期刊文献+

在社交网络中综合的信任评估模型 被引量:9

Comprehensive trust evaluation model in social networks
下载PDF
导出
摘要 提出了由交互经验计算用户态度,以及利用交互时间序列计算用户行为模式变化的方法。进而利用态度、交互经验、行为模式3种信息综合建立新的信任评估模型。实验证明该模型能够适应社交网络的动态性及复杂性,并可有效量化3种信息对信任的影响,从而提高社交网络中直接信任评估模型的可用性与准确性。 A method was proposed to evaluate the user's attitude from the interaction experience and deduce the user's behavior pattern by employing the interactive time series.Further,a new trust evaluation model was constructed by considering the following features:the user's attitude,the interaction experience and the behavior pattern.The experiment results show that the presented model can be adapted to dynamic and complex social networks,and can efficiently quantify the influence on the trust of three kinds of information,and enhance the availability and accuracy of direct trust evaluation model in social networks.
出处 《通信学报》 EI CSCD 北大核心 2014年第12期136-143,共8页 Journal on Communications
基金 国家科技重大专项基金资助项目(2012ZX02002003) 中央高校基本科研业务费基金资助项目(JY10000903001)~~
关键词 社交网络 信任评估 行为模式 交互经验 social networks trust evaluate behavior pattern interaction experience
  • 相关文献

参考文献19

  • 1GOLBECK J A. Computing and Applying Trust in Web-Based Social Networks[D). University of Maryland at College Park, MD, 2005.
  • 2HUMPHREYS L. Mobile social networks and social practice: a case study of dodgeball[J]. Comput Mediated Comm, 2007, 13(1 ):341-360.
  • 3GROSS R, ACQUISTI A. lnformation revelation and privacy in online social networks[A). Proceedings of ACM workshop on privacy in the electronic Society(wpES'05)[C). New York, 2005.71-80.
  • 4ROTTER J B. A new scale for the measurement of interpersonal trust[J]. J Personality, 1967,35(4):651-665.
  • 5BEATTY P, REAY T, DICK S, et al. Consumer trust in e_commerce Wed sites: a metastudy[J]. ACM Comput Sury, 2011, 43(3):1-46.
  • 6GOLBECK J. The dynamics of Web-based social networks: membership, relationships, and change[J]. First Monday Volume 12 Number, 2007,11:1-18.
  • 7SHERCHAN W, NEPAL S, PARIS C. A survey of trust in social networks[J]. ACM Comput Surveys, 2013, 45(4):47.
  • 8GOLBECK J, PARSTA B, HENDLER J. Trust networks on the semantic Web[A). Proceedings of the 7th International Workshop on Cooperative Intelligents[C). 2003.238-249.
  • 9CAVERLEE J, LIU L, WEBB S. Social trust: tamper-resilient trust establishment in online communities[A). Proceedings of the 8th ACMIlEEE-CS Joint Conference on Digital Libraries(JCDL'08)[C]. ACM Press, NEW York, 2008.104-114.
  • 10LIU H F, LIM E P, LAUW H W, et al. Predicting trusts among users of online communities: an epinion case study[A). Proceedings of the 9th ACM Conference on Electronic Commerce(EC'08)[C]. New York, 2008.310-319.

同被引文献60

  • 1王媛,孙宇清,马乐乐.面向社会网络的个性化隐私策略定义与实施[J].通信学报,2012,33(S1):239-249. 被引量:4
  • 2方滨兴,刘克,吴曼青,等.大搜索技术白皮书[M].国家自然科学基金委.2015.
  • 3OSTERMAIER B, R"OMERY K, MATTERN F, et al. A real-time search engine for the Web of Things[A]. Internet of Things[C]. 2010. 1-8.
  • 4YUANYI CHEN, J1NGYU ZHOU, MINYI GUO. A context-aware search system for Internet of Things based on hierarchical context model[J]. Telecommtmication Systems, 2015(3): 1-15.
  • 5MILIARAKI I, BLANCO R, LALMAS M. From "selena Gomez" to "marion brando": understanding explorative entity search[A]. 24th In- ternational World Wide Web Conference[C]. 2015.765-775.
  • 6SHEN, H Y, LILt J W, CHEN K, et al. SCPS: a Social-aware distrib- uted cyber-physical human-centric search engine[A]. IEEE Transac- tions on Computers, 2015, 64(2):518-532.
  • 7EBRAHIMI, MOHAMMAD; SHAFIEIBAVANI, at al. A new meta-heuristic approach for efficient search in the Internet of Things[A]. 2015 IEEE International Conference on Services Comput- ing (SCC)[C]. 2015.264-270.
  • 8SU X, ZHANG M J, MU Y, et al. A robust trust model for ser- vice-oriented systems[J]. Journal of Computer and System Sciences, 2013, 79: 596-608.
  • 9ZHANG H I, SHOU Z Y, ZHANG J W, et al. Building reputation for service-oriented am I: modeling[J]. Algorithms, and Analysis Transac- tions of Electrical Engineering, 2014, 38(E1): 99-109.
  • 10ADALI S, ESCRIVA R, GOLDBERG M K. Measuring behavioral trust in social networks[A]. Proceedings of the IEEE International Conference on Intelligence and Security Informatics,2010. 150-152.

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部