4.7 Article

Multi-criteria assessment of user trust in Social Reviewing Systems with subjective logic fusion

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

A knowledge coverage-based trust propagation for recommendation mechanism in social network group decision making

Yujia Liu et al.

Summary: The trust relationship among experts in a networked group can be estimated using novel knowledge coverage-based trust propagation operators. By aggregating trust paths and penalizing trust decay, a complete trust network can be constructed. A recommendation mechanism combining subjective and objective weights allows experts to accept consensus recommendations based on trust.

APPLIED SOFT COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Trust Assessment in Online Social Networks

Guangchi Liu et al.

Summary: This paper proposes the three-valued subjective logic (3VSL) model to assess trust in online social networks, and further designs the AssessTrust (AT) algorithm to accurately compute trust between any two users. Experimental results validate that 3VSL can accurately model trust between indirectly connected users.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Review Computer Science, Artificial Intelligence

User trustworthiness in online social networks: A systematic review

Majed Alkhamees et al.

Summary: The growing popularity of social networks has led to an increase in malicious behavior by anonymous users, prompting a rise in research on user trustworthiness. While existing solutions have shown some success, they are not comprehensive and further strategies need to be developed.

APPLIED SOFT COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Evaluating user reputation of online rating systems by rating statistical patterns

Hong-Liang Sun et al.

Summary: This paper investigates the design of a fast and effective ranking method under the threat of spamming attacks, by extracting user rating characteristics to distinguish between normal and malicious users. Experimental results show that the proposed new method is more efficient than existing methods.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Multidisciplinary Sciences

Learning about the Ellsberg Paradox reduces, but does not abolish, ambiguity aversion

Ruonan Jia et al.

PLOS ONE (2020)

Review Computer Science, Information Systems

A burst-based unsupervised method for detecting review spammer groups

Shu-Juan Ji et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

STARS: Defending against Sockpuppet-Based Targeted Attacks on Reviewing Systems

Rui Liu et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2020)

Article Computer Science, Artificial Intelligence

Recognition of opinion leaders coalitions in online social network using game theory

Lokesh Jain et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Review Computer Science, Information Systems

A review on trust propagation and opinion dynamics in social networks and group decision making frameworks

Raquel Urena et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

A cost-effective algorithm for inferring the trust between two individuals in social networks

Chengying Mao et al.

KNOWLEDGE-BASED SYSTEMS (2019)

Article Economics

Trust as a decision under ambiguity

Chen Li et al.

EXPERIMENTAL ECONOMICS (2019)

Article Computer Science, Theory & Methods

A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks

Bo Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Social media security and trustworthiness: Overview and new direction

Zhiyong Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks

Xianfu Meng et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Theory & Methods

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Jun Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds

Heba Kurdi et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Communication

HOW JOURNALISTS AND SOCIAL MEDIA USERS PERCEIVE ONLINE FACT-CHECKING AND VERIFICATION SERVICES

Petter Bae Brandtzaeg et al.

JOURNALISM PRACTICE (2018)

Article Computer Science, Theory & Methods

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design

Christian Esposito et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Review Computer Science, Theory & Methods

NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media

Saeedreza Shehnepoor et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Social network security: Issues, challenges, threats, and solutions

Shailendra Rathore et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Artificial Intelligence

On Deep Learning for Trust-Aware Recommendations in Social Networks

Shuiguang Deng et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)

Article Computer Science, Information Systems

How does the world connect? Exploring the global diffusion of social network sites

Gregory D. Larosiliere et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY (2017)

Article Computer Science, Information Systems

An Analytical Study of Large SPARQL Query Logs

Angela Bonifati et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2017)

Article Communication

Using Expert Sources to Correct Health Misinformation in Social Media

Emily K. Vraga et al.

SCIENCE COMMUNICATION (2017)

Article Computer Science, Artificial Intelligence

A trust evaluation scheme for complex links in a social network: a link strength perspective

Meizi Li et al.

APPLIED INTELLIGENCE (2016)

Article Computer Science, Theory & Methods

Combining crowd consensus and user trustworthiness for managing collective tasks

Silvana Castano et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Hardware & Architecture

Trust Evaluation in Online Social Networks Using Generalized Network Flow

Wenjun Jiang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Information Systems

κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph

Shuhong Chen et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Artificial Intelligence

Social network-based service recommendation with trust enhancement

Shuiguang Deng et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Theory & Methods

Generating trusted graphs for trust evaluation in online social networks

Wenjun Jiang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Artificial Intelligence

CommTrust: Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments

Xiuzhen Zhang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Theory & Methods

MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks

Fei Hao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

A Survey of Trust in Social Networks

Wanita Sherchan et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Artificial Intelligence

The Dempster-Shafer calculus for statisticians

A. P. Dempster

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING (2008)

Article Computer Science, Hardware & Architecture

Reputation systems

P Resnick et al.

COMMUNICATIONS OF THE ACM (2000)