Skip to main content
Log in

Trust inference using implicit influence and projected user network for item recommendation

  • Published:
Journal of Intelligent Information Systems Aims and scope Submit manuscript

Abstract

Trust plays a very important role in many existing e-commerce recommendation applications. Social or trust network among users provides additional information along with ratings for improving user reliability on the recommendation. However, in the real world due to the sparse nature of trust data, many algorithms are built for inferring trust. In this work, we propose a new path based trust inference method utilizing the implicit influence information available in the existing trust network. The proposed approach uses the transitivity property of the trust for trust propagation and scale-free complex network property to limit the propagation length in the network. In this regard, we define a new terminology, degree of trustworthiness for a user, which adds the global influence in the inferred trust along a path and considers the maximum trust gaining path between two users. To reduce the sparsity of the network further, we use the projected user network information from user-item feedback history to reconstruct the inferred trust and introduce two methods of reconstruction from the truster and trustee point of view. The proposed reconstruction process can infer the trusted neighbors for a user who has put no trust on others, so far. We have applied the techniques in two real-world datasets and achieved significant performance improvement from the existing trust-based and neighborhood-based methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. www.netflix.com

  2. www.last.fm

  3. www.goodreads.com

  4. www.amazon.com

  5. www.epinions.com

  6. www.flixster.com

References

  • Abbasi, M.A., Tang, J., Liu, H. (2014). Trust-aware recommender systems. Machine learning book on computational trust. London: Chapman & Hall/CRC Press.

    Google Scholar 

  • Adomavicius, G., & Tuzhilin, A. (2005). Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6), 734–749.

    Article  Google Scholar 

  • Avesani, P., Massa, P., Tiella, R. (2005a). Moleskiing. it: a trust-aware recommender system for ski mountaineering. International Journal for Infonomics, 20 (35), 1–10.

  • Avesani, P., Massa, P., Tiella, R. (2005b). A trust-enhanced recommender system application: moleskiing. In Proceedings of the 2005 ACM symposium on applied computing (pp. 1589–1593). ACM.

  • Banerjee, S., Jenamani, M., Pratihar, D.K. (2017). Properties of a projected network of a bipartite network. arXiv preprint arXiv:1707.00912.

  • Cao, C., Ni, Q., Zhai, Y. (2015). An effective recommendation model based on communities and trust network. In 2015 IEEE 27th international conference on tools with artificial intelligence (ICTAI) (pp. 1029–1036). https://doi.org/10.1109/ICTAI.2015.147.

  • Chen, C.C., Wan, Y.H., Chung, M.C., Sun, Y.C. (2013). An effective recommendation method for cold start new users using trust and distrust networks. Information Sciences, 224(Supplement C), 19–36. https://doi.org/10.1016/j.ins.2012.10.037.

    Article  MathSciNet  Google Scholar 

  • Feng, X., Sharma, A., Srivastava, J., Wu, S., Tang, Z. (2016). Social network regularized sparse linear model for top-n recommendation. Engineering Applications of Artificial Intelligence, 51, 5–15.

    Article  Google Scholar 

  • Gao, P., Baras, J.S., Golbeck, J. (2015). Semiring-based trust evaluation for information fusion in social network services. In 2015 18th international conference on information fusion (Fusion) (pp. 590–596). IEEE.

  • Gao, P., Miao, H., Baras, J.S., Golbeck, J. (2016). Star: semiring trust inference for trust-aware social recommenders. In RecSys (pp. 301–308).

  • Golbeck, J. (2005a). Personalizing applications through integration of inferred trust values in semantic web-based social networks. In Semantic network analysis workshop at the 4th international semantic web conference (Vol. 16, p. 30).

  • Golbeck, J.A. (2005b). Computing and applying trust in web-based social networks. PhD thesis.

  • Golbeck, J. (2006). Generating predictive movie recommendations from trust in social networks. In Proceedings of the 4th international conference on trust management iTrust’06. https://doi.org/10.1007/11755593_8 (pp. 93–104). Berlin: Springer.

  • Golbeck, J., Parsia, B., Hendler, J. (2003). Trust networks on the semantic web. In Cooperative information agents VII (pp. 238–249). Springer.

  • Guha, R., Kumar, R., Raghavan, P., Tomkins, A. (2004). Propagation of trust and distrust. In Proceedings of the 13th international conference on world wide web, WWW ’04. https://doi.org/10.1145/988672.988727 (pp. 403–412). New York: ACM.

  • Guo, G., Zhang, J., Yorke-Smith, N. (2015). TrustSVD: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In Aaai (pp. 123–129).

  • Guo, G., Zhang, J., Yorke-Smith, N. (2016). A novel recommendation model regularized with user trust and item ratings. IEEE Transactions on Knowledge and Data Engineering, 28(7), 1607–1620.

    Article  Google Scholar 

  • Guo, G., Zhang, J., Zhu, F., Wang, X. (2017). Factored similarity models with social trust for top-N item recommendation. Knowledge-Based Systems, 122, 17–25.

    Article  Google Scholar 

  • Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J. (1999). An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, SIGIR ’99. https://doi.org/10.1145/312624.312682 (pp. 230–237). New York: ACM.

  • Jamali, M., & Ester, M. (2009). Trustwalker: a random walk model for combining trust-based and item-based recommendation. In Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 97–406). ACM.

  • Jamali, M., & Ester, M. (2010). A matrix factorization technique with trust propagation for recommendation in social networks. In Proceedings of the 4th ACM conference on recommender systems (pp. 135–142). ACM.

  • Jiang, C., Liu, S., Lin, Z., Zhao, G., Duan, R., Liang, K. (2016a). Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networks. Knowledge-Based Systems, 111(Supplement C), 237–247. https://doi.org/10.1016/j.knosys.2016.08.019.

  • Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J. (2016b). Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Computing Surveys (CSUR), 49(1), 10.

  • Jøsang, A., Ismail, R., Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.

    Article  Google Scholar 

  • Khusro, S., Ali, Z., Ullah, I. (2016). Recommender systems: issues, challenges, and research opportunities. In Kim, K.J., & Joukov, N. (Eds.) Information science and applications (ICISA) 2016. https://doi.org/10.1007/978-981-10-0557-2_112 (pp. 1179—1189). Singapore: Singapore Springer.

  • Koren, Y., Bell, R., Volinsky, C. (2009). Matrix factorization techniques for recommender systems. Computer, 42(8), 30–37.

    Article  Google Scholar 

  • Ma, H., Yang, H., Lyu, M.R., King, I. (2008). Sorec: social recommendation using probabilistic matrix factorization. In Proceedings of the 17th ACM conference on information and knowledge management (pp. 931–940). ACM.

  • Ma, H., King, I., Lyu, M.R. (2009). Learning to recommend with social trust ensemble. In Proceedings of the 32nd international ACM SIGIR conference on research and development in information retrieval (pp. 203–210). ACM.

  • Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I. (2011). Recommender systems with social regularization. In Proceedings of the 4th ACM international conference on web search and data mining (pp. 287–296). ACM.

  • Massa, P., & Avesani, P. (2007a). Trust-aware recommender systems. In Proceedings of the 2007 ACM conference on recommender systems (pp. 17–24). ACM.

  • Massa, P., & Avesani, P. (2007b). Trust-aware recommender systems. In Proceedings of the 2007 ACM conference on recommender systems (pp. 17–24). ACM.

  • Massa, P., & Bhattacharjee, B. (2004). Using trust in recommender systems: an experimental analysis. In International conference on trust management (pp. 221–235). Berlin: Springer.

  • Massa, P., Avesani, P., et al. (2004). Trust-aware collaborative filtering for recommender systems. CoopIS/DOA/ODBASE (1), 3290, 492–508.

    Google Scholar 

  • Moradi, P., & Ahmadian, S. (2015). A reliability-based recommendation method to improve trust-aware recommender systems. Expert Systems with Applications, 42(21), 7386–7398. https://doi.org/10.1016/j.eswa.2015.05.027.

    Article  Google Scholar 

  • Ning, X., Desrosiers, C., Karypis, G. (2015). A comprehensive survey of neighborhood-based recommendation methods. In Recommender systems handbook (pp. 37–76). Berlin: Springer.

  • O’Donovan, J., & Smyth, B. (2005). Trust in recommender systems. In Proceedings of the 10th international conference on intelligent user interfaces (pp. 167–174). ACM.

  • Pal, B., & Jenamani, M. (2017). Trust inference using implicit influence for item recommendation. In 2017 13th international conference on signal-image technology & internet-based systems (SITIS) (pp. 21–28). IEEE.

  • Rendle, S., Freudenthaler, C., Gantner, Z., Schmidt-Thieme, L. (2009). Bpr: bayesian personalized ranking from implicit feedback. In Proceedings of the 25th conference on uncertainty in artificial intelligence, UAI ’09. http://dl.acm.org/citation.cfm?id=1795114.1795167 (pp. 452–461). Arlington: AUAI Press.

  • Salakhutdinov, R., & Mnih, A. (2008). Bayesian probabilistic matrix factorization using Markov chain Monte Carlo. In Proceedings of the 25th international conference on machine learning (pp. 880–887). ACM.

  • Yang, X., Steck, H., Liu, Y. (2012). Circle-based recommendation in online social networks. In Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1267–1275). ACM.

  • Yang, B., Lei, Y., Liu, D., Liu, J. (2013). Social collaborative filtering by trust. In IJCAI 2013, proceedings of the 23rd international joint conference on artificial intelligence, Beijing, China, August 3-9, 2013 (pp. 2747–2753).

  • Yang, B., Lei, Y., Liu, J., Li, W. (2017). Social collaborative filtering by trust. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(8), 1633–1647.

    Article  Google Scholar 

  • Yuan, W., Guan, D., Lee, Y.-K., Lee, S., Hur, S.J. (2010). Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems, 23(3), 232–238. https://doi.org/10.1016/j.knosys.2009.12.004.

    Article  Google Scholar 

  • Yuan, W., Guan, D., Lee, Y.K., Lee, S. (2011). The small-world trust network. Applied Intelligence, 35(3), 399–410. https://doi.org/10.1007/s10489-010-0230-7.

    Article  Google Scholar 

  • Zhao, T., McAuley, J., King, I. (2014). Leveraging social connections to improve personalized ranking for collaborative filtering. In Proceedings of the 23rd ACM international conference on conference on information and knowledge management (pp. 261–270). ACM.

  • Zhou, T., Shan, H., Banerjee, A., Sapiro, G. (2012). Kernelized probabilistic matrix factorization: exploiting graphs and side information. In Proceedings of the 2012 SIAM international conference on data mining (pp. 403–414). SIAM.

  • Zhu, J., Ma, H., Chen, C., Bu, J. (2011). Social recommendation using low-rank semidefinite program. In AAAI (pp. 158–163).

Download references

Acknowledgments

The work has been financially supported by the project E-business Center of Excellence funded by Ministry of Human Resource and Development (MHRD), Government of India under the scheme of Center for Training and Research in Frontier Areas of Science and Technology (FAST), Grant No. F.No.5-5/2014-TS.VII.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bithika Pal.

Appendix

Appendix

Lemma 2

The value of c will always lie within the interval (0, \(\frac {1}{d_{max}}\) ] (i.e. \( 0 < c \leq \frac {1}{d_{max}}\) ).

Proof

From (7), part A is constant for some l, 2 ≤ ldmax and part B varies according to δ value of the intermediate nodes in the path. Now value of ti,j will be maximum when ∀uk ∈{u1,u2,…,ul− 1}, \(indeg(u_{k}) = maxindeg(\mathcal {G}_{t})\). Then for 𝜖 = 0, (7) will be

$$\begin{array}{@{}rcl@{}} [t_{i,j}]_{max} &=& \underset{\delta_{k}}{argmax}\left[ \left( \frac{d_{max} - l + 1}{d_{max}}\right) + (l-1)\cdot(\delta_{k})\right]\\ &=& \left( \frac{d_{max} - l + 1}{d_{max}}\right) + (l-1)\cdot \left( c \cdot \frac{indeg(u_{k})}{maxindeg(\mathcal{G}_{t})}\right) \\ &=& 1 - \frac{(l-1)}{d_{max}} + (l-1) \cdot c \\ && \qquad \qquad \hspace{2.7cm}[\because indeg(u_{k}) = maxindeg(\mathcal{G}_{t})] \end{array} $$

Now, as per (2),

$$\begin{array}{@{}rcl@{}} [t_{i,j}]_{max} \leq 1 & \Rightarrow & 1 - \frac{(l-1)}{d_{max}} + (l-1) \cdot c \leq 1 \\ & \Rightarrow & (l-1) \cdot c \leq \frac{(l-1)}{d_{max}} \\ & \Rightarrow & c \leq \frac{1}{d_{max}} \end{array} $$

Again value of ti,j will be minimum when ∀uk ∈{u1,u2,…,ul− 1}, indeg(uk) = 1 [as, uk lies within the path from ui to uj, so uk must have at least 1 incoming edge]. Then for 𝜖 = 0 minimum vale of ti,j will be,

$$\begin{array}{@{}rcl@{}} [t_{i,j}]_{min} &=& \underset{\delta_{k}}{argmin}\left[ \left( \frac{d_{max} - l + 1}{d_{max}}\right) + (l-1)\cdot(\delta_{k})\right]\\ & = & \left( \frac{d_{max} - l + 1}{d_{max}}\right) + (l-1) \cdot c \cdot \frac{1}{maxindeg(\mathcal{G}_{t})} \end{array} $$

Now, from the above equation, it is trivial that,

$$\begin{array}{@{}rcl@{}} &&\qquad [t_{i,j}]_{min} > \left( \frac{d_{max} - l + 1}{d_{max}}\right)\\ &&\Rightarrow (l-1) \cdot c \cdot \frac{1}{maxindeg(\mathcal{G}_{t})} > 0 \quad \Rightarrow c > 0 \end{array} $$

Hence, it is proved that for calculating ti,j by (7) c will always lie within \((0,\frac {1}{d_{max}}]\). □

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pal, B., Jenamani, M. Trust inference using implicit influence and projected user network for item recommendation. J Intell Inf Syst 52, 425–450 (2019). https://doi.org/10.1007/s10844-018-0537-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10844-018-0537-0

Keywords

Navigation