A Multidimensional Trust Evaluation Framework for Online Social Networks Based on Machine Learning
暂无分享,去创建一个
Lilei Lu | Xu Chen | Jincui Yang | Yuyu Yuan | Lilei Lu | Xu Chen | Yuyu Yuan | Jincui Yang
[1] Jie Wu,et al. Generating trusted graphs for trust evaluation in online social networks , 2014, Future Gener. Comput. Syst..
[2] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[3] S. Khandker,et al. Handbook on Poverty and Inequality , 2009 .
[4] Jie Wu,et al. Trust Evaluation in Online Social Networks Using Generalized Network Flow , 2016, IEEE Transactions on Computers.
[5] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[6] Paolo Avesani,et al. Moleskiing.it: a Trust-aware Recommender System for Ski Mountaineering , 2005 .
[7] Guojun Wang,et al. SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Jie Wu,et al. Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..
[9] W. Marsden. I and J , 2012 .
[10] Kevin Robert Canini,et al. Finding Credible Information Sources in Social Networks Based on Content and Social Structure , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[11] Christos Faloutsos,et al. PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information , 2016, CIKM.
[12] Li Pan,et al. A Machine Learning Based Trust Evaluation Framework for Online Social Networks , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] Roberto Di Pietro,et al. Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..
[14] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[15] Jeffrey Xu Yu,et al. A topic-biased user reputation model in rating systems , 2015, Knowledge and Information Systems.
[16] Xin Liu,et al. A GENERIC TRUST FRAMEWORK FOR LARGE‐SCALE OPEN SYSTEMS USING MACHINE LEARNING , 2011, Comput. Intell..
[17] Jie Wu,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Multi-dimensional Evidence-based Trust Management with Multi-trusted Paths , 2022 .
[18] Young Ae Kim,et al. An enhanced trust propagation approach with expertise and homophily-based trust networks , 2015, Knowl. Based Syst..
[19] Jun Zhang,et al. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection , 2015, IEEE Transactions on Computational Social Systems.
[20] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[21] Mehmet A. Orgun,et al. Using Bayesian networks with hidden variables for identifying trustworthy users in social networks , 2020 .
[22] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[23] Henry H. Emurian,et al. An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..
[24] Xiao Chen,et al. 6 million spam tweets: A large ground truth for timely Twitter spam detection , 2015, 2015 IEEE International Conference on Communications (ICC).
[25] Fali Huang. Building Social Trust: A Human-Capital Approach , 2007 .
[26] Javier López,et al. Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..
[27] Jie Wu,et al. FlowTrust: trust inference with network flows , 2011, Frontiers of Computer Science in China.
[28] Louis Lei Yu,et al. An Evaluation of the Effect of Spam on Twitter Trending Topics , 2013, 2013 International Conference on Social Computing.
[29] Shulin Wang,et al. Feature selection in machine learning: A new perspective , 2018, Neurocomputing.
[30] Guido Möllering,et al. The Nature of Trust: From Georg Simmel to a Theory of Expectation, Interpretation and Suspension , 2001 .
[31] Sibel Adali,et al. A Survey on Trust Modeling , 2015, ACM Comput. Surv..
[32] Georg Lausen,et al. Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.
[33] Mohammad Reza Meybodi,et al. A dynamic algorithm for stochastic trust propagation in online social networks: Learning automata approach , 2018, Comput. Commun..
[34] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[35] Lilei Lu,et al. A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects , 2018, J. Syst. Softw..
[36] Tsuyoshi Murata,et al. {m , 1934, ACML.
[37] Mohammad Reza Meybodi,et al. Learning Automata Approach for Social Networks , 2019, Studies in Computational Intelligence.
[38] Tim Watson,et al. A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks , 2017, IEEE Access.