Advanced
Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation
Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation
KSII Transactions on Internet and Information Systems (TIIS). 2015. Dec, 9(12): 4892-4911
Copyright © 2015, Korean Society For Internet Information
  • Received : July 30, 2015
  • Accepted : September 23, 2015
  • Published : December 31, 2015
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
About the Authors
Haifeng Liu
Zhuo Yang
Jun Zhang
Xiaomei Bai
Wei Wang
Feng Xia

Abstract
Trust as one of important social relations has attracted much attention from researchers in the field of social network-based recommender systems. In trust network-based recommender systems, there exist normally two roles for users, truster and trustee. Most of trust-based methods generally utilize explicit links between truster and trustee to find similar neighbors for recommendation. However, there possibly exist implicit correlations between users, especially for users with the same role (truster or trustee). In this paper, we propose a novel Collaborative Filtering method called CF-TC, which exploits Trust Context to discover implicit correlation between users with the same role for recommendation. In this method, each user is first represented by the same-role users who are co-occurring with the user. Then, similarities between users with the same role are measured based on obtained user representation. Finally, two variants of our method are proposed to fuse these computed similarities into traditional collaborative filtering for rating prediction. Using two publicly available real-world Epinions and Ciao datasets, we conduct comprehensive experiments to compare the performance of our proposed method with some existing benchmark methods. The results show that CF-TC outperforms other baseline methods in terms of RMSE, MAE, and recall.
Keywords
1. Introduction
W ith the development of information technology, Recommender Systems (RSs) as an indispensable type of information filtering technique have attracted much attention in the past decades. Collaborative filtering (CF), a typical recommendation technique, which automatically predicts the interests of an active user by collecting rating information from other similar users or items, has been successfully applied in lots of domains such as e-commerce [1] , e-learning [2] , music [3] , [4] , movies [5] , [6] , mobile tourism [7] , [8] , etc.
Recently, with social networks becoming increasingly popular, more and more researchers have realized that social networks play an important role in recommender systems because they provide rich information on various social relations between users such as friendship to improve traditional recommendation methods. Trust, which is one of these important social relations, has been proved its strong connections to users’ interests and its effectiveness in recommendation quality improvement in many studies [9] , [10] . The rationale underlying trust-aware recommendation method is that, the taste of a user (truster) is similar to that of his trusted users (trustees).
Most of these studies focus on mining and utilizing explicit links between trusters and trustees to find similar neighbors for recommendation. However, implicit correlations between users with the same role (truster or trustee) are ignored, which are actually useful for generating accurate predictions. These implicit correlations between same-role users may be built based on explicit link between role-different users. Yao et al. [11] proposed to incorporate similar trusters and trustees into a traditional matrix factorization-based recommendation method. They considered two users with the same role (truster or trustee) to be related if they trusted (or are trusted by) the same trustees (or trusters), as shown in Fig. 1 . In Fig. 1 (a), two trusters u 1 and u 2 (with the same role) are similar to some extent because they trust a trustee v 2 simultaneously. In Fig. 1 (b), two trustees v 1 and v 2 (with the same role) are similar to some extent because they are trusted by a truster u 1 simultaneously. Based on this theory, trust relation matrix was exploited to compute corresponding similarities between users with the same role. Additionally, implicit correlation between users with the same role may be built based on implicit co-occurrence between same-role users, as shown in Fig. 2 . In Fig. 2 (a), trusters u 1 , u 2 , and u 3 (with the same role) are co-occurring (because they trust a trustee v 1 simultaneously), trusters u 2 , u 3 , and u 4 are co-occurring (because they trust a trustee v 2 simultaneously). Thus, u 1 and u 4 are similar to some extent because they are described through the same co-occurrences, here trusters u 2 and u 3 . Likewise, Fig. 2 (b) shows another example on inferring similarity between trustees v 1 and v 4 .
PPT Slide
Lager Image
Common trusters or trustees relations: (a) u1 and u2 have a common trustee v2; (b) v1 and v2 have a common truster u1
PPT Slide
Lager Image
Co-occurrence relations: (a) u1 and u4 are co-occurring with the same trusters u2 and u3; (b) v1 and v4 are co-occurring with the same trustees v2 and v3.
In this paper, we focus on utilizing implicit correlations between users with the same role stated in the abovementioned scenario for recommendation and present a novel Collaborative Filtering recommendation method based on Trust Context (CF-TC). We first employ an association mining technique to determine whether two users with the same role are significantly co-occurring based on trust context. Then, each user is represented by these significantly co-occurred users. Finally, user similarities are computed based on user vectors and are fused into two traditional (memory-based and matrix factorization-based) collaborative filtering methods for rating prediction. We have conducted relevant experiments on two real-world datasets Epinions and Ciao, and the results demonstrate that our proposed method outperforms other baseline methods in terms of RMSE, MAE, and recall. This proves the effectiveness of proposed method.
The major contributions of this paper are summarized as follows:
(i) We propose to mine the implicit correlations between users with the same role based users’ trust context.
(ii) We propose two methods to exploit implicit correlations between users with the same role for improving recommendation performance.
(iii) We conduct relevant experiments on two publicly available datasets, and verify the effectiveness of the proposed recommendation method using relevant metrics.
The rest of this paper is organized as follows. Section 2 summarizes the related work on trust-aware recommendation. Section 3 proposes our method and introduces the detail of its two variants. Section 4 presents related experiments and discusses the results. Section 5 concludes this paper.
2. Related Work
The challenges of existing recommender systems mainly include cold start [12] , [13] , data sparsity [14] , [15] , and attacks [16] , [17] . Trust has been regarded as one kind of commonly-used auxiliary information to help design more efficient recommender systems by solving these challenges to some extent. In this section, we review some related work on trust-aware recommendation methods. In a trustware recommender systems, trust information can be used in one of the following approaches along with traditional recommender systems [18] : (i) Trust-aware memory-based CF approachers, which use memory-based CF techniques as their basic methods, and (ii) Trust-aware model-based CF approachers, which use model-based CF techniques as their basic methods.
Trust-aware memory-based CF approaches incorporate trust information to depress recommendations from distrusted users and boost recommendations from trusted users. Golbeck [19] proposed a method called TidalTrust which performs a modified breadth first search in the trust network to compute trust values based on the following two observations: (i) shorter propagation paths produce more accurate trust estimates, and (ii) paths with higher trust values create better results. Massa and Avesani [9] proposed a new trust metric called MoleTrust which is similar to TidalTrust. Additionally, MoleTrust needs a predefined trust threshold to determine which users to consider in the rating aggregation process. Jamali and Ester [20] proposed a recommendation model called TrustWalker which combines trust-based and item-based recommendation. TrustWalker queries a user’s direct and indirect friends’ ratings for the target item as well as similar items by performing a random walk in online social networks. These recommendation approaches use trust information to either filter distrusted users or weigh the recommendation results made by all users.
Matrix factorization technique is a widely-used recommendation method in model-based CF. Ma et al. [21] considered that users and their trust networks should have similar ratings on items, and proposed to predict a missing rating for a given user as a linear combination of ratings from the user and his/her trust network. Tang et al. [22] , [23] proposed to perform a co-factorization procedure in the user-item matrix and the user-user trust relation matrix by sharing the same user preference latent factor based on the assumption that a user shares the same user preference vector in the rating space (rating information) and the trust relation space. Menon et al. [22] , [24] reconstructed the trust matrix T to perform trust relation prediction. Jamali et al. [25] , [26] proposed methods to force a user’s preference to be closer to that of users in the user’s trust network. Specially, SocialMF [25] proposed to force the preferences of a user to be closer to the average preference of the user’s trust network. Yang et al. [27] proposed a method called CircleCon which uses SocilMF [25] as a base method and focuses on inferring categoryspecific social trust circles from available rating information combined with social network information where social trust relations across all categories are mixed together. Trust-aware model-based MF approaches assume that users’ preferences are similar to or influenced by their trusted users.
The methods above focus on utilizing direct or indirect trust relations to improve recommendation performance of traditional methods. However, users in trust network are associated with two different roles (truster and trustee). There may be implicit correlations between users with the same role. Therefore, our work proposes to mine these implicit correlations and then apply them in collaborative filtering for improving recommendation performance. Yao et al. [11] also take users’ roles into consideration. In this paper, we take their work as a baseline to verify the effectiveness of our method.
3. Design of CF-TC
- 3.1 Overview
Our proposed CF-TC method mainly includes two components, as shown in Fig. 3 : (i) mining implicit correlations between users with the same role and (ii) applying the mined implicit correlations for rating prediction. At the first step, for each user, we build his user representation using those who have the same role with the user. Then, we obtain the weight of each implicit correlation by computing the cosine similarity between any two users with the same role. At the second step, based on the computed weights, we present two variants of CF-TC, i.e, Memory-based CF-TC (CF-TC-Me) and Matrix Factorization-based CF-TC (CF-TC-MF). CF-TCMe and CF-TC-MF exploit the memory-based collaborative filtering and matrix-factorization-based collaborative filtering to predict ratings.
PPT Slide
Lager Image
Our proposed method.
- 3.2 Mining Implicit Correlations
- 3.2.1 Building User Representation
In this section, we introduce how to build user representation based on the trust context. In trust relations, there are two roles of users: trusters who expressed trust to others and trustees who were trusted by others. We consider that two trusters are co-occurring if they expressed trust to the same trustees, and two trustees are co-occurring if they were trusted by the same trusters. The following examples are taken to illustrate how to obtain the co-occurrence relations between trusters as well as trustees, and their user representations. Table 1 shows the trust relations between trusters u 1 , u 2 , u 3 , u 4 and trustees v 1 , v 2 , v 3 , v 4 , v 5 . Here, for simplicity, we consider two trusters to be significantly occurring if they expressed trust to at least one trustee simultaneously. In addition, a binary value of 1 or 0 is used for stating whether two trusters are co-occurring or not. Table 2 shows the user (truster) vectors describing the four trusters calculated in this manner. As demonstrated in the table, trusters u 2 and u 4 are described by the same user vectors, therefore they are highly related. Similarly, we consider two trustees to be significantly co-occurring if they were trusted by at least one truster simultaneously. In this way, associations between trustees are computed and the user (trustee) vectors describing the five trustees are shown in Table 3 , where trustees v 3 and v 5 are described by almost the same user vectors, therefore they are also highly related. Actually, significant co-occurrences of users with the same role (truster or trustee) depend on the trust context. Therefore, we calculate a significance score based on contingency tables commonly used in statistical theory.
Exemplary trust relation matrix
PPT Slide
Lager Image
Exemplary trust relation matrix
User vectors for trusters
PPT Slide
Lager Image
User vectors for trusters
User vectors for trustees
PPT Slide
Lager Image
User vectors for trustees
Table 4 shows the contingency table for users u and v with the same role. When they are trusters, they expressed trusts to N 11 trustees simultaneously, truster u expressed trusts to N 12 trustees who were not trusted by truster v , truster v expressed trusts to N 21 trustees who were not trusted by truster u , and they did not express trust to N 22 trustees. On the other hand, when users u and v are trustees, they were expressed trusts by N 11 trusters simultaneously, trustee u was trusted by N 12 trusters who did not express trusts to trustee v , trustee v was trusted by N 21 trusters who did not express trusts to trustee u , and they were not expressed N 22 trusters. Based on the obtained contingency table, the χ 2 test is then used to measure the association degree between any two users, as shown in Equation 1. χ 2 test sums the squared z-scores for each cell in the contingency table and is correlated to the expected frequencies. The cumulative distribution function of χ 2 as shown in Equation 2, is used to compute association degree deg ranging from 0 to 1. A larger value of χ 2 will generate a larger association degree. The larger association degree indicates that the co-occurrence between two users is more significant. We use a threshold ts to determine whether the co-occurrence is significant or not. For two users with the same role, if their computed association degree is larger than ts , they are regarded to be significantly co-occurred, and vice versa.
PPT Slide
Lager Image
where R 1 = N 11 + N 12 , R 2 = N 21 + N 22 , C 1 = N 11 + N 21 , C 2 = N 12 + N 22 , and N = C 1 + C 2 = R 1 + R 2 .
PPT Slide
Lager Image
where v is the freedom degree and equals 1 for the contingency table here, Γ (·) is the Gamma function, x is the value of χ 2 computed using Equation 1.
Contingency table
PPT Slide
Lager Image
Contingency table
- 3.2.2 Computing User Similarity
We calculate the similarity between any two users u and v with the same role using the cosine similarity which measures the angle between their user vectors, as shown in Equation 3. Vu and Vv denote their user vectors. The value of cosine similarity is ranging from 0 to 1.
PPT Slide
Lager Image
- 3.3 Memory-based CF-TC
To predict a target user’s rating on a target item, memory-based collaborative filtering generally employs two classes of methods: (i) user-centric method, computes the similarities between users and then utilizes ratings of similar users on the target item to predict unknown rating; (ii) item-centric method, computes the similarities between items and then utilizes ratings of the target user on similar items to predict unknown rating. Here, we use the first method. We compute the predicted rating
PPT Slide
Lager Image
of a user u on an item i by averaging the scores of neighbor users of u while each score is weighted by the corresponding similarity simu,v , as shown in Equation 4.
PPT Slide
Lager Image
where v is one of neighbor users of u .
- 3.4 Matrix Factorization-based CF-TC
Matrix Factorization (MF) is a traditional model-based collaborative filtering method. Matrix Factorization-based CF performs a low-rank matrix factorization on the user-item rating matrix based on the assumption that a few latent patterns influence user rating behaviors. Let Pu RK and Qi RK be the user preference vector for user u and item feature vector for i respectively, where K is the number of latent vectors. The objective function of MF method is
PPT Slide
Lager Image
where Wu,i is an indicator function that is equal to 1 if user u expressed rating on item i and equal to 0 otherwise,
PPT Slide
Lager Image
denotes the Frobenius norm, λ is the regularization coefficient. By performing gradient descent in Pu and Qi , the minimum of the objective function above can be found and then P and Q can be obtained. Next, the prediction rating
PPT Slide
Lager Image
can be computed as follows:
PPT Slide
Lager Image
where
PPT Slide
Lager Image
is a (global) offset value.
The theory of trust-based recommendation stipulates that the tastes of two users existent in trust relations have to be similar. The similarity between users means they have similar interests to some extent. Thus, we minimize the following two objective functions to integrate the information on implicit correlations between trusters and trustees, respectively.
PPT Slide
Lager Image
PPT Slide
Lager Image
where U1 and U2 denote the set of trusters and the set of trustees, simu,v is the similarity between users u and v computed in previous section.
The unified object function for CF-TC-MF is defined as
PPT Slide
Lager Image
where α and β are non-negative parameters that are used to trade off the three objective functions. The minimum of the objective function can be found by performing gradient descent in Pu and Qi :
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
where Wu,i is the indicator function that is equal to 1 if u expressed a rate score on i , and equal to 0 otherwise. Similarly,
PPT Slide
Lager Image
is equal to 1 if u is a truster (or a trustee) and equal to 0 otherwise. θ is the learning rate for iteration. The initial values of Pu and Qi are sampled from the normal distribution with zero mean. In each iteration, Pu and Qi are updated based on the latent variables from the previous iteration. The learned Pu and Qi can be used to predict ratings for user-item pairs.
4. Experimental Results and Analysis
- 4.1 Datasets
Epinions ( www.epinions.com ) and Ciao ( www.ciao.it ) are well-known consumer opinion websites. From these two websites, two kinds of information can be extracted: (i) rating information, users can make reviews to familiar items and further assign these items numeric ratings in the range of 1 (min) to 5 (max); (ii) trust relations, users express their trusts to other users and add these users to their trust networks if they find their reviews consistently interesting and helpful. We used the versions of Epinions and Ciao datasets [28] for our performance evaluation. In order to explore the impact of our proposed trust relation-based method (CF-TC) on recommendation quality, users without trust relations and their ratings were removed. The statistics of these preprocessed datasets are presented in Table 5 .
Data statistics
PPT Slide
Lager Image
Data statistics
- 4.2 Experimental Setup
We randomly divided each of the two above-mentioned datasets into two parts: training set (80%) and test set (20%). The evaluation metrics in our experiments are the Root Mean Square Error (RMSE) and the Mean Absolute Error (MAE), as these are some of the most popular accuracy measures in the literature of recommender systems. RMSE and MAE are defined using Equations 14 and 15.
PPT Slide
Lager Image
PPT Slide
Lager Image
In addition, we employed top-N recall as another evaluation metric in our experiments. As to computing the top-N recall, for each user u , we rank the items i according to the predicted rating
PPT Slide
Lager Image
. An item is defined as relevant to a user in the test set if s/he finds it appealing or interesting (e.g., the assigned rating in the test data is above a certain threshold). For instance, in our experiments with Epinions data, the rating value ranges from 1 to 5, and we consider rating value of 5 as relevant (i.e. the user definitely liked these items), while other rating values and missing rating values are considered not relevant. Other choices led to similar results. Now the recall can be defined as the fraction of relevant items in the test set that are in the top-N of the ranking list, denoted by Num(N, u) , from among all relevant items, Num(u) . For each user u , the individual top-N recall is given by
PPT Slide
Lager Image
which can be aggregated over all users to obtain the average recall for the test set [29] . The average top-N recall is computed as follows:
PPT Slide
Lager Image
In our experiments, we compared the recommendation results of the following two classes of methods in order to demonstrate the effectiveness of our proposed CF-TC method. The core of the first class of methods is memory-based collaborative filtering, including CF-Me (This is the traditional user-centric collaborative filtering method), CF-TM-Me (It computes the user similarities based on trust matrix for applying memory-based collaborative filtering method [11] ), and CF-TC-Me (This is the first variant of CF-TC). The core of the second class of methods is matrix factorization, including CF-MF (This is the traditional matrix factorization-based recommendation method, which represents user and item with feature vector [30] ), and CF-TM-MF (It fuses two kinds of correlations between users into traditional matrix factorization model for recommendation [11] and these correlations are computed based on trust matrix), and CF-TC-MF (This is the second variant of CF-TC).
- 4.3 Results and Analysis
As the threshold ts is an important impact parameter for determining significant co-occurrences between users with the same role, we conducted relevant experiments to discuss its impact. Fig. 4 shows the results of our proposed CF-TC-Me method based on the truster-truster similarities in terms of RMSE and MAE on Epinions when ts is ranging from 0.0001 to 0.15. From Fig. 4 we can observe that, CF-TC-Me achieves smaller values of RMSE and MAE when ts is equal to an intermediate value (e.g., 0.005) than those when ts is equal to a smaller value (e.g., 0.0001) or a larger value (e.g., 0.15). This is due to the fact that, too large value of ts leads to filtering too many useful co-occurrence relations, and too small value of ts leads to keeping too many useless co-occurrence relations, thereby obtaining so inaccurate similarities.
PPT Slide
Lager Image
Impact of ts on CF-TC-Me (truster) on Epinions.
Fig. 5 shows the results of our proposed CF-TC-Me method based the trustee-trustee similarities in terms of RMSE and MAE Epinions when ts is ranging from 0.0001 to 0.15. It can also be seen from Fig. 5 that RMSE and MAE are smaller when ts equals an intermediate value (e.g., 0.005). In addition, in order to further discuss the impact of ts on CFTC-Me method, we conducted other experiments on Ciao and obtained the similar results as shown in Figs. 6 and 7 . and the results demonstrated the importance of an appropriate value of ts. Therefore, an appropriate value of ts is important for improving recommendation quality.
PPT Slide
Lager Image
Impact of ts on CF-TC-Me (trustee) on Epinions.
PPT Slide
Lager Image
Impact of ts on CF-TC-Me (truster) on Ciao.
PPT Slide
Lager Image
Impact of ts on CF-TC-Me (trustee) on Ciao.
We compared the results of the above-mentioned first three methods (CF-Me, CF-TM-Me, and CF-TC-Me) on Epinion and Ciao. Table 6 summarizes their performance comparisons when taking each truster as recommendation target and setting ts to 0.005 for Epinions, 0.01 for Ciao. From Table 6 , it can be observed that, CF-TC-Me and CF-TM-Me achieve smaller values of RMSE and MAE than CF-Me. This proves once again that trust relations can improve recommendation quality of traditional CF method, as demonstrated in other related work [9] , [10] . Another observation is that CF-TC-Me performs better than CF-TM-Me in terms of RMSE and MAE. This indicates that, trust context-based similarity yields more accurate user relations being discovered and exploited when compared to the trust matrix-based recommendation method. Additionally, Table 7 summarizes their performance comparisons when taking each trustee as recommendation target and setting ts to 0.005 for Epinions, 0.0015 for Ciao. The results also demonstrate that CF-TC-Me outperforms CF-TM-Me and CF-TMMe outperforms CF-Me. This also verifies the effectiveness of our proposed method.
Performance comparison for trusters
PPT Slide
Lager Image
Performance comparison for trusters
Performance comparison for trustees
PPT Slide
Lager Image
Performance comparison for trustees
As a user is not only a truster but also a trustee in trust relations, we conducted experiments on Epinions and Ciao, to demonstrate the comparison results of CF-TC-Me based on truster-truster similarities, CF-TC-Me based on trusteetrustee similarities and hybrid CF-TC-Me by utilizing least squares method to fuse the ratings predicted by the first two methods. From Table 8 we can observe that hybrid CFTC-Me performs better than CF-TC-Me (truster) and CF-TCMe (trustee). This indicates that the data fusion technique optimizes RMSE and it is possibly useful to utilize information on users’ different roles for designing a better method.
RMSE of different CF-TC-Mes
PPT Slide
Lager Image
RMSE of different CF-TC-Mes
To test top-N recommendation, we conducted relevant experiments and compared the results of the above-mentioned first three methods (CF-Me, CF-TM-Me, and CF-TC-Me) on Epinion, as shown in Figs. 8 and 9 . Fig. 8 shows the recalls of all comparison partners for trusters, respectively. From this figure, we can see that the recalls of the three methods are increasing as the length of recommendation list, N, increases. This is obviously due to the fact that, a larger value of N makes more items recommended to each truster and then more relevant items are possibly find in the recommendation list. In addition, we can also see that, for different values of N, the recalls of both CF-TC-Me and CF-TM-Me are higher than that of CF-Me. Namely, CF-TC-Me and CFTM-Me outperform CF-Me in terms of recall. This further proves that, it is necessary and effective to incorporate trust into recommender systems for improving recommendation quality. Furthermore, compared CF-TC-Me to CF-TM-Me, it is significantly observed that, the recall of CF-TC-Me is higher than that of CF-TM-Me for all different values of N. Namely, CF-TC-Me is better than CF-TM-Me in terms of recall. This indicates that, our proposed method can mine more accurate correlations between users with the same role (here, it is truster) and then improve recommendation quality in terms of recall.
PPT Slide
Lager Image
Comparison of Recall of the first three methods for trusters on Epinions.
PPT Slide
Lager Image
Comparison of Recall of the first three methods for trustees on Epinions.
Furtherssssmore, Fig. 9 shows the recalls of all comparison partners for trustees, respectively. From this figure, we can see that, for trustees as recommendation targets, CF-TM-Me is better than CF-Me and CF-TC-Me is better than CF-TM-Me in terms of recall. Meanwhile, compared to the results for trusters, the difference between the recalls of CF-TC-Me and CF-TM-Me is smaller. This might be influenced by users’ roles and rating information. Also, we conducted relevant experiments on Ciao dataset, as shown in Figs. 10 and 11 . We can see that their results on Ciao are similar to those on Epinions. This further improves the effectiveness of our proposed method.
PPT Slide
Lager Image
Comparison of Recall of the first three methods for trusters on Ciao.
PPT Slide
Lager Image
Comparison of Recall of the first three methods for trustees on Ciao.
Additionally, we compared the results of the abovementioned last three methods (CF-MF, CF-TM-MF, and CFTC-MF) on Epinion and Ciao. In our experiments, we set the values of the parameters θ and λ as 0.01 and 0.1, respectively. We let α equal β and assign 0.001, 0.01, 0.1, 1, 10, 20, 30, 50 to them to test the their impacts on CF-TC-MF method in terms of RMSE and MAE on Epinions and Ciao, as shown in Figs. 12 and 13 . From these two figures, we can see that, when alpha and beta are equal to 1, CF-TC-MF achieves the best values of RMSE and MAE on Epinions and Ciao. Furthermore, we set the values of these parameters α , β , λ , and θ as 1, 1, 0.1, and 0.01, respectively for next comparison. Table 9 summarizes their performance comparisons when ts is assigned the same value in the previous experiments, i.e., ts is equal to 0.005/0.01 for Epinions/Ciao when computing the similarities between trusters, and ts is equal to 0.005/0.0015 for Epinions/Ciao when computing the similarities between trustees. From Table 9 , it can be observed that, CF-TCMF and CF-TM-MF achieve smaller values of RMSE and MAE than CF-MF. This proves that trust relations can improve recommendation quality of traditional matrix factorizationbased CF method, as demonstrated in other work [18] , [31] . We can obviously see that CF-TC-MF performs better than CF-TM-MF in terms of RMSE and MAE. This also indicates that, trust context-based similarity yields more accurate user relations being discovered and exploited when compared to the trust matrix-based matrix factorization method. This also verifies the effectiveness of our proposed method.
PPT Slide
Lager Image
RMSE and MAE of CF-TC-MF method for different values of α and β on Epinions (α = β).
PPT Slide
Lager Image
RMSE and MAE of CF-TC-MF method for different values of α and β on Ciao (α = β).
Performance comparison
PPT Slide
Lager Image
Performance comparison
Comparing Table 9 to Tables 6 and 7 , we can observe that matrix factorization-based CF outperfoms memory-based CF in terms of RMSE and MAE on Epinions and Ciao. In spite of this, we cannot say that the former is absolutely better that the latter. Actually, they have their own advantages. The former can generate real-time recommendations while the latter can predict a user’s rating on an item even though the item is not rated by those who are similar to the user.
5. Conclusion
In this paper, we have investigated how to mine implicit correlation between users with the same role for improving the accuracy of trust-based recommendation. The rationale underlying our method is that two users with the same role (truster or trustees) are considered to be similar to some extent if they are significantly co-occurring with other same-role users. Co-occurrence relation between two same-role users is determined through an association mining technique based on trust context. Based on obtained co-occurrence relation, each user is represented by user vector and the similarities between any two users with the same role are computed by comparing their vectors. We fused these computed similarities into two traditional collaborative filtering methods. Through relevant experiments on Epinions and Ciao, we show that our proposed CF-TC method outperforms other baseline methods in terms of RMSE, MAE, and recall.
BIO
Haifeng Liu received the B.Sc. and M.Sc. degrees in computer science, in 2009 and 2012, respectively, from the Dalian University of Technology, China, where he is currently working toward the Ph.D. degree in the School of Software. His research interests include recommender systems, mobile computing, and big data.
Zhuo Yang received B.Sc. degree from China Jiliang University and M.Sc. degree from Nanyang Technological University, Singapore. She has been working as a Software Engineer in School of Software, Dalian University of Technology, China since 2009. She was a Software Quality Assurance Engineer at Hundsun Technologies Inc., Hangzhou, China and a Software Validation Engineer in Gemalto R&D, Singapore. Her research interests include mobile computing, recommender systems, and big data.
Jun Zhang received her B.Sc. and M.Sc. degrees in software engineering from Jilin University, Changchun, China. She is currently working toward the Ph.D. degree in Software Engineering in Dalian University of Technology, Dalian, China. Her research interests include computational social science, scientific impact evaluation and scholarly data analysis.
Xiaomei Bai received the B.S. degree in computer and application from University of Science and Technology Liaoning, Anshan, China, in 2000 and the M.S. degree in software engineering from Jilin University, Changchun, China, in 2006. She is currently working toward the Ph.D. degree from the Mobile and Social Computing Laboratory, School of Software, Dalian University of Technology, Dalian, China. Since 2000, she has been working in Anshan Normal University, Anshan, China. Her research interests include computational social science, relation analysis and influence analysis.
Wei Wang received his B.S. degree in Electronic Information Science and Technology from Shenyang University, Shenyang, China, in 2012. He is currently working toward the Ph.D. degree in Software Engineering in Dalian University of Technology (DUT), Dalian, China. His research interests include big scholarly data, social network analysis and computational social science.
Feng Xia received the BSc and Ph.D. degrees from Zhejiang University, Hangzhou, China. He was a Research Fellow at Queensland University of Technology, Australia. He is currently a Full Professor in School of Software, Dalian University of Technology, China. He is the (Guest) Editor of several international journals. He serves as General Chair, PC Chair, Workshop Chair, Publicity Chair, or PC Member of a number of conferences. Dr. Xia has authored/co-authored two books and over 180 scientific papers in international journals and conferences. His research interests include social computing, computational social science, big data, and mobile social networks. He is a Senior Member of IEEE and ACM.
References
Wang H.-F. , Wu C.-T. 2012 “A strategy-oriented operation module for recommender systems in e-commerce,” Computers and Operations Research 39 (8) 1837 - 1849    DOI : 10.1016/j.cor.2010.03.011
Ali S. M. , Ghani I. , Latiff M. S. A. 2015 “Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective,” KSII Transactions on Internet and Information Systems 9 (1) 446 - 465
Aizenberg N. , Koren Y. , Somekh O. “Build your own music recommender by modeling internet radio streams,” in Proc. of the 21st International Conference on World Wide Web 2012 1 - 10
Knees P. , Schedl M. 2013 “A survey of music similarity and recommendation from music context data,” ACM Transactions on Multimedia Computing, Communications, and Applications 10 (1) 1 - 21    DOI : 10.1145/2542205.2542206
Carrer-Neto W. , Hernandez-Alcaraz M. L. , Valencia-Garcıa R. , Garcıa-Sanchez F. 2012 “Social knowledge-based recommender system. application to the movies domain,” Expert Systems with Applications 39 (12) 10990 - 11000    DOI : 10.1016/j.eswa.2012.03.025
Azaria A. , Hassidim A. , Kraus S. , Eshkol A. , Weintraub O. , Netanely I. “Movie recommender system for profit maximization,” in Proc. of the 7th ACM Conference on Recommender Systems 2013 121 - 128
Gavalas D. , Konstantopoulos C. , Mastakas K. , Pantziou G. 2014 “Mobile recommender systems in tourism,” Journal of Network and Computer Applications 39 319 - 333    DOI : 10.1016/j.jnca.2013.04.006
Borras J. , Moreno A. , Valls A. 2014 “Intelligent tourism recommender systems: A survey,” Expert Systems with Applications 41 (16) 7370 - 7389    DOI : 10.1016/j.eswa.2014.06.007
Massa P. , Avesani P. “Trust-aware recommender systems,” in Proc. of the 2007 ACM Conference on Recommender Systems 2007 17 - 24
Harman J. L. , O’Donovan J. , Abdelzaher T. , Gonzalez C. “Dynamics of human trust in recommender systems,” in Proc. of the 8th ACM Conference on Recommender Systems 2014 305 - 308
Yao W. , He J. , Huang G. , Zhang Y. “Modeling dual role preferences for trust-aware recommendation,” in Proc. of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval 2014 975 - 978
Bobadilla J. , Ortega F. , Hernando A. , Bernal J. 2012 “A collaborative filtering approach to mitigate the new user cold start problem,” Knowledge-Based Systems 26 225 - 238    DOI : 10.1016/j.knosys.2011.07.021
Lika B. , Kolomvatsos K. , Hadjiefthymiades S. 2014 “Facing the cold start problem in recommender systems,” Expert Systems with Applications 41 (4) 2065 - 2073    DOI : 10.1016/j.eswa.2013.09.005
Guo G. 2012 “Resolving data sparsity and cold start in recommender systems,” Lecture Notes in Computer Science 7379 361 - 364
Guo G. , Zhang J. , Thalmann D. 2014 “Merging trust in collaborative filtering to alleviate data sparsity and cold start,” Knowledge-Based Systems 57 57 - 68    DOI : 10.1016/j.knosys.2013.12.007
Cao J. , Wu Z. , Mao B. , Zhang Y. 2013 “Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system,” World Wide Web 16 (5-6) 729 - 748    DOI : 10.1007/s11280-012-0164-6
Noh G. , Kang Y. , Oh H. , Kim C. 2014 “Robust sybil attack defense with information level in online recommender systems,” Expert Systems with Applications 41 (4) 1781 - 1791    DOI : 10.1016/j.eswa.2013.08.077
Liu H. , Xia F. , Chen Z. , Asabere N. Y. , Ma J. , Huang R. 2015 “Trucom: Exploiting domain-specific trust networks for multi-category item recommendation,” IEEE Systems Journal    DOI : 10.1109/JSYST.2015.2427193
Golbeck J. A. 2005 Computing and applying trust in web-based social networks University of Maryland
Jamali M. , Ester M. “Trustwalker: a random walk model for combining trust-based and item-based recommendation,” in Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2009 397 - 406
Ma H. , King I. , Lyu M. R. “Learning to recommend with social trust ensemble,” in Proc. of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval 2009 203 - 210
Tang J. , Gao H. , Hu X. , Liu H. “Exploiting homophily effect for trust prediction,” in Proc. of the Sixth ACM International Conference on Web Search and Data Mining 2013 53 - 62
Ma H. , Yang H. , Lyu M. R. , King I. “Sorec: social recommendation using probabilistic matrix factorization,” in Proc. of the 17th ACM Conference on Information and Knowledge Management 2008 931 - 940
Menon A. K. , Elkan C. “Link prediction via matrix factorization,” in Lecture Notes in Computer Science 2011 vol. 6912 437 - 452
Jamali M. , Ester M. “A matrix factorization technique with trust propagation for recommendation in social networks,” in Proc. of the Fourth ACM Conference on Recommender Systems 2010 135 - 142
Ma H. , Zhou D. , Liu C. , Lyu M. R. , King I. “Recommender systems with social regularization,” in Proc. of the Fourth ACM International Conference on Web Search and Data Mining 2011 287 - 296
Yang X. , Steck H. , Liu Y. “Circle-based recommendation in online social networks,” in Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2012 1267 - 1275
Tang J. , Gao H. , Liu H. , Sarma A. D. “eTrust: Understanding trust evolution in an online world,” in Proc. of the 18th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining 2012 253 - 261
Yang X. , Steck H. , Guo Y. , Liu Y. “On top-k recommendation using social networks,” in Proc. of the Sixth ACM Conference on Recommender Systems 2012 67 - 74
Mnih A. , Salakhutdinov R. “Probabilistic matrix factorization,” Advances in Neural Information Processing Systems 2007 1257 - 1264
Guo G. , Zhang J. , Yorke-Smith N. “Trustsvd: Collaborative filtering with both the explicit and implicit influence of user trust and of item ratings,” in Proc. of the 29th AAAI Conference on Artificial Intelligence 2015