page: 26 year: 2010 end-page: 36 ident: b36 article-title: Modeling and evaluation of trust with an extension in semantic web publication-title: Web Semant. Sci. Serv. Ag. World Wide Web – year: 2019 ident: b7 article-title: MTES: An intelligent trust evaluation scheme in sensor-cloud enabled industrial internet of things publication-title: IEEE Trans. Ind. Inf. – volume: 31 start-page: 48 year: 2014 end-page: 58 ident: b1 article-title: Generating trusted graphs for trust evaluation in online social networks publication-title: Future Gener. Comput. Syst. – start-page: 1 year: 2019 end-page: 49 ident: b32 article-title: Introduction to learning automata models publication-title: Learning Automata Approach for Social Networks – year: 2009 ident: 10.1016/j.asoc.2022.108475_b31 – volume: 143 start-page: 307 year: 2018 ident: 10.1016/j.asoc.2022.108475_b34 article-title: Trust propagation algorithm based on learning automata for inferring local trust in online social networks publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2017.06.034 – ident: 10.1016/j.asoc.2022.108475_b2 doi: 10.1109/ICCKE50421.2020.9303641 – volume: 65 start-page: 952 year: 2015 ident: 10.1016/j.asoc.2022.108475_b14 article-title: Trust evaluation in online social networks using generalized network flow publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2015.2435785 – ident: 10.1016/j.asoc.2022.108475_b20 doi: 10.1109/CISP-BMEI51763.2020.9263509 – volume: 40 start-page: 101 year: 2009 ident: 10.1016/j.asoc.2022.108475_b33 article-title: A learning automata-based algorithm for determination of the number of hidden units for three-layer neural networks publication-title: Internat. J. Systems Sci. doi: 10.1080/00207720802145924 – volume: 24 start-page: 1360 year: 2011 ident: 10.1016/j.asoc.2022.108475_b30 article-title: Strategies for predicting local trust based on trust propagation in social networks publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2011.06.009 – volume: 6 start-page: 497 year: 2006 ident: 10.1016/j.asoc.2022.108475_b22 article-title: Inferring binary trust relationships in web-based social networks publication-title: ACM Trans. Internet Technol. (TOIT) doi: 10.1145/1183463.1183470 – volume: 35 start-page: 1001 year: 2012 ident: 10.1016/j.asoc.2022.108475_b29 article-title: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2011.03.016 – year: 2012 ident: 10.1016/j.asoc.2022.108475_b24 – volume: 82 start-page: 20 year: 2015 ident: 10.1016/j.asoc.2022.108475_b26 article-title: An enhanced trust propagation approach with expertise and homophily-based trust networks publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2015.02.023 – year: 2020 ident: 10.1016/j.asoc.2022.108475_b19 article-title: DeciTrustNET: A graph based trust and reputation framework for social networks publication-title: Inf. Fusion doi: 10.1016/j.inffus.2020.03.006 – year: 2005 ident: 10.1016/j.asoc.2022.108475_b10 – year: 2021 ident: 10.1016/j.asoc.2022.108475_b17 article-title: ITCN: an intelligent trust collaboration network system in IoT publication-title: IEEE Trans. Netw. Sci. Eng. – volume: 508 start-page: 154 year: 2020 ident: 10.1016/j.asoc.2022.108475_b15 article-title: Measuring trust in social networks based on linear uncertainty theory publication-title: Inform. Sci. doi: 10.1016/j.ins.2019.08.055 – start-page: 1 year: 2020 ident: 10.1016/j.asoc.2022.108475_b5 article-title: A voting mechanism designed for talent shows in mass media: Weighted preference of group decision makers in social networks using fuzzy measures and choquet integral publication-title: Group Decis. Negot. – volume: 43 start-page: 618 year: 2007 ident: 10.1016/j.asoc.2022.108475_b12 article-title: A survey of trust and reputation systems for online service provision publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2005.05.019 – volume: 3 start-page: 39 year: 2007 ident: 10.1016/j.asoc.2022.108475_b13 article-title: Trust metrics on controversial users: Balancing between tyranny of the majority publication-title: Int. J. Semant. Web Inform. Syst. (IJSWIS) doi: 10.4018/jswis.2007010103 – volume: 34 start-page: 693 year: 2015 ident: 10.1016/j.asoc.2022.108475_b6 article-title: GenTrust: A genetic trust management model for peer-to-peer systems publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2015.04.053 – volume: 31 start-page: 48 year: 2014 ident: 10.1016/j.asoc.2022.108475_b1 article-title: Generating trusted graphs for trust evaluation in online social networks publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2012.06.010 – volume: 10 start-page: 3023 year: 2019 ident: 10.1016/j.asoc.2022.108475_b3 article-title: A trust-based collaborative filtering algorithm for E-commerce recommendation system publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-018-0928-7 – start-page: 1 year: 2019 ident: 10.1016/j.asoc.2022.108475_b32 article-title: Introduction to learning automata models – volume: 26 start-page: 468 year: 2018 ident: 10.1016/j.asoc.2022.108475_b8 article-title: A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory publication-title: J. Comput. Sci. doi: 10.1016/j.jocs.2017.05.018 – volume: 5 start-page: 181 year: 2011 ident: 10.1016/j.asoc.2022.108475_b21 article-title: FlowTrust: Trust inference with network flows publication-title: Front. Comput. Sci. China doi: 10.1007/s11704-011-0323-4 – start-page: 347 year: 1977 ident: 10.1016/j.asoc.2022.108475_b37 article-title: The strength of weak ties – volume: 49 start-page: 10 year: 2016 ident: 10.1016/j.asoc.2022.108475_b11 article-title: Understanding graph-based trust evaluation in online social networks: Methodologies and challenges publication-title: ACM Comput. Surv. – ident: 10.1016/j.asoc.2022.108475_b9 doi: 10.1109/INFOCOM41043.2020.9155370 – volume: 25 start-page: 51 year: 2009 ident: 10.1016/j.asoc.2022.108475_b28 article-title: Fuzzy trust aggregation and personalized trust inference in virtual social networks publication-title: Comput. Intell. doi: 10.1111/j.1467-8640.2009.00334.x – volume: 8 start-page: 26 year: 2010 ident: 10.1016/j.asoc.2022.108475_b36 article-title: Modeling and evaluation of trust with an extension in semantic web publication-title: Web Semant. Sci. Serv. Ag. World Wide Web doi: 10.1016/j.websem.2009.11.003 – year: 2019 ident: 10.1016/j.asoc.2022.108475_b7 article-title: MTES: An intelligent trust evaluation scheme in sensor-cloud enabled industrial internet of things publication-title: IEEE Trans. Ind. Inf. – ident: 10.1016/j.asoc.2022.108475_b35 doi: 10.1007/978-3-540-39718-2_23 – volume: 27 start-page: 72 year: 2020 ident: 10.1016/j.asoc.2022.108475_b16 article-title: Trust2Privacy: a novel fuzzy trust-to-privacy mechanism for mobile social networks publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.001.1900440 – volume: 27 start-page: 529 year: 2011 ident: 10.1016/j.asoc.2022.108475_b25 article-title: Multi-dimensional evidence-based trust management with multi-trusted paths publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2010.04.015 – volume: 4 start-page: 139 year: 2006 ident: 10.1016/j.asoc.2022.108475_b27 article-title: Simplification and analysis of transitive trust networks publication-title: Web Intell. Agent Syst. Int. J. – volume: 58 start-page: 1 year: 2019 ident: 10.1016/j.asoc.2022.108475_b23 article-title: Naïve learning in social networks with random communication publication-title: Social Networks doi: 10.1016/j.socnet.2019.01.004 – year: 2020 ident: 10.1016/j.asoc.2022.108475_b18 article-title: A topic-sensitive trust evaluation approach for users in online communities publication-title: Knowl.-Based Syst. – volume: 283 start-page: 290 year: 2020 ident: 10.1016/j.asoc.2022.108475_b4 article-title: Consistency and consensus modeling of linear uncertain preference relations publication-title: European J. Oper. Res. doi: 10.1016/j.ejor.2019.10.035 |
| SSID | ssj0016928 |
| Score | 2.4228814 |
| Snippet | Online social networks (OSNs) are becoming a popular tool for people to socialize and keep in touch with their friends. OSNs need trust evaluation models and... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 108475 |
| SubjectTerms | Evaluation Learning automata Online social network Trust |
| Title | An automata algorithm for generating trusted graphs in online social networks |
| URI | https://dx.doi.org/10.1016/j.asoc.2022.108475 |
| Volume | 118 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-9681 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016928 issn: 1568-4946 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier Science Direct Journals customDbUrl: eissn: 1872-9681 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016928 issn: 1568-4946 databaseCode: AIKHN dateStart: 20010601 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect (LUT) customDbUrl: eissn: 1872-9681 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016928 issn: 1568-4946 databaseCode: ACRLP dateStart: 20010601 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Science Direct customDbUrl: eissn: 1872-9681 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016928 issn: 1568-4946 databaseCode: .~1 dateStart: 20010601 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-9681 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016928 issn: 1568-4946 databaseCode: AKRWK dateStart: 20010601 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENhSax8xqriqq8KgRU6hbZjlOKSlqpZeW3c2c7FUioA1OU6GxFX5y7z8l3d4RcBkGssYk1pigzjxei8GScKk9KoK_wYspSG4HsMB6M-N04GjdIr86FQVml8_3Wpxtv7a50HJqdxXTaeYGdR8phvjA0_8Mwo5zzBLsYXH-tZR5BnJn-qmjsobVLnLEaLwEIwB4xDFFqx1Fr-Fdw-hFw-ntkxzFF2rU3s08aujogu3UXBupeykPy2K2o-FzNgXoKKmaTOWz33z4okFE6MTWlUdhMTW6FLqgpUL2k04raGhnUfjSnlZWDL4_IqH_z2ht4rkmCp5jvr7xEiKSQEeNSAbNJdSIjCNqskL70kzLjnGnNspLFqc6KOFPCD8pCYZWYUMdpqdgxaVbzSp8QGjDBg6RUWVjCXGCcZCoMGEwMNAaCXYsENTq5chXEsZHFLK-lYu85IpojorlFtEWu1mMWtn7GRuuoBj3_tQpycPAbxp3-c9wZ2cYzqyk7J014FvoCSMZKts0qapOtbu_54QmPt_eD4TfT0NIB |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKGWDhjShPD2woNLGdOBmrClSg7UIrdYtsx4GiklZqWfntnB-pQEIMrMmdFX2x75F8d4fQdRQl2gyxNiXKNGCFKAKZpCqQEsJXOJiy1JYgO0x6Y_Y4iScN1K1rYQyt0tt-Z9OttfZX2h7N9mI6bT9D5pEyWI8Q-z-Mb6BNFhNuMrDbzzXPI0oyO2DVSAdG3FfOOJKXAAggSSTEcO2YIRv-5p2-eZz7PbTjQ0XccU-zjxq6OkC79RgG7E_lIRp0Kiw-VnOIPQUWs5c55Puv7xiiUfxim0obZjO2xRW6wLZD9RJPK-yaZGD31RxXjg--PELj-7tRtxf4KQmBomG4CrgQvJAxZVJBaJNqLmPw2rSQoQx5mTFGtaZZSZNUZ0WSKRFGZaFMmxiik7RU9Bg1q3mlTxCOqGARL1VGSlgLhHmmSERhYYhjwNu1UFSjkyvfQtxMspjlNVfsLTeI5gbR3CHaQjdrnYVroPGndFyDnv_YBjlY-D_0Tv-pd4W2eqNBP-8_DJ_O0La54whm56gJ70VfQMSxkpd2R30BS-nSAQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+automata+algorithm+for+generating+trusted+graphs+in+online+social+networks&rft.jtitle=Applied+soft+computing&rft.au=Fatehi%2C+Nina&rft.au=Shahhoseini%2C+Hadi+Shahriar&rft.au=Wei%2C+Jesse&rft.au=Chang%2C+Ching-Ter&rft.date=2022-03-01&rft.issn=1568-4946&rft.volume=118&rft.spage=108475&rft_id=info:doi/10.1016%2Fj.asoc.2022.108475&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_asoc_2022_108475 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1568-4946&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1568-4946&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1568-4946&client=summon |