Trust Inference Model Proposal

1797 words (7 pages) Essay

26th Mar 2018 Computer Science Reference this

Tags:

Disclaimer: This work has been submitted by a university student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

(step1-13 in Alg. 4) in the continu-ous case. For advogato data set, we directly report the results on all the six snapshots (i.e., advogato-1, . . . , advogato-6). For PGP, we use its subsets to study the scalability. The result is shown in Fig. 6, which is consistent with the complex-ity analysis in Section 4.3. As we can see from the figure, MATRI scales linearly wrt to both n and |K|, indicating that it is suitable for large-scale applications. The scalability result for the binary case is similar, and we omit the figures for brevity.

  1. (b) (c) (d)

Fig. 3. Scalability of the proposed MATRI for continuous case. MATRI scales linearly wrt the data size (n and |K|). (a) Wall-clock time vs. n on advogato. (b) Wall-clock time vs. |K| on advogato. (c) Wall-clock time vs. n on PGP. (d) Wall-clock time vs. |K| on PGP.

Fig. 4. Comparisons of alternative solutions of MATRI. Compared to MATRI-AA, MATRI-SS and MATRI-AS are more than 10x faster while preserving more than 90% accuracy on both data sets. (a) advogato data set. (b) PGP data set.

(C) Comparisons of the Alternatives of MATRI. As men-tioned before, the stochastic gradient descent method (SGD) could also be used for the continuous trust inference prob-lem in computing propagation vector and solving Eq. (5). We now experimentally evaluate the efficiency of all the four alternatives of MATRI. We use MATRI-AA to denote the original MATRI, MATRI-SA to denote the case when we use SGD in the propagation step, MATRI-AS.

VI RELATED WORK

In this section, we briefly review related work, includ-ing trust propagation models, multi-aspect trust inference models, etc.

Trust Propagation Models. To date, a large body of trust inference models are based on trust propagation where trust is propagated along connected users in the trust net-work, i.e., the web of locally-generated trust ratings. Based on the interpretation of trust propagation, we further cate-gorize these models into two classes: path interpretation and component interpretation.The proposed MATRI integrates the trust propagation with two other important properties, i.e., the multi-aspect of trust and trust bias. In addition, our multi-aspect model offers a natural way to speed up on-line query response; as well as to mitigate the sparsity or coverage problem in trust inference where some trustor and trustee might not be connected with each other – both are known limitations with the current trust propagation models [10].

Multi-Aspect Trust Inference Models. Social scientists have explored the multi-aspect property of trust for several years [8]. In computer science, there also exist a few trust inference models that explicitly explores the trust propagation.

Trust Bias in Trust Inference. In sociology, it was dis-covered a long time ago that trust bias is an integral part in the final trust decision [9]. Nonetheless, this important aspect has been largely ignored in most of the existing trust inference models. One exception is from Nguyen et al. [13], which learns the importance of several trust bias related features derived from a social trust framework. Recently, Mishra et al. [25] propose an iterative algorithm to compute trust bias. Different from these existing works, our focus is to incorporate various types of trust bias as specified factors/aspects to increase the accuracy of trust inference.

VII CONCLUSION

In this paper, we have proposed a trust inference model, as well as a family of algorithms to apply the model to both continuous and binary inference scenarios. The basic idea of the proposed MATRI is to leverage the multi-aspect property of trust by characterizing several aspects/factors for each trustor and trustee based on the existing trust relationships. In addition, MATRI incorporates the trust propagation and trust bias; and further learns their rela-tive weights. By integrating all these important properties, our experimental evaluations on real benchmark data sets show that MATRI leads to significant improvement over several benchmark approaches in prediction accuracy, for both quantifying numerical trustworthiness scores and pre-dicting binary trust/distrust signs. The proposed MATRI is also nimble – it is up to 7 orders of magnitude faster than the existing trust propagation methods in the on-line query response, and in the meanwhile it enjoys the linear scalabil-ity for the pre-computational stage in both time and space. Future work includes investigating the capability of MATRI to address the trust dynamics.

REFERENCES

  1. C. Ziegler and G. Lausen, “Propagation models for trust and distrust in social networks,” Inform. Syst. Front., vol. 7, no. 4, pp.337–358, 2005.
  2. A. Jøsang and R. Ismail, “The Beta reputation system,” in Proc. 15th Bled Electron. Comm. Conf., vol. 160. Bled, Slovenia, Jun. 2002.
  3. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The Eigentrust algorithm for reputation management in P2P net-works,” in Proc. 12th Int. Conf. WWW, Budapest, Hungary, 2003, pp.640–651.
  4. M. Richardson, R. Agrawal, and P. Domingos, “Trust management for the semantic web,” in Proc. 2nd ISWC, Sanibel Island, FL, USA, 2003, pp. 351–368.
  1. D. Cartwright and F. Harary, “Structural balance: A generalization of Heider’s theory,” Psychol. Rev., vol. 63, no. 5, pp. 277–293, 1956.
  2. G. Liu, Y. Wang, and M. Orgun, “Trust transitivity in complex social networks,” in Proc. AAAI, 2011, pp. 1222–1229.
  3. D. Gefen, “Reflections on the dimensions of trust and trustwor-thiness among online consumers,” ACM SIGMIS Database, vol. 33, no. 3, pp. 38–53, 2002.
  4. D. Sirdeshmukh, J. Singh, and B. Sabol, “Consumer trust, value, and loyalty in relational exchanges,” J. Marketing, vol. 66, no. 1, pp.15–37, 2002.
  5. A. Tversky and D. Kahneman, “Judgment under uncertainty: Heuristics and biases,” Sci., vol. 185, no. 4157, pp. 1124–1131, 1974.
  6. Y. Yao, H. Tong, F. Xu, and J. Lu, “Subgraph extraction for trust inference in social networks,” in Proc. IEEE/ACM Int. Conf. ASONAM, Istanbul, Turkey, 2012, pp. 163–170.
  7. L. Xiong and L. Liu, “Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843–857, Jul. 2004.
  8. J. Tang, H. Gao, and H. Liu, “mTrust: Discerning multi-faceted trust in a connected world,” in Proc. 5th ACM Int. Conf. WSDM, Washingtion, DC, USA, 2012, pp. 93–102.
  9. V. Nguyen, E. Lim, J. Jiang, and A. Sun, “To trust or not to trust? Predicting online trusts using trust antecedent framework,” in Proc. 9th IEEE ICDM, Miami, FL, USA, 2009, pp. 896–901.
  10. Y. Koren, “Factorization meets the neighborhood: A multifaceted collaborative filtering model,” in Proc. 14th ACM SIGKDD Int. Conf. KDD, New York, NY, USA, 2008, pp. 426–434.
  11. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, “Propagation of trust and distrust,” in Proc. 13th Int. Conf. WWW, New York, NY, USA, 2004, pp. 403–412.
  12. Y. Koren, R. Bell, and C. Volinsky, “Matrix factorization techniques for recommender systems,” Comput., vol. 42, no. 8, pp. 30–37, 2009.
  13. P. Massa and P. Avesani, “Controversial users demand local trust metrics: An experimental study on epinions. com community,” in Proc. 20th Nat. Conf. AAAI, 2005, pp. 121–126.
  14. B. Lang, “A computational trust model for access control in P2P,” Sci. China Inform. Sci., vol. 53, no. 5, pp. 896–910, 2010.
  15. R. Bell, Y. Koren, and C. Volinsky, “Modeling relationships at mul-tiple scales to improve accuracy of large recommender systems,” in Proc. 13th ACM SIGKDD Int. Conf. KDD, New York, NY, USA, 2007, pp. 95–104.
  16. H. Ma, M. Lyu, and I. King, “Learning to recommend with trust and distrust relationships,” in Proc. 3rd ACM Conf. RecSys, New York, NY, USA, 2009, pp. 189–196.
  17. A. Buchanan and A. Fitzgibbon, “Damped Newton algorithms for matrix factorization with missing data,” in Proc. IEEE CVPR, vol. 2. Washington, DC, USA, 2005, pp. 316–322.
  18. X. Liu, A. Datta, K. Rzadca, and E. Lim, “Stereotrust: A group based personalized trust model,” in Proc. 18th ACM CIKM, Hong Kong, China, 2009, pp. 7–16.
  19. D. Watts and S. Strogatz, “Collective dynamics of ’small-world’ networks,” Nature, vol. 393, no. 6684, pp. 440–442, 1998.
  20. J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graphs over time: Densification laws, shrinking diameters and possible explana-tions,” in Proc. 11th ACM SIGKDD Int. Conf. KDD, Chicago, IL, USA, 2005, pp. 177–187.
  21. C.-W. Hang, Y. Wang, and M. P. Singh, “Operators for propagating trust and their evaluation in social networks,” in Proc. 8th Int. Conf. AAMAS, Budapest, Hungary, 2009, pp. 1025–1032.
  22. J. Leskovec, D. Huttenlocher, and J. Kleinberg, “Predicting posi-tive and negative links in online social networks,” in Proc. 19th Int. Conf. WWW, Raleigh, NC, USA, 2010, pp. 641–650.
  23. Y. Wang and M. P. Singh, “Trust representation and aggregation in a distributed agent system,” in Proc. 21st Nat. Conf. AAAI, 2006, pp.1425–1430.
  24. Y. Wang and M. P. Singh, “Formal trust model for multiagent systems,” in Proc. 20th IJCAI, San Francisco, CA, USA, 2007, pp.1551–1556.
  25. C. Hsieh, K. Chiang, and I. Dhillon, “Low rank modeling of signed networks,” in Proc. 18th ACM SIGKDD Int. Conf. KDD, Beijing, China, 2012, pp. 507–515.
  26. K.-Y. Chiang, N. Natarajan, A. Tewari, and I. S. Dhillon, “Exploiting longer cycles for link prediction in signed net-works,” in Proc. 20th ACM CIKM, Glasgow, Scotland, U.K., 2011, pp.1157–1162.

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on the UKDiss.com website then please:

Related Lectures

Study for free with our range of university lectures!