Monday, June 3, 2019

Trust Inference Model Proposal

boldness Inference Model Proposal(step1-13 in Alg. 4) in the continu-ous case. For advogato data set, we directly report the results on only the six snapshots (i.e., advogato-1, . . . , advogato-6). For PGP, we intake its subsets to study the scalability. The result is shown in Fig. 6, which is consistent with the complex-ity analysis in Section 4.3. As we can see from the figure, MATRI scales linearly wrt to both n and K, indicating that it is suitable for large-scale applications. The scalability result for the binary case is similar, and we omit the figures for brevity. (b) (c) (d)Fig. 3. Scalability of the proposed MATRI for continuous case. MATRI scales linearly wrt the data size (n and K). (a) Wall-clock sentence vs. n on advogato. (b) Wall-clock season vs. K on advogato. (c) Wall-clock time vs. n on PGP. (d) Wall-clock time vs. K on PGP.Fig. 4. Comparisons of alternative solutions of MATRI. Compared to MATRI-AA, MATRI-SS and MATRI-AS are more than than 10x faster while p reserving more than 90% verity on both data sets. (a) advogato data set. (b) PGP data set.(C) Comparisons of the Alternatives of MATRI. As men-tioned before, the stochastic gradient descent method (SGD) could also be apply for the continuous cartel consequence prob-lem in computing propagation vector and solving Eq. (5). We now experimentally evaluate the efficiency of all the four alternatives of MATRI. We use MATRI-AA to denote the original MATRI, MATRI-SA to denote the case when we use SGD in the propagation step, MATRI-AS.VI RELATED WORKIn this section, we briefly review related work, includ-ing believe propagation models, multi-aspect depose inference models, etc.Trust Propagation Models. To date, a large body of consecrate inference models are based on confide propagation where trust is propagated along connected users in the trust net-work, i.e., the web of locally-generated trust ratings. Based on the interpretation of trust propagation, we further cate-gorize these models into two classes fashion interpretation and component interpretation.The proposed MATRI integrates the trust propagation with two other important properties, i.e., the multi-aspect of trust and trust bias. In addition, our multi-aspect model offers a natural way to focal ratio up on-line query response as well as to mitigate the sparsity or c all overage problem in trust inference where some trustor and trustee might not be connected with each other both are known limitations with the current trust propagation models 10. Multi-Aspect Trust Inference Models. Social scientists micturate explored the multi-aspect property of trust for several years 8. In computer science, there also exist a few trust inference models that explicitly explores the trust propagation.Trust Bias in Trust Inference. In sociology, it was dis-covered a long time ago that trust bias is an inviolate part in the final trust decision 9. Nonetheless, this important aspect has been largely ignored in mos t of the existing trust inference models. iodine exception is from Nguyen et al. 13, which learns the importance of several trust bias related features derived from a accessible trust framework. Recently, Mishra et al. 25 propose an iterative algorithm to compute trust bias. diverse from these existing works, our focus is to incorporate various types of trust bias as specified factors/aspects to increase the accuracy of trust inference.VII CONCLUSIONIn this paper, we have proposed a trust inference model, as well as a family of algorithms to apply the model to both continuous and binary inference scenarios. The basic report of the proposed MATRI is to leverage the multi-aspect property of trust by characterizing several aspects/factors for each trustor and trustee based on the existing trust relationships. In addition, MATRI incorporates the trust propagation and trust bias and further learns their rela-tive weights. By integrating all these important properties, our experiment al evaluations on real benchmark data sets show that MATRI leads to significant improvement over several benchmark approaches in prediction accuracy, for both quantifying numerical trustworthiness scores and pre-dicting binary trust/distrust signs. The proposed MATRI is also nimble it is up to 7 orders of magnitude faster than the existing trust propagation methods in the on-line query response, and in the meanwhile it enjoys the linear scalabil-ity for the pre-computational stage in both time and space. Future work includes investigating the capability of MATRI to address the trust dynamics.REFERENCESC. Ziegler and G. Lausen, Propagation models for trust and distrust in social networks, Inform. Syst. Front., vol. 7, no. 4, pp.337358, 2005.A. Jsang and R. Ismail, The genus Beta reputation system, in Proc. 15th Bled Electron. Comm. Conf., vol. 160. Bled, Slovenia, Jun. 2002.S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The Eigentrust algorithm for reputation management in P2P net-works, in Proc. 12th Int. Conf. WWW, Budapest, Hungary, 2003, pp.640651.M. Richardson, R. Agrawal, and P. Domingos, Trust management for the semantic web, in Proc. 2nd ISWC, Sanibel Island, FL, USA, 2003, pp. 351368.D. Cartwright and F. Harary, geomorphologic balance A generalization of Heiders theory, Psychol. Rev., vol. 63, no. 5, pp. 277293, 1956.G. Liu, Y. Wang, and M. Orgun, Trust transitivity in complex social networks, in Proc. AAAI, 2011, pp. 12221229.D. Gefen, Reflections on the dimensions of trust and trustwor-thiness among online consumers, ACM SIGMIS Database, vol. 33, no. 3, pp. 3853, 2002.D. Sirdeshmukh, J. Singh, and B. Sabol, Consumer trust, value, and loyalty in relational exchanges, J. Marketing, vol. 66, no. 1, pp.1537, 2002.A. Tversky and D. Kahneman, Judgment under uncertainty Heuristics and biases, Sci., vol. 185, no. 4157, pp. 11241131, 1974.Y. Yao, H. Tong, F. Xu, and J. Lu, Subgraph extraction for trust inference in social networks, in Proc. IEEE/ACM In t. Conf. ASONAM, Istanbul, Turkey, 2012, pp. 163170.L. Xiong and L. Liu, Peertrust reinforcement reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843857, Jul. 2004.J. Tang, H. Gao, and H. Liu, mTrust Discerning multi-faceted trust in a connected world, in Proc. 5th ACM Int. Conf. WSDM, Washingtion, DC, USA, 2012, pp. 93102.V. Nguyen, E. Lim, J. Jiang, and A. Sun, To trust or not to trust? Predicting online trusts using trust antecedent framework, in Proc. 9th IEEE ICDM, Miami, FL, USA, 2009, pp. 896901.Y. Koren, Factorization meets the neighborhood A multifaceted collaborative filtering model, in Proc. 14th ACM SIGKDD Int. Conf. KDD, New York, NY, USA, 2008, pp. 426434.R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, in Proc. 13th Int. Conf. WWW, New York, NY, USA, 2004, pp. 403412.Y. Koren, R. Bell, and C. Volinsky, Matrix factoring techniques for recommender systems, Comput., vol. 42, no. 8, pp. 3037, 2009.P. Massa and P. Avesani, Controversial users demand local trust metrics An experimental study on epinions. com community, in Proc. twentieth Nat. Conf. AAAI, 2005, pp. 121126.B. Lang, A computational trust model for access control in P2P, Sci. China Inform. Sci., vol. 53, no. 5, pp. 896910, 2010.R. Bell, Y. Koren, and C. Volinsky, Modeling relationships at mul-tiple scales to improve accuracy of large recommender systems, in Proc. 13th ACM SIGKDD Int. Conf. KDD, New York, NY, USA, 2007, pp. 95104.H. Ma, M. Lyu, and I. King, Learning to recommend with trust and distrust relationships, in Proc. 3rd ACM Conf. RecSys, New York, NY, USA, 2009, pp. 189196.A. Buchanan and A. Fitzgibbon, Damped Newton algorithms for matrix factorization with missing data, in Proc. IEEE CVPR, vol. 2. Washington, DC, USA, 2005, pp. 316322.X. Liu, A. Datta, K. Rzadca, and E. Lim, Stereotrust A group based personalized trust model, in Proc. 18th ACM CIKM, Hong Kong, China, 2009, pp. 71 6.D. Watts and S. Strogatz, Collective dynamics of small-world networks, Nature, vol. 393, no. 6684, pp. 440442, 1998.J. Leskovec, J. Kleinberg, and C. Faloutsos, Graphs over time Densification laws, shrinking diameters and possible explana-tions, in Proc. 11th ACM SIGKDD Int. Conf. KDD, Chicago, IL, USA, 2005, pp. 177187.C.-W. Hang, Y. Wang, and M. P. Singh, Operators for propagating trust and their evaluation in social networks, in Proc. 8th Int. Conf. AAMAS, Budapest, Hungary, 2009, pp. 10251032.J. Leskovec, D. Huttenlocher, and J. Kleinberg, Predicting posi-tive and negative links in online social networks, in Proc. 19th Int. Conf. WWW, Raleigh, NC, USA, 2010, pp. 641650.Y. Wang and M. P. Singh, Trust representation and aggregation in a distributed agent system, in Proc. 21st Nat. Conf. AAAI, 2006, pp.14251430.Y. Wang and M. P. Singh, Formal trust model for multiagent systems, in Proc. 20th IJCAI, San Francisco, CA, USA, 2007, pp.15511556.C. Hsieh, K. Chiang, and I. Dhillon, Low rank modeling of signed networks, in Proc. 18th ACM SIGKDD Int. Conf. KDD, Beijing, China, 2012, pp. 507515.K.-Y. Chiang, N. Natarajan, A. Tewari, and I. S. Dhillon, Exploiting longer cycles for link prediction in signed net-works, in Proc. 20th ACM CIKM, Glasgow, Scotland, U.K., 2011, pp.11571162.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.