Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation |
Liu, Haifeng
(School of Software, Dalian University of Technology)
Yang, Zhuo (School of Software, Dalian University of Technology) Zhang, Jun (School of Software, Dalian University of Technology) Bai, Xiaomei (School of Software, Dalian University of Technology) Wang, Wei (School of Software, Dalian University of Technology) Xia, Feng (School of Software, Dalian University of Technology) |
1 | J. Tang, H. Gao, H. Liu, and A. D. Sarma, “eTrust: Understanding trust evolution in an online world,” in Proc. of the 18th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 253–261, 2012. Article (CrossRef Link). |
2 | M. Jamali and M. Ester, “A matrix factorization technique with trust propagation for recommendation in social networks,” in Proc. of the Fourth ACM Conference on Recommender Systems, pp. 135–142, 2010. Article (CrossRef Link). |
3 | H. Ma, D. Zhou, C. Liu, M. R. Lyu, and I. King, “Recommender systems with social regularization,” in Proc. of the Fourth ACM International Conference on Web Search and Data Mining, pp. 287–296, 2011. Article (CrossRef Link). |
4 | X. Yang, H. Steck, and Y. Liu, “Circle-based recommendation in online social networks,” in Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1267–1275, 2012. Article (CrossRef Link). |
5 | X. Yang, H. Steck, Y. Guo, and Y. Liu, “On top-k recommendation using social networks,” in Proc. of the Sixth ACM Conference on Recommender Systems, pp. 67–74, 2012. Article (CrossRef Link). |
6 | A. Mnih and R. Salakhutdinov, “Probabilistic matrix factorization,” Advances in Neural Information Processing Systems, pp. 1257–1264, 2007. |
7 | G. Guo, J. Zhang, and N. Yorke-Smith, “Trustsvd: Collaborative filtering with both the explicit and implicit influence of user trust and of item ratings,” in Proc. of the 29th AAAI Conference on Artificial Intelligence, 2015. |
8 | M. Jamali and M. Ester, “Trustwalker: a random walk model for combining trust-based and item-based recommendation,” in Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 397–406, 2009. Article (CrossRef Link). |
9 | G. Noh, Y. Kang, H. Oh, and C. Kim, “Robust sybil attack defense with information level in online recommender systems,” Expert Systems with Applications, vol. 41, no. 4, pp. 1781–1791, 2014. Article (CrossRef Link). DOI |
10 | H. Liu, F. Xia, Z. Chen, N. Y. Asabere, J. Ma, and R. Huang, “Trucom: Exploiting domain-specific trust networks for multi-category item recommendation,” IEEE Systems Journal, dOI:10.1109/JSYST.2015.2427193, 2015. Article (CrossRef Link). DOI |
11 | H. Ma, H. Yang, M. R. Lyu, and I. King, “Sorec: social recommendation using probabilistic matrix factorization,” in Proc. of the 17th ACM Conference on Information and Knowledge Management, pp. 931–940, 2008. Article (CrossRef Link). |
12 | J. A. Golbeck, Computing and applying trust in web-based social networks, University of Maryland, 2005. |
13 | H. Ma, I. King, and M. R. Lyu, “Learning to recommend with social trust ensemble,” in Proc. of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 203–210, 2009. Article (CrossRef Link). |
14 | J. Tang, H. Gao, X. Hu, and H. Liu, “Exploiting homophily effect for trust prediction,” in Proc. of the Sixth ACM International Conference on Web Search and Data Mining, pp. 53–62, 2013. Article (CrossRef Link). |
15 | A. K. Menon and C. Elkan, “Link prediction via matrix factorization,” in Lecture Notes in Computer Science, vol. 6912, pp. 437–452, 2011. Article (CrossRef Link). |
16 | J. Bobadilla, F. Ortega, A. Hernando, and J. Bernal, “A collaborative filtering approach to mitigate the new user cold start problem,” Knowledge-Based Systems, vol. 26, pp. 225–238, 2012. Article (CrossRef Link). DOI |
17 | P. Massa and P. Avesani, “Trust-aware recommender systems,” in Proc. of the 2007 ACM Conference on Recommender Systems, pp. 17–24, 2007. Article (CrossRef Link). |
18 | J. L. Harman, J. O’Donovan, T. Abdelzaher, and C. Gonzalez, “Dynamics of human trust in recommender systems,” in Proc. of the 8th ACM Conference on Recommender Systems, pp. 305–308, 2014. Article (CrossRef Link). |
19 | B. Lika, K. Kolomvatsos, and S. Hadjiefthymiades, “Facing the cold start problem in recommender systems,” Expert Systems with Applications, vol. 41, no. 4, pp. 2065–2073, 2014. Article (CrossRef Link). DOI |
20 | W. Yao, J. He, G. Huang, and Y. Zhang, “Modeling dual role preferences for trust-aware recommendation,” in Proc. of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 975–978, 2014. Article (CrossRef Link). |
21 | G. Guo, “Resolving data sparsity and cold start in recommender systems,” Lecture Notes in Computer Science, vol. 7379, pp. 361–364, 2012. Article (CrossRef Link). DOI |
22 | G. Guo, J. Zhang, and D. Thalmann, “Merging trust in collaborative filtering to alleviate data sparsity and cold start,” Knowledge-Based Systems, vol. 57, pp. 57–68, 2014. Article (CrossRef Link). DOI |
23 | J. Cao, Z. Wu, B. Mao, and Y. Zhang, “Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system,” World Wide Web, vol. 16, no. 5-6, pp. 729–748, 2013. Article (CrossRef Link). DOI |
24 | P. Knees and M. Schedl, “A survey of music similarity and recommendation from music context data,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 10, no. 1, pp. 1–21, 2013. Article (CrossRef Link). DOI |
25 | H.-F. Wang and C.-T. Wu, “A strategy-oriented operation module for recommender systems in e-commerce,” Computers and Operations Research, vol. 39, no. 8, pp. 1837–1849, 2012. Article (CrossRef Link). DOI |
26 | S. M. Ali, I. Ghani, M. S. A. Latiff, “Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective,” KSII Transactions on Internet and Information Systems, Vol 9, No 1, January 2015, pp. 446-465. Article (CrossRef Link). DOI |
27 | D. Gavalas, C. Konstantopoulos, K. Mastakas, and G. Pantziou, “Mobile recommender systems in tourism,” Journal of Network and Computer Applications, vol. 39, pp. 319–333, 2014. Article (CrossRef Link). DOI |
28 | N. Aizenberg, Y. Koren, and O. Somekh, “Build your own music recommender by modeling internet radio streams,” in Proc. of the 21st International Conference on World Wide Web, pp. 1–10, 2012. Article (CrossRef Link). |
29 | W. Carrer-Neto, M. L. Hernandez-Alcaraz, R. Valencia-Garcıa, and F. Garcıa-Sanchez, “Social knowledge-based recommender system. application to the movies domain,” Expert Systems with Applications, vol. 39, no. 12, pp. 10 990–11 000, 2012. Article (CrossRef Link). DOI |
30 | A. Azaria, A. Hassidim, S. Kraus, A. Eshkol, O. Weintraub, and I. Netanely, “Movie recommender system for profit maximization,” in Proc. of the 7th ACM Conference on Recommender Systems, pp. 121–128, 2013. Article (CrossRef Link). |
31 | J. Borras, A. Moreno, and A. Valls, “Intelligent tourism recommender systems: A survey,” Expert Systems with Applications, vol. 41, no. 16, pp. 7370–7389, 2014. Article (CrossRef Link). DOI |