skip to main content
10.1145/2835776.2835816acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
research-article

The Troll-Trust Model for Ranking in Signed Networks

Published: 08 February 2016 Publication History

Abstract

Signed social networks have become increasingly important in recent years because of the ability to model trust-based relationships in review sites like Slashdot, Epinions, and Wikipedia. As a result, many traditional network mining problems have been re-visited in the context of networks in which signs are associated with the links. Examples of such problems include community detection, link prediction, and low rank approximation. In this paper, we will examine the problem of ranking nodes in signed networks. In particular, we will design a ranking model, which has a clear physical interpretation in terms of the sign of the edges in the network. Specifically, we propose the Troll-Trust model that models the probability of trustworthiness of individual data sources as an interpretation for the underlying ranking values. We will show the advantages of this approach over a variety of baselines.

References

[1]
. Aggarwal Social network data analytics. Springer, 2011.
[2]
S. Banach. Sur les opérations dans les ensembles abstraits et leur application aux équations intégrales. Fund. Math, 3(1):133--181, 1922.
[3]
S. Brin, and L. Page. The anatomy of a large-scale hypertextual Web search engine. Computer networks and ISDN systems, 30(1), pp. 107--117, 1998.
[4]
K. Y. Chiang, C. J. Hsieh, N. Natarajan, I. S., Dhillon, and A. Tewari. Prediction and clustering in signed networks: a local to global perspective. The Journal of Machine Learning Research, 15(1), pp. 1177--1213, 2014.
[5]
Ramanthan Guha, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. Propagation of trust and distrust. In Proceedings of the 13th international conference on World Wide Web, pages 403--412. ACM, 2004.
[6]
W. Cukierski, B. Hamner, and B. Yang. Graph-based features for supervised link prediction. In International Joint Conference on Neural Networks (IJCNN), pp. 1237--1244, 2011.
[7]
M. Jamali and M. Ester. TrustWalker: A random-walkmodel for combining trust-based and item-based recommendation. ACM KDD Conference, pp. 397--406, 2009.
[8]
S. Kamvar, M. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. World Wide Web Conference, pp. 640--651, 2003.
[9]
C. de Kerchove and P. V. Dooren. The PageTrust algorithm: how to rank web pages when negative links are allowed? SIAM Conference on Data Mining, pp. 346--352, 2008.
[10]
J. M. Kleinberg,Authoritative Sources in a Hyperlinked Environment, Journal of the ACM, 46(5), pp. 604--632, 1999.
[11]
J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. De Luca, and S.Albayrak. Spectral analysis of signed graphs for clustering, prediction and visualization. SIAM Conference on Data Mining, 2010.
[12]
J. Kunegis, A. Lommatzsch, and C. Bauckhage. The slashdot zoo: mining a social network with negative edges. World Wide Web Conference, pp. 741--750, 2009.
[13]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. World Wide Web Conference, pp. 641--650, 2010.
[14]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. SIGCHI Conference on Human Factors in Computing Systems, pp. 1361--1370, 2010.
[15]
D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and technology, 58(7), pp. 1019--1031, 2007.
[16]
A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in networks basedon trust scores. Proceedings of the 20th international conference on World Wide Web, pp. 567--576, 2011.
[17]
S. Rendle, C. Freudenthaler, Z. Gantner, and L. Schmidt-Thieme. BPR: Bayesian personalized ranking from implicit feedback. In Uncertainty in Artificial Intelligence (UAI), pp. 452--461, 2009.
[18]
M. Shahriari and M. Jalili. Ranking nodes in signed social networks, Social Network Analysis and Mining, 4:172, 2014.
[19]
P. Sy meonidis, E. Tiakas, and Y. Manolopoulos. Transitive node similarity for link prediction in social networks with positive and negative links. ACM Conference on Recommender Systems, pp. 183--190, 2010.
[20]
J. Tang, S. Chang, C. Aggarwal, and H. Liu. Negative link prediction in social media, WSDM Conference, 2015.
[21]
V. Traag, Y. Nesterov, P. van Dooren. Exponential Ranking:taking into account negative links. Social Informatics, 6430,pp. 192--202, 2010.
[22]
H. Wang, X. He, M.-W. Chang, Y. Song, R. W. White, and W. Chu. Personalized ranking model adaptation for web search. In ACM SIGIR Conference, pp. 323--332, 2013.
[23]
T. Zhang, H. Jiang, Z. Bao, and Y. Zhang. Characterization and edge sign prediction in signed networks. Journal of Industrial and Intelligent Information Vol, 1(1), 2013.
[24]
K. Zolfaghar and A. Aghaie. Mining trust and distrust relationships in social web applications. In Intelligent Computer Communication and Processing Conference(ICCP), pp. 73--80, 2010.

Cited By

View all
  • (2025)CSGDN: contrastive signed graph diffusion network for predicting crop gene–phenotype associationsBriefings in Bioinformatics10.1093/bib/bbaf06226:1Online publication date: 20-Feb-2025
  • (2025)Unleashing the power of indirect attacks against trust prediction via preferential pathKnowledge and Information Systems10.1007/s10115-024-02327-9Online publication date: 6-Feb-2025
  • (2024)Status-Aware Signed Heterogeneous Network Embedding With Graph Neural NetworksIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.3151046(1-13)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. The Troll-Trust Model for Ranking in Signed Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WSDM '16: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining
    February 2016
    746 pages
    ISBN:9781450337168
    DOI:10.1145/2835776
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 February 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data mining
    2. ranking
    3. signed networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    WSDM 2016
    WSDM 2016: Ninth ACM International Conference on Web Search and Data Mining
    February 22 - 25, 2016
    California, San Francisco, USA

    Acceptance Rates

    WSDM '16 Paper Acceptance Rate 67 of 368 submissions, 18%;
    Overall Acceptance Rate 498 of 2,863 submissions, 17%

    Upcoming Conference

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)CSGDN: contrastive signed graph diffusion network for predicting crop gene–phenotype associationsBriefings in Bioinformatics10.1093/bib/bbaf06226:1Online publication date: 20-Feb-2025
    • (2025)Unleashing the power of indirect attacks against trust prediction via preferential pathKnowledge and Information Systems10.1007/s10115-024-02327-9Online publication date: 6-Feb-2025
    • (2024)Status-Aware Signed Heterogeneous Network Embedding With Graph Neural NetworksIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.3151046(1-13)Online publication date: 2024
    • (2024)Positive Communities on Signed Graphs That Are Not Echo Chambers: A Clique-Based Approach2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00199(2531-2543)Online publication date: 13-May-2024
    • (2023)Maximum Balanced (k,ϵ)-Bitruss Detection in Signed Bipartite GraphProceedings of the VLDB Endowment10.14778/3632093.363209917:3(332-344)Online publication date: 1-Nov-2023
    • (2023)SigGAN: Adversarial Model for Learning Signed Relationships in NetworksACM Transactions on Knowledge Discovery from Data10.1145/353261017:1(1-20)Online publication date: 20-Feb-2023
    • (2023)Spammer detection via ranking aggregation of group behaviorExpert Systems with Applications10.1016/j.eswa.2022.119454216(119454)Online publication date: Apr-2023
    • (2023)Unsupervised Fraud Detection on Sparse Rating NetworksData Science and Machine Learning10.1007/978-981-99-8696-5_2(19-33)Online publication date: 5-Dec-2023
    • (2022)Signed random walk diffusion for effective representation learning in signed graphsPLOS ONE10.1371/journal.pone.026500117:3(e0265001)Online publication date: 17-Mar-2022
    • (2022)A Novel Negative Link Prediction Algorithm for Social Networks2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)10.1109/VTC2022-Spring54318.2022.9860751(1-5)Online publication date: Jun-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media