User Trust Inference in Online Social Networks: A Message Passing Perspective
<p>Two primary trust propagation strategies. (<b>a</b>) Direct trust propagation. (<b>b</b>) Transposed trust propagation.</p> "> Figure 2
<p>Demonstration of one user trusting another in the real world and in the proposed model. (<b>a</b>) Real-world trust relationship representation: <math display="inline"><semantics> <msub> <mi>user</mi> <mi mathvariant="normal">A</mi> </msub> </semantics></math> trusts <math display="inline"><semantics> <msub> <mi>user</mi> <mi mathvariant="normal">B</mi> </msub> </semantics></math>. (<b>b</b>) <math display="inline"><semantics> <msub> <mi>user</mi> <mi mathvariant="normal">A</mi> </msub> </semantics></math> trusting <math display="inline"><semantics> <msub> <mi>user</mi> <mi mathvariant="normal">B</mi> </msub> </semantics></math> rendered in the proposed model.</p> "> Figure 3
<p>A demonstration of modeling two users’ mutual relationship in the proposed model.</p> "> Figure 4
<p>Illustration of direct trust and transposed trust for a trustRelation node in a 3-trustRelation-nodes motif. (<math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mn>2</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mn>3</mn> </msub> </semantics></math> contribute direct trust to <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mn>1</mn> </msub> </semantics></math>; and <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mrow> <mn>2</mn> <mo>′</mo> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mrow> <mn>3</mn> <mo>′</mo> </mrow> </msub> </semantics></math> contribute transposed trust to <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mn>1</mn> </msub> </semantics></math>).</p> "> Figure 5
<p>An illustration of passing messages through a trustor node <math display="inline"><semantics> <msub> <mi mathvariant="normal">U</mi> <mi mathvariant="normal">A</mi> </msub> </semantics></math> and a trustee node <math display="inline"><semantics> <msub> <mi mathvariant="normal">U</mi> <mi mathvariant="normal">B</mi> </msub> </semantics></math> to a trustRelation node <math display="inline"><semantics> <msub> <mi mathvariant="normal">T</mi> <mi>AB</mi> </msub> </semantics></math>.</p> "> Figure 6
<p>Performance results of the proposed model evaluated by Accuracy (Acc) and <math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math> score for the first set of experiments. (<b>a</b>) Experiments 1, 2, 5, 6, 8 (Acc). (<b>b</b>) Experiments 1, 3, 5, 7, 8 (Acc). (<b>c</b>) Experiments 1, 4, 6, 7, 8 (Acc). (<b>d</b>) Experiments 1, 2, 5, 6, 8 (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>e</b>) Experiments 1, 3, 5, 7, 8 (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>f</b>) Experiments 1, 4, 6, 7, 8 (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>).</p> "> Figure 7
<p>Performance results of the proposed model and comparison methods evaluated by accuracy for the second set of experiments. (<b>a</b>) Experiment 2s (Acc). (<b>b</b>) Experiment 3s (Acc). (<b>c</b>) Experiment 4s (Acc). (<b>d</b>) Experiment 5s (Acc). (<b>e</b>) Experiment 6s (Acc). (<b>f</b>) Experiment 7s (Acc).</p> "> Figure 8
<p>Performance results of the proposed model and comparison methods evaluated by <math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math> score for the second set of experiments. (<b>a</b>) Experiment 2s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>b</b>) Experiment 3s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>c</b>) Experiment 4s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>d</b>) Experiment 5s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>e</b>) Experiment 6s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>). (<b>f</b>) Experiment 7s (<math display="inline"><semantics> <msub> <mi mathvariant="normal">F</mi> <mn>1</mn> </msub> </semantics></math>).</p> ">
Abstract
:1. Introduction
- The proposed model takes advantage of the integration of the trust network and user-generated contents in the network; the latter is embedded into a probabilistic graphical model built upon the former. The model permits the directionality of trust relationships and preserves various facets and properties of trust. The way of both building features from UGC data and embedding them into the probabilistic graph preserves as much information as the data may contain.
- To infer trust, the proposed model uses a message passing algorithm, loopy belief propagation, for the model’s probabilistic inference. This inference algorithm can be viewed as a reproduction of the propagative and incomplete transitive characteristics of trust. By using the message passing algorithm, the resulting probability for each predicted user-to-user trust relationship can be well interpreted.
- As a binary classification task, the performance of the proposed method to infer trust is demonstrated with a dataset derived from a real online social network in comparison with some state-of-the-art binary classifiers. Experimental results show the proposed model achieves better accuracy and score with the whole data presented and maintained higher recall and acceptable precision with some of data absent. Thus, one can conclude that the proposed model shows its promising ability for trust inference in nowadays privacy-constrained online social analysis where available data are often limited. To address the data limitation, the problem that a model should have higher precision or higher recall is also discussed.
2. Related Work
3. The Proposed Model
3.1. Prerequisites
- Due to some particular or unknown facts, Alice does not trust Bob; the trust relationship does not exist, and therefore, it will never be observed.
- It might be possible that Alice would trust Bob at some time later, but at the time we observe the social network or capture a snapshot of the network as a dataset, Alice does not know Bob yet or Alice does not claim to trust Bob yet, so the trust relationship from Alice to Bob does not exist.
- Alice does trust Bob and the trust relationship does exist in the real network, but it is missing from the dataset we observe. The cause could be the inability of capturing the whole network or capturing their relationship data being prohibited by the privacy preference settings of relevant users.
- Direct trust propagation may exist from Alice to Chris when Alice trusts Bob and Bob trusts Chris.
- Transposed trust propagation may exist from Alice to Chris when Alice trusts Bob and Chris also trusts Bob.
3.2. Model Construction
- user node. It can be either a trustor node or a trustee node;
- trustRelation node. It represents an observable or a nonexistent trust link in the network.
3.2.1. Notation and Problem Definition
3.2.2. Features
- For each user , we create a feature vector . Each feature of this type is a label-observation feature.
- For each edge or edge, we create a feature vector or , respectively. Each feature of this type is a label-label-observation feature.
- Parts-of-speech (POS) used in this paper include nouns, verbs, adjectives, adverbs and conjunctions. These POS are mostly-used classes of words and may have different impacts across reviews. We use the ratio of the number of words in each POS type to the number of segments in a review as the feature value.
- The Subjectivity and Polarity of a word or a phrase describes whether the segment expresses either a positive or a negative meaning in either strong or weak subjective way. These words can have various parts-of-speech. We use the ratio of the number of these words or phrases to the number of segments in a review as the feature value.
- Indicative words could imply whether a post will be more credible or less convincing. They’re functioning as assertives, factives, implicatives, report verbs, hedges or biased words. The lexicons are from [40,44]. Similarly, we use the ratio of the number of these words to the number of segments in a review as the feature value.
- For each edge or edge, we create a feature vector or , respectively. Each feature of this type is a label-label-observation feature.
- Direct trust propagation feature will try to capture how much Alice will trust Chris if Alice trusts Bob and Bob trusts Chris.
- Transposed trust propagation feature will try to describe how much Alice will trust Chris if Alice and Chris both trust Bob.
- One of the three nodes in the motif is trustRelation node . The other two different trustRelation nodes and are in the set of trustRelation nodes that are present in the dataset.
- The trustor node linked to is also linked to as a trustor node.
- The trustee node linked to is also linked to as
- –
- either a trustee node (for direct trust for trustRelation node ) while the trustee node of is the trustor node of ,
- –
- or a trustor node (for transposed trust for trustRelation node ) while the trustee node of is also the trustee node of .
- For each trustRelation node , we check if any instance of the 16 state sequences exists to generate trust propagation features, by applying the above criteria to all 3-trustRelation-nodes motifs in which acts as , and then create a feature vector to include these features. Each of them is a label-observation feature.
- One category of auxiliary edge features will be attached to each edge between a user node and a trustRelation node. Their labelnames are, respectively, prefixed with “u2TrT” and “Tr2uT” for features on a trustor–trustRelation edge and features on a trustRelation–trustee edge. This setting matches the construction of our probabilistic graphical model where edges between user nodes and trustRelation nodes have different types. Such an setting allows the model to distinguish how differently a trustor or a trustee affects a trust relationship’s formation.Feature vector construction. For each edge or edge, we create a feature vector or , respectively. Each feature in this category is a label-label feature.
- The other category of auxiliary edge features will be attached to edges between trustRelation nodes that are involved in the motif structure explained previously. Similarly to trust propagation features, features in this category follow the concept of propagative trust, i.e., direct trust propagation and transposed trust propagation, and grant values of each of them with either 0 for direct trust or 1 for transposed trust. However, different from the trust propagation features which are node features, they are edge features trying to “filter out similarly behaving trustRelation nodes”.Feature vector construction. For each edge, we create a feature vector . Each feature in this category is a label-label-observation feature.
3.2.3. Model Formulation
3.3. Probabilistic Model Inference and Interpretation
3.4. Parameter Estimation
3.5. Implementation
4. Experiments
4.1. Data
4.2. Experimental Settings
4.2.1. Comparison Methods
4.2.2. Evaluation Metrics
4.2.3. Experiment Setup
- For model validation and comparisons, we conducted experiments using the proposed model and comparison methods with different feature set combinations on the split training and test datasets, and then compared the resulting performances with the evaluation metrics.
- For privacy-restrict online social network analysis, experiments were carried out with partially reduced data to further explore the proposed model’s trust inference capability in a real-world scenario. Hereinafter, the reduced data means that features from a certain set for a portion of users were missing for a specific experiment. As stated earlier in Section 1, in real-world online social networks, some users may choose to opt out of part of or all of their data being used by online social services.
4.3. Results and Discussion
4.3.1. The First Set of Experiments with All Possibly Usable Feature Data
- On top of the first category of auxiliary features (), adding a single feature set (, , or ) into the model will improve the model’s performance. The use of the UGC feature set improves the model’s accuracy (and score) greatly by to ( to ), followed by the user profile feature set by to ( to ), and then the trust propagation feature set by to ( to ).
- Using all types of features (in experiment 8) does not always promise the best result. The performance for the proposed model with such feature sets was close to the performance of the model with the UGC feature set with or without other feature sets.
4.3.2. The Second Set of Experiments with Reduced Feature Data
5. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
OSN | Online Social Network |
UGC | User-Generated Contents |
CRF | Conditional Random Field |
r.v. | random variable |
TP | Trust Propagation |
POS | Parts-of-Speech |
BP | Belief Propagation |
LBP | Loopy Belief Propagation |
GPU | Graphics Processing Unit |
SVM | Support Vector Machine |
RBF | Radial Basis Function |
DT | Decision Tree |
RF | Random Forest |
References
- Golbeck, J. Trust on the World Wide Web: A Survey. Found. Trends® Web Sci. 2008, 1, 131–197. [Google Scholar] [CrossRef]
- Meng, X.; Zhang, G. TrueTrust: A feedback-based trust management model without filtering feedbacks in P2P networks. Peer- Netw. Appl. 2020, 13, 175–189. [Google Scholar] [CrossRef]
- Qolomany, B.; Mohammed, I.; Al-Fuqaha, A.; Guizani, M.; Qadir, J. Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services. IEEE Internet Things J. 2021, 8, 2943–2958. [Google Scholar] [CrossRef]
- Zhao, J.; Wang, W.; Zhang, Z.; Sun, Q.; Huo, H.; Qu, L.; Zheng, S. TrustTF: A tensor factorization model using user trust and implicit feedback for context-aware recommender systems. Knowl.-Based Syst. 2020, 209, 106434. [Google Scholar] [CrossRef]
- Sparrowe, R.T.; Liden, R.C. Two Routes to Influence: Integrating Leader-Member Exchange and Social Network Perspectives. Adm. Sci. Q. 2005, 50, 505–535. [Google Scholar] [CrossRef]
- Sherchan, W.; Nepal, S.; Paris, C. A Survey of Trust in Social Networks. ACM Comput. Surv. 2013, 45, 33. [Google Scholar] [CrossRef]
- Searle, J.R.; Willis, S. The Construction of Social Reality; Simon and Schuster: New York, NY, USA, 1995. [Google Scholar]
- Jøsang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007, 43, 618–644, Emerging Issues in Collaborative Commerce. [Google Scholar] [CrossRef] [Green Version]
- Gupta, P.; Goel, A.; Lin, J.; Sharma, A.; Wang, D.; Zadeh, R. WTF: The Who to Follow Service at Twitter. In Proceedings of the 22nd International Conference on World Wide Web (WWW ’13), Rio de Janeiro, Brazil, 13–17 May 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 505–514. [Google Scholar] [CrossRef]
- Sharma, S.; Menard, P.; Mutchler, L.A. Who to trust? Applying trust to social commerce. J. Comput. Inf. Syst. 2019, 59, 32–42. [Google Scholar] [CrossRef]
- Golzardi, E.; Sheikhahmadi, A.; Abdollahpouri, A. Detection of trust links on social networks using dynamic features. Phys. A Stat. Mech. Its Appl. 2019, 527, 121269. [Google Scholar] [CrossRef]
- Bathla, G.; Aggarwal, H.; Rani, R. A graph-based model to improve social trust and influence for social recommendation. J. Supercomput. 2020, 76, 4057–4075. [Google Scholar] [CrossRef]
- Wu, L.; Sun, P.; Fu, Y.; Hong, R.; Wang, X.; Wang, M. A Neural Influence Diffusion Model for Social Recommendation. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’19), Paris, France, 21–25 July 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 235–244. [Google Scholar] [CrossRef] [Green Version]
- Zuo, L.; Xiong, S.; Qi, X.; Wen, Z.; Tang, Y. Communication-Based Book Recommendation in Computational Social Systems. Complexity 2021, 2021, 6651493. [Google Scholar] [CrossRef]
- Elbeltagi, I.; Agag, G. E-retailing ethics and its impact on customer satisfaction and repurchase intention: A cultural and commitment-trust theory perspective. Internet Res. Electron. Netw. Appl. Policy 2016, 26, 288–310. [Google Scholar] [CrossRef] [Green Version]
- Vosoughi, S.; Roy, D.; Aral, S. The spread of true and false news online. Science 2018, 359, 1146–1151. [Google Scholar] [CrossRef] [PubMed]
- Zhang, B.; Zhang, L.; Mu, C.; Zhao, Q.; Song, Q.; Hong, X. A most influential node group discovery method for influence maximization in social networks: A trust-based perspective. Data Knowl. Eng. 2019, 121, 71–87. [Google Scholar] [CrossRef]
- Chui, M.; Manyika, J.; Bughin, J. The Social Economy: Unlocking Value and Productivity through Social Technologies. McKinsey Global Institute. 1 July 2012. Available online: https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/the-social-economy (accessed on 14 May 2022).
- Wu, J.; Xiong, R.; Chiclana, F. Uninorm trust propagation and aggregation methods for group decision making in social network with four tuple information. Knowl.-Based Syst. 2016, 96, 29–39. [Google Scholar] [CrossRef] [Green Version]
- Jiao Du, Z.; Yang Luo, H.; Dong Lin, X.; Min Yu, S. A trust-similarity analysis-based clustering method for large-scale group decision-making under a social network. Inf. Fusion 2020, 63, 13–29. [Google Scholar] [CrossRef]
- Ghafari, S.M.; Beheshti, A.; Joshi, A.; Paris, C.; Mahmood, A.; Yakhchi, S.; Orgun, M.A. A Survey on Trust Prediction in Online Social Networks. IEEE Access 2020, 8, 144292–144309. [Google Scholar] [CrossRef]
- General Data Protection Regulation (EU) 2016/679 (GDPR). Available online: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation (accessed on 10 April 2022).
- California Consumer Privacy Act (CCPA). Available online: https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act (accessed on 10 April 2022).
- Personal Information Protection Law of the People’s Republic of China. Available online: https://en.wikipedia.org/wiki/Personal_Information_Protection_Law_of_the_People’s_Republic_of_China (accessed on 10 April 2022).
- Schall, D. Link prediction in directed social networks. Soc. Netw. Anal. Min. 2014, 4, 157. [Google Scholar] [CrossRef]
- Barbieri, N.; Bonchi, F.; Manco, G. Who to Follow and Why: Link Prediction with Explanations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’14), New York, NY, USA, 24–27 August 2014; ACM: New York, NY, USA, 2014; pp. 1266–1275. [Google Scholar] [CrossRef]
- Mao, C.; Xu, C.; He, Q. A cost-effective algorithm for inferring the trust between two individuals in social networks. Knowl.-Based Syst. 2019, 164, 122–138. [Google Scholar] [CrossRef]
- Oh, H.K.; Kim, J.W.; Kim, S.W.; Lee, K. A unified framework of trust prediction based on message passing. Clust. Comput. 2018, 22, 2049–2061. [Google Scholar] [CrossRef]
- Massa, P.; Avesani, P. Controversial users demand local trust metrics: An experimental study on epinions.com community. AAAI 2005, 1, 121–126. [Google Scholar]
- Golbeck, J.; Hendler, J.A. FilmTrust: Movie recommendations using trust in web-based social networks. CCNC. Citeseer 2006, 2006, 282–286. [Google Scholar]
- Liu, G.; Yang, Q.; Wang, H.; Lin, X.; Wittie, M.P. Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1698–1706. [Google Scholar] [CrossRef]
- Liu, G.; Chen, Q.; Yang, Q.; Zhu, B.; Wang, H.; Wang, W. OpinionWalk: An efficient solution to massive trust assessment in online social networks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Tang, J.; Gao, H.; Hu, X.; Liu, H. Exploiting Homophily Effect for Trust Prediction. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining (WSDM ’13), Rome, Italy, 4–8 February 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 53–62. [Google Scholar] [CrossRef]
- Yao, Y.; Tong, H.; Yan, X.; Xu, F.; Lu, J. MATRI: A Multi-Aspect and Transitive Trust Inference Model. In Proceedings of the 22nd International Conference on World Wide Web (WWW ’13), Rio de Janeiro, Brazil, 13–17 May 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 1467–1476. [Google Scholar] [CrossRef]
- Zheng, X.; Wang, Y.; Orgun, M.; Zhong, Y.; Liu, G. Trust Prediction with Propagation and Similarity Regularization. In Proceedings of the AAAI Conference on Artificial Intelligence 2014, Québec City, QC, Canada, 27–31 July 2014; Volume 28. [Google Scholar]
- Liu, G.; Li, C.; Yang, Q. NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 1999–2007. [Google Scholar] [CrossRef]
- Cho, J.H.; Chan, K.; Adali, S. A Survey on Trust Modeling. ACM Comput. Surv. 2015, 48, 1–40. [Google Scholar] [CrossRef]
- Wang, J.; Jing, X.; Yan, Z.; Fu, Y.; Pedrycz, W.; Yang, L.T. A Survey on Trust Evaluation Based on Machine Learning. ACM Comput. Surv. 2020, 53, 1–36. [Google Scholar] [CrossRef]
- Mukherjee, S.; Weikum, G.; Danescu-Niculescu-Mizil, C. People on Drugs: Credibility of User Statements in Health Communities. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’14), New York, NY, USA, 24–27 August 2014; ACM: New York, NY, USA, 2014; pp. 65–74. [Google Scholar] [CrossRef]
- Mukherjee, S.; Weikum, G. Leveraging Joint Interactions for Credibility Analysis in News Communities. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management (CIKM ’15), Melbourne, Australia, 18–23 October 2015; ACM: New York, NY, USA, 2015; pp. 353–362. [Google Scholar] [CrossRef] [Green Version]
- Mao, Y.; Shen, H. Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating Data. IEEE Trans. Comput. Soc. Syst. 2016, 3, 176–189. [Google Scholar] [CrossRef]
- Liu, H.; Lim, E.P.; Lauw, H.W.; Le, M.T.; Sun, A.; Srivastava, J.; Kim, Y.A. Predicting Trusts among Users of Online Communities: An Epinions Case Study; Association for Computing Machinery: New York, NY, USA, 2008; EC ’08; pp. 310–319. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, B.; Wu, B.; Shang, S.; Zhang, Y.; Shi, C. Characterizing super-spreading in microblog: An epidemic-based information propagation model. Phys. A Stat. Mech. Its Appl. 2016, 463, 202–218. [Google Scholar] [CrossRef]
- Recasens, M.; Danescu-Niculescu-Mizil, C.; Jurafsky, D. Linguistic models for analyzing and detecting biased language. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, Sofia, Bulgaria, 4–9 August 2013; Volume 1: Long Papers, pp. 1650–1659. [Google Scholar]
- De Albornoz, J.C.; Plaza, L.; Gervás, P. SentiSense: An easily scalable concept-based affective lexicon for sentiment analysis. In Proceedings of the Eight International Conference on Language Resources and Evaluation (LREC’12), Istanbul, Turkey, 23–25 May 2012; European Language Resources Association (ELRA): Istanbul, Turkey, 2012. [Google Scholar]
- Friedli, S.; Velenik, Y. Statistical Mechanics of Lattice Systems: A Concrete Mathematical Introduction; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar] [CrossRef]
- Yedidia, J.S.; Freeman, W.T.; Weiss, Y. Understanding belief propagation and its generalizations. In Exploring Artificial Intelligence in the New Millennium; Gerhard, L., Bernhard, N., Eds.; Morgan Kaufmann Publishers Inc.: Burlington, MA, USA, 2003; pp. 239–269. [Google Scholar]
- Liu, Y.; Li, J.; Zhang, Y.; Lv, J.; Wang, B. A High Performance Implementation of A Unified CRF Model for Trust Prediction. In Proceedings of the 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, UK, 28–30 June 2018; pp. 848–853. [Google Scholar] [CrossRef]
- Bottou, L. Stochastic Gradient Descent Examples on Toy Problems. 2010. Available online: https://leon.bottou.org/projects/sgd (accessed on 16 September 2017).
Notation | Description | |
---|---|---|
Nodes | ||
The set of all (random variable, r.v.) nodes. | ||
user | R.v. for a user node u, either a trustor or a trustee. | |
trustRelation | R.v. for a trustRelation node t. | |
R.v. for a trustRelation node representing the trust relationship from user to user . | ||
Edges | ||
The set of all edges. | ||
An edge between a trustor node and a trustRelation node . | ||
An edge between a trustRelation node and a trustee node . |
Feature Set | Description of Features in the Set |
---|---|
Statistical features for user profiles (User Profile Features) | |
Linguistic and stylistic features for reviews (UGC Features) | |
Propagative features for trust propagation (TP Features) | |
The first category of Auxiliary features | |
The second category of Auxiliary features |
Feature Name | Description |
---|---|
nRatings | The number of ratings a user has cast. |
nRated | The number of ratings a user’s reviews received. |
nRated5 | The number of exceptional helpful ratings a user’s reviews received. |
nRated4 | The number of very helpful ratings a user’s reviews received. |
nRated3 | The number of helpful ratings a user’s reviews received. |
nRated2 | The number of somewhat helpful ratings a user’s reviews received. |
nRated1 | The number of not helpful ratings a user’s reviews received. |
nReviews | The number of reviews posted by a user. |
nTrustors | The number of trustors a user has. |
nTrustees | The number of trustees a user has. |
Feature Type | Feature Name | Description: the Ratio of the Number of Specified Elements to All Segments in One of a User’s Reviews |
---|---|---|
– | rPuncs | Punctuation marks |
POS | rNouns | Nouns |
rAdjs | Adjectives | |
rVerbs | Verbs | |
rAdvs | Adverbs | |
rConjs | Conjunctions | |
Subjectivity & Polarity | rPositives | Positive words and phrases |
rNegatives | Negative words and phrases | |
Indicative | rAssertives | Assertive verbs |
rFactives | Factive verbs | |
rImplicatives | Implicative words and phrases | |
rReports | Report verbs | |
rBiases | Biased words | |
rHedges | Mitigating words |
Feature Type | Feature Name | Sequenced “Labels” of Nodes in Motif | ||
---|---|---|---|---|
/ | / | / | ||
Direct Trust | d000 | N | N | N |
d001 | N | N | Y | |
d010 | N | Y | N | |
d011 | N | Y | Y | |
d100 | Y | N | N | |
d101 | Y | N | Y | |
d110 | Y | Y | N | |
d111 | Y | Y | Y | |
/ | / | / | ||
Transposed Trust | t000 | N | N | N |
t001 | N | N | Y | |
t010 | N | Y | N | |
t011 | N | Y | Y | |
t100 | Y | N | N | |
t101 | Y | N | Y | |
t110 | Y | Y | N | |
t111 | Y | Y | Y |
Type | States | Description |
---|---|---|
Node | ||
user (u) | 0, 1, 2 | User categories defined by the OSN. |
trustRelation (t) | 0 | Such an relationship is observed. |
1 | Such an relationship is un-observed. | |
Edge (: state of user node, : state of trustRelation node) | ||
: | state–state pair consisting of and . | |
: | state–state pair consisting of and . | |
: | state–state pair consisting of and . |
Number of users | 14,317 | |
Number of reviews | 24,406 | |
Number of reviews per user | ||
Number of trust relationships | Y: 87,804 | N: 78,863 |
Web of trust density | Y: | N: |
# of Experiment Set | # of Experiment | Feature Set Contents | ||||
---|---|---|---|---|---|---|
1st | 2nd | |||||
✔ | 1 | ✔ | ||||
✔ | ✔ | 2 | ✔ | ✔ | ||
✔ | ✔ | 3 | ✔ | ✔ | ||
✔ | ✔ | 4 | ✔ | ✔ | ||
✔ | ✔ | 5 | ✔ | ✔ | ✔ | |
✔ | ✔ | 6 | ✔ | ✔ | ✔ | |
✔ | ✔ | 7 | ✔ | ✔ | ✔ | |
✔ | 8 | ✔ | ✔ | ✔ | ✔ |
Training–Test | Our Model | SVM | DT | RF |
---|---|---|---|---|
50–50% | (#3) | (#6) | (#6) | (#8) |
60–40% | (#3) | (#6) | (#6) | (#8) |
70–30% | (#7) | (#6) | (#6) | (#8) |
80–20% | (#3) | (#6) | (#6) | (#8) |
90–10% | (#3) | (#6) | (#6) | (#8) |
Training–Test | Our Model | SVM | DT | RF |
---|---|---|---|---|
50–50% | (#7) | (#6) | (#6) | (#8) |
60–40% | (#7) | (#6) | (#6) | (#8) |
70–30% | (#7) | (#6) | (#6) | (#8) |
80–20% | (#3) | (#6) | (#6) | (#8) |
90–10% | (#3) | (#6) | (#6) | (#8) |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, Y.; Wang, B. User Trust Inference in Online Social Networks: A Message Passing Perspective. Appl. Sci. 2022, 12, 5186. https://doi.org/10.3390/app12105186
Liu Y, Wang B. User Trust Inference in Online Social Networks: A Message Passing Perspective. Applied Sciences. 2022; 12(10):5186. https://doi.org/10.3390/app12105186
Chicago/Turabian StyleLiu, Yu, and Bai Wang. 2022. "User Trust Inference in Online Social Networks: A Message Passing Perspective" Applied Sciences 12, no. 10: 5186. https://doi.org/10.3390/app12105186