Table of Contents Author Guidelines Submit a Manuscript
Computational Intelligence and Neuroscience
Volume 2016 (2016), Article ID 5403105, 12 pages
http://dx.doi.org/10.1155/2016/5403105
Research Article

Exploring the Combination of Dempster-Shafer Theory and Neural Network for Predicting Trust and Distrust

Xin Wang,1,2,3,4 Ying Wang,2,3 and Hongbin Sun1

1School of Computer Technology and Engineering, Changchun Institute of Technology, Changchun 130012, China
2College of Computer Science and Technology, Jilin University, Changchun 130012, China
3Key Laboratory of Symbolic Computation and Knowledge Engineering, Ministry of Education, Changchun 130012, China
4Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China

Received 18 October 2015; Revised 29 December 2015; Accepted 29 December 2015

Academic Editor: Manuel Graña

Copyright © 2016 Xin Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Dubois, J. Golbeck, and A. Srinivasan, “Predicting trust and distrust in social networks,” in Proceedings of the IEEE 3th Inernational Conference on Social Computing (SocialCom '11), pp. 418–424, Boston, Mass, USA, October 2011.
  2. J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, “Predicting positive and negative links in online social networks,” in Proceedings of the 19th International World Wide Web Conference (WWW '10), pp. 641–650, Raleigh, NC, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Shafer, “A mathematical theory of evidence,” Technometrics, vol. 20, no. 1, pp. 1–242, 1978. View at Google Scholar
  4. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, “Propagation of trust and distrust,” in Proceedings of the 13th international conference on World Wide Web (WWW '04), pp. 403–412, New York, NY, USA, May 2004. View at Publisher · View at Google Scholar
  5. Y. A. Kim and H. S. Song, “Strategies for predicting local trust based on trust propagation in social networks,” Knowledge-Based Systems, vol. 24, no. 8, pp. 1360–1371, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. H.-K. Oh, J.-W. Kim, S.-W. Kim, and K. Lee, “A probability-based trust prediction model using trust-message passing,” in Proceedings of the 22nd International Conference on World Wide Web (WWW '13), pp. 161–162, Rio de Janeiro, Brazil, May 2013. View at Scopus
  7. K. Zolfaghar and A. Aghaie, “A syntactical approach for interpersonal trust prediction in social web applications: combining contextual and structural data,” Knowledge-Based Systems, vol. 26, pp. 93–102, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. N. Ma, E.-P. Lim, V.-A. Nguyen, A. Sun, and H. Liu, “Trust relationship prediction using online product review data,” in Proceedings of the 1st ACM International Workshop on Complex Networks Meet Information & Knowledge Management (CNIKM '09), pp. 47–54, ACM, Hong Kong, November 2009. View at Publisher · View at Google Scholar
  9. H. Liu, E.-P. Lim, H. W. Lauw et al., “Predicting trusts among users of online communities: an epinions case study,” in Proceedings of the 9th ACM Conference on Electronic Commerce (EC '08), pp. 310–319, ACM, Chicago, Ill, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Tang, S. Chang, C. Aggarwal, and H. Liu, “Negative link prediction in social media,” in Proceedings of the 8th ACM International Conference on Web Search and Data Mining (WSDM '15), pp. 87–96, Shanghai, China, Feburary 2015. View at Publisher · View at Google Scholar
  11. J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, “Signed networks in social media,” in Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI '10), pp. 1361–1370, Atlanta, Ga, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. S.-H. Yang, A. J. Smola, B. Long, H. Zha, and Y. Chang, “Friend or frenemy?: predicting signed ties in social networks,” in Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '12), pp. 555–564, ACM, Portland, Ore, USA, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. C.-J. Hsieh, K.-Y. Chiang, and I. S. Dhillon, “Low rank modeling of signed networks,” in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '12), pp. 507–515, ACM, Beijing, China, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Agrawal, V. K. Garg, and R. Narayanam, “Link label prediction in signed social networks,” in Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI '13), pp. 2591–2597, Beijing, China, August 2013. View at Scopus
  15. Z. Xiao, X. Yang, Y. Pang, and X. Dang, “The prediction for listed companies' financial distress by using multiple prediction methods with rough set and Dempster-Shafer evidence theory,” Knowledge-Based Systems, vol. 26, pp. 196–206, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Dymova and P. Sevastjanov, “An interpretation of intuitionistic fuzzy sets in terms of evidence theory: decision making aspect,” Knowledge-Based Systems, vol. 23, no. 8, pp. 772–782, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. I. U. Sikder and A. Gangopadhyay, “Managing uncertainty in location services using rough set and evidence theory,” Expert Systems with Applications, vol. 32, no. 2, pp. 386–396, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Yen, “Generalizing the Dempster-Shafer theory to fuzzy sets,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 20, no. 3, pp. 559–570, 1990. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. O. A. Basir, F. Karray, and H. Zhu, “Connectionist-based Dempster-Shafer evidential reasoning for data fusion,” IEEE Transactions on Neural Networks, vol. 16, no. 6, pp. 1513–1530, 2005. View at Publisher · View at Google Scholar · View at Scopus
  20. T. Denoeux, “A neural network classifier based on Dempster-Shafer theory,” IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans., vol. 30, no. 2, pp. 131–150, 2000. View at Publisher · View at Google Scholar · View at Scopus
  21. T. Denoeux, “A k-nearest neighbor classification rule based on Dempster-Shafer theory,” IEEE Transactions on Systems, Man and Cybernetics, vol. 25, no. 5, pp. 804–813, 1995. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Mcpherson, L. Smithlovin, and J. M. Cook, “Birds of a feather: homophily in social networks,” Annual Review of Sociology, vol. 15, no. 4, pp. 344–349, 2001. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Tang, H. Gao, X. Hu, and H. Liu, “Exploiting homophily effect for trust prediction,” in Proceedings of the 6th ACM International Conference on Web Search and Data Mining (WSDM '13), pp. 53–62, IEEE, Rome, Italy, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. G. Salton and M. J. Mcgill, Introduction to Modern Information Retrieval, Computer Series, McGraw-Hill, New York, NY, USA, 1983.
  25. F. L. Cruz, C. G. Vallejo, F. Enríquez, and J. A. Troyano, “PolarityRank: finding an equilibrium between followers and contraries in a network,” Information Processing and Management, vol. 48, no. 2, pp. 271–282, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. A. Kim and M. A. Ahmad, “Trust, distrust and lack of confidence of users in online social media-sharing communities,” Knowledge-Based Systems, vol. 37, pp. 438–450, 2013. View at Publisher · View at Google Scholar · View at Scopus