On Exploiting Trustors in Trust-Based Recommendation

被引:2
|
作者
Hwang, Won-Seok [1 ]
Li, Shaoyu [1 ]
Kim, Sang-Wook [1 ]
Choi, Ho Jin [2 ]
机构
[1] Hanyang Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Comp Sci, Sch Comp, Taejon, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 04期
基金
新加坡国家研究基金会;
关键词
Recommendation system; Collaborative filtering; Trust network; Performance evaluation; SYSTEMS;
D O I
10.6138/JIT.2015.16.4.20150310c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a trust network, two users connected by a trust relationship are assumed to have similar interests. Based on this assumption, existing trust-based recommendation methods predict ratings for a target user on unseen items by utilizing available ratings information of those users who are "similar" to the target user in the trust network. Here, the concept of similarity is defined as the reachability via the trust relationship in the network. In the process, however, these methods usually follow the trustor-trustee relationship only in the forward direction, i.e., from trustor to trustee, but not in the backward direction. That is, they have overlooked the possibility of utilizing the ratings information obtainable from those users reachable in the backward direction who, we believe, are also deemed to have similar interests to the target user. In this paper, we investigate this possibility of identifying and adding these users to the trustable user group when predicting ratings by collaborative filtering. Experiments show that our approach can improve the coverage of prediction while preserving the accuracy.
引用
收藏
页码:755 / 765
页数:11
相关论文
共 50 条
  • [1] Exploiting Trustors as Well as Trustees in Trust-based Recommendation
    Hwang, Won-Seok
    Li, Shaoyu
    Kim, Sang-Wook
    Choi, Ho Jin
    [J]. PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, : 1893 - 1896
  • [2] Trust-Based Recommendation for the Social Web
    Oliveira, A. D. R.
    Bessa, L. N.
    Andrade, T. R.
    Filgueiras, L. V. L.
    Sichman, J. S.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (02) : 1661 - 1666
  • [3] A Trust-based Friend Recommendation Strategy in Microblog
    Cui, Shan
    Liu, Ruifang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 662 - 667
  • [4] Towards an approach of trust-based recommendation system
    Gmach, Imen
    Sidhom, Sahbi
    Melek, Ghenima
    Khrifish, Lofi
    [J]. 2015 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND ECONOMIC INTELLIGENCE (SIIE), 2015, : 150 - 157
  • [5] Personalized Recommendation via Trust-Based Diffusion
    Liu, Yuanzhen
    Han, Lixin
    Gou, Zhinan
    Yang, Yi
    [J]. IEEE ACCESS, 2019, 7 : 94195 - 94204
  • [6] Consistent Continuous Trust-Based Recommendation Systems
    Rozenfeld, Ola
    Tennenholtz, Moshe
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2009, 5929 : 113 - +
  • [7] A Trust-Based Prediction Approach for Recommendation System
    Wang, Peng
    Huang, Haiping
    Zhu, Jie
    Qi, Lingtao
    [J]. SERVICES - SERVICES 2018, 2018, 10975 : 157 - 164
  • [8] Trust-Based Social Item Recommendation: A Case Study
    Xing, Xing
    Zhang, Weishi
    Jia, Zhichun
    Zhang, Xiuguo
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1050 - 1053
  • [9] A Trust-Based Recommender System for Personalized Restaurants Recommendation
    Shambour, Qusai
    Abualhaj, Mosleh M.
    Abu-Shareha, Ahmad Adel
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (04) : 293 - 299
  • [10] Preventing Recommendation Attack in Trust-Based Recommender Systems
    张富国
    [J]. Journal of Computer Science & Technology, 2011, 26 (05) : 823 - 828