Visible to the public Exploiting Implicit and Explicit Signed Trust Relationships for Effective Recommendations

TitleExploiting Implicit and Explicit Signed Trust Relationships for Effective Recommendations
Publication TypeConference Paper
Year of Publication2017
AuthorsAli, Irfan, Hong, Jiwon, Kim, Sang-Wook
Conference NameProceedings of the Symposium on Applied Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4486-9
Keywordscollaborative filtering, composability, pubcrawl, recommender systems, resilience, Resiliency, trust-aware recommendations, web of trust
Abstract

Trust networks have been widely used to mitigate the data sparsity and cold-start problems of collaborative filtering. Recently, some approaches have been proposed which exploit explicit signed trust relationships, i.e., trust and distrust relationships. These approaches ignore the fact that users despite trusting/distrusting each other in a trust network may have different preferences in real-life. Most of these approaches also handle the notion of the transitivity of distrust as well as trust. However, other existing work observed that trust is transitive while distrust is intransitive. Moreover, explicit signed trust relationships are fairly sparse and may not contribute to infer true preferences of users. In this paper, we propose to create implicit signed trust relationships and exploit them along with explicit signed trust relationship to solve sparsity problem of trust relationships. We also confirm the similarity (resp. dissimilarity) of implicit and explicit trust (resp. distrust) relationships by using the similarity score between users so that users' true preferences can be inferred. In addition to these strategies, we also propose a matrix factorization model that simultaneously exploits implicit and explicit signed trust relationships along with rating information and also handles transitivity of trust and intransitivity of distrust. Extensive experiments on Epinions dataset show that the proposed approach outperforms existing approaches in terms of accuracy.

URLhttps://dl.acm.org/doi/10.1145/3019612.3019666
DOI10.1145/3019612.3019666
Citation Keyali_exploiting_2017