2020
DOI: 10.1109/access.2020.2968102
|View full text |Cite
|
Sign up to set email alerts
|

Mining Heterogeneous Influence and Indirect Trust for Recommendation

Abstract: Relationships between users in social networks have been widely used to improve recommender systems. However, actual social relationships are always sparse, which sometimes bring great harm to the performance of recommender systems. In fact, a user may interact with others that he/she does not connect directly, and thus has an impact on these users. To mine abundant information for social recommendation and alleviate the problem of data sparsity, we study the process of trust propagation and propose a novel re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…It considers user and item bias information and user implicit feedback information predicting ratings and has high recommendation accuracy. 6) ReHI is an algorithm proposed by Z. Li et al [53].…”
Section: ) Comparison Algorithm and Hyper-parameter Settingmentioning
confidence: 99%
See 1 more Smart Citation
“…It considers user and item bias information and user implicit feedback information predicting ratings and has high recommendation accuracy. 6) ReHI is an algorithm proposed by Z. Li et al [53].…”
Section: ) Comparison Algorithm and Hyper-parameter Settingmentioning
confidence: 99%
“…In view of this deficiency, Cui, Lin et al [52] proposed the DMFA-SR model, and Z. Li et al [53] proposed the ReHI model. These models use trust propagation in social networks to fully exploit indirect trust relationships between users.…”
Section: Introductionmentioning
confidence: 99%
“…Trust is classified into implicit and explicit trust. Some studies have incorporated both implicit and explicit trusts into their RS model [37]. The implicit trust focuses on the degree of similarity between users or items and are computed either by integrating a social network trust [16,38], applying weighted similarity measures [39,40], incorporating fuzzy logic [41,42] or using probabilistic methods [43] in the RS.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the above characteristics of successive interference cancellation techniques, this paper will specifically design different link scheduling strategies to maximize the number of data links that can be transmitted concurrently, thereby reducing broadcast delay. 6 Complexity…”
Section: Basic Eory Of Successive Interference Cancellationmentioning
confidence: 99%
“…As nodes move, two nodes can enter the communication range and exchange data [5]. Opportunistic complex networks can handle problems that are difficult to solve with existing wireless technology networks, such as network splits and delays, and can meet the network communication that requires low-cost and terrible conditions [6,7]. In fact, part of the concept of opportunistic complex networks is derived from the early research on delay tolerant network (DTN) [8].…”
Section: Introductionmentioning
confidence: 99%