基于信任的电子商务个性化推荐关键问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网的蓬勃发展,电子商务的虚拟购物环境既为企业提供了新的发展机遇,也给用户提出了如何处理Web商品信息过载问题的挑战,推荐系统作为个性化服务的一种方式,能够向用户推荐其感兴趣的项目,辅助用户作出决策,成为用户网上购物的有力助手。自20世纪90年代首次出现推荐系统以来,对此领域的研究虽然也取得了非常大的进步,但传统的协同过滤推荐技术依然存在着数据稀疏性、冷启动、“托”攻击、黑匣子和伸缩性等多个难以克服的问题,而在Web社会网络迅速发展的形势下,基于信任的电子商务推荐系统由于在传统的协同过滤推荐系统中引入了信任机制,能有效改善或克服以上缺陷,成为目前推荐系统研究最重要的课题之一。
     围绕着如何提高用户对推荐系统的推荐满意度,本文对电子商务环境下基于信任的个性化推荐系统的若干关键问题进行了有益的探索和研究。论文首先系统地综述了目前国内外在个性化推荐领域的理论研究和发展现状,重点分析协同过滤推荐方法的优势和存在的研究热点问题,继而从网络信任的定义和特性出发,对当前多种信任度评估模型的特点进行了深刻分析,在此基础上,作者提出了基于信任的个性化推荐系统的一般模型和形式化表示方法,探讨了新系统的框架结构;接着本文以如何提高用户对推荐系统的推荐满意度为主线,分别对用户多兴趣下基于信任的个性化推荐算法、推荐列表的多样性和推荐系统的推荐攻击问题进行了系统的研究。
     本论文的研究创新主要体现在以下几个方面:
     (1)借鉴传统协同过滤系统的基础模型以及Web社会网络的特点,提出了基于信任的电子商务个性化推荐系统的一般模型,该模型具有很好的包容性,可以扩展出不同的推荐算法。
     (2)在分析了目前概貌级信任模型不适合用户多兴趣情况下项目推荐的基础上,提出了基于主题级信任模型的协同过滤推荐算法,并通过实验验证,新算法能有效解决多兴趣问题。
     (3)提出了基于信任的推荐多样性算法,该算法通过选择主题多样的信任邻居来平衡推荐结果的准确性和多样性。并通过一系列的实验结果表明,该算法能有效地提高推荐的多样性。
     (4)在对信任传递可能引起的恶意攻击形式进行分析的基础上,提出了用数据起源法来追踪恶意用户,进而把恶意用户限制为不信任用户的防御方法。
With the rapid popularization of Internet, virtual shopping environment of e-commerce not only provide new development chance for the enterprises, but also put forward how to handle the challenge of information overload of web products. As a means of personalized service, recommender systems can recommend interesting items for users, assist users to make decision, and become an good assistant for users' shopping online. Since the emergence of the first recommender system in the 1990s, remarkable progress in this field has been achieved, but there still exists some issues hard to overcome in traditional collaborative filtering technology. In the situation of the rapid development of web social networks, because of incorporating trust mechanism into traditional collaborative filtering recommender systems, trust-based recommender systems can improve or overcome these limitations effectively, and become one of the most important research projects.
     This thesis explored and researched some key issues of trust-based personalized recommender systems in e-Commerce. Firstly, it gave an overview of the theoretical research and development on personalized recommendation to date. The advantages of collaborative filtering technology and research challenges were analyzed. Secondly, from the definition and properties of network trust, the characteristic of the trust evaluation models were analyzed and compared. Thirdly, a general model of trust-based personalized recommender system and system framework was presented. Then the author gave the research work on trust-based personalized recommendation algorithm for user's multiple interests, diversity of recommendation list items and recommendation attack of trust-based recommender system.
     The innovational works of this thesis are as following:
     (1) Based on the basic modal of traditional collaborative filtering system and the characteristic of web social network, the author presented a general modal of trust-based e-commerce personalized recommender systems, which is inclusive, and can extend to many different recommendation algorithm. Meanwhile, the system framework of trust-based e-commerce personalized recommender system is discussed.
     (2) Finding that current profile-level trust modal is not suitable to items recommendation for user's multiple-interests, the authors analyzed the reason and present a novel collaborative filtering algorithm based on topic-level trust modal, which can deal with the issue of user's multiple-interests. A series of experiments show that the algorithm achieves highly on the accuracy and robustness under shilling attacks.
     (3) Considering the user's complete spectrum of interests, the limitation of research on recommender system only paying attention to improve the accuracy of recommendation algorithm is the neglect of recommendation diversification. This paper proposes a novel recommendation diversification algorithm for trust based E-commerce personalized recommender systems, which is designed to balance the accuracy and the diversification of the recommendation list. The experiment shows that the algorithm can improve the recommendation diversification.
     (4) Malicious attack modes because of trust propagation was discussed. According to the sparsity of rating matrix of trust neighors, the author presented a defending method by tracing malicious users with data lineage, and limiting the malicious users to distrust users.
引文
[1]Baeza-Yates R,Ribeiro-Neto B等著,王知津,贾福新等译,现代信息检索[M].北京:机械工业出版社,2005.
    [2]常俊胜,王怀民,尹刚.DyTrust_一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307.
    [3]曹渝昆.基于神经网络和模糊逻辑的智能推荐系统研究[D].重庆大学博士学位论文,2006.
    [4]邓爱林.电子商务推荐系统关键技术研究[D].复旦大学博士学位论文,2003.
    [5]邓爱林,朱扬勇,施伯乐.基于项目评分预测的协同过滤推荐算法[J].软件学报,2003,(9):1-8.
    [6]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583.
    [7]黄辰林.动态信任关系建模和管理技术研究[D].国防科学技术大学,博士学位论文,2005.
    [8]纪翔.社会网络模式下的Web2.0电子商务[J].图书情报知识.2006(7):94-97.
    [9]金兰芳,朱艳琴.基于信誉的peer-to-peer推荐信任模型[J].计算机工程与应用,2007,43(3):122-124.
    [10]李聪,梁昌勇,马丽.基于领域最近邻的协同过滤推荐算法[J].计算机研究与发展,2008,45(9):1532-1538.
    [11]李海华,杜小勇,田萱.一种能力属性增强的Web服务信任评估模型[J].计算机学报,2008,31(8):1471-1477.
    [12]刘平峰.基于知识网格的电子商务智能推荐理论方法研究[D].武汉理工大学博士学位论文,2006.
    [13]刘玉龙,曹元大,李剑.一种新型推荐信任模型[J].计算机工程与应用.2004,29:47-49.
    [14]路海明,卢增祥,李衍达.基于多Agent混合智能实现个性化信息推荐[J].高技术通讯,2001,(4):28-31.
    [15]罗家德.网络网际关系行销[M].社会科学文献出版社,2001.
    [16]孟魁.虚拟社区环境下信任机制的研究[D].复旦大学博士学位论文,2005.
    [17]苏锦钿,郭荷清,高英.基于信任网的推荐机制[J].华南理工大学学报(自然科学版),2008,36(4):98-103.
    [18]孙小华.协同过滤系统的稀疏性和冷启动问题研究[D].浙江大学博士学位论文.2005.
    [19]唐文.基于模糊集合理论的信任管理研究[D].北京大学博士学位论文,2003.
    [20]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
    [21]唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
    [22]王惠芳,朱智强,孙磊.分布式网络系统中的信任研究[J].计算机工程,2008,(1):10-14.
    [23]汪进,杨新,刘晓松.一种新型的网格行为信任模型[J].计算机工程与应用,2003,(21):62-64.
    [24]肖知兴.名声和骗子的速度竞赛[J].IT经理世界,2002(11).
    [25]徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,(11):2057-2064.
    [26]杨庆.消费者对网络商店的信任及信任传递的研究[D].复旦大学博士学位论文,2005.
    [27]叶建亮.经济学视野里的信用[J].中国社会科学评论(经济学卷),2003(2):347-368.
    [28]余力.电子商务个性化推荐若干问题研究[D].北京航空航天大学博士学位论文,2004.
    [29]余力,刘鲁.电子商务个性化推荐研究[J].计算机集成制造系统-CIMS,2004,(10):1306-1313.
    [30]余力,刘鲁,李雪峰.用户多兴趣下的个性化推荐算法研究[J].计算机集成制造系统,2004a,10(12):1610-1615.
    [31]余力,刘鲁,罗掌华,等.我国电子商务推荐策略的比较分析[J].系统工程理论与实践,2004b,(8):78-63.
    [32]张丙奇.基于领域知识的个性化推荐算法研究[J].计算机工程,2005,(11):7-9.
    [33]张荣沂.专家系统中不确定性知识的表示和处理[J].自动化技术与应用,2002,21(5):35-39.
    [34]赵亮,胡乃静.个性化推荐算法设计[J].计算机研究与发展,2002,39(8):986-991.
    [35]张维迎.信息、信任与法律[M].生活·读书·新知三联书店,2003.
    [36]Abdul-Rahman A,Hailes S.A distributed trust model[C].In Proceedings of the 1997 Workshop on New Security Paradigms,1997.
    [37]Abdul-Rahman A,Hailes S.Supporting Trust in Virtual Communities[C].In Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000.
    [38] Aberer K, Despptovic Z. Managing trust in a peer-2-peer information system[C]. In Proceedings of the Tenth International Conference on Information and Knowledge Management, ACM Press, 2001,310-317.
    [39] Adomavicius G., Tuzhilin A. Toward the next generation of recommender systems: a survey of the state of the art and possible extensions[J]. Knowledge and Data Engineering, IEEE Transactions, 2005,17(6): 734-749.
    [40] Ahn H J. A new similarity measure for collaborative filtering to alleviate the new user cold-starting problem. Information Sciences, 2008,178(1): 37-51.
    [41] Andersen R, Borgs C, Chayes J, et al. Trust-Based Recommendation Systems-an Axiomatic Approach[C]. In Proceedings of the 17th international conference on World Wide Web, 2008,199-208.
    [42] Anderson J C, Naru J A. A Model of Distributor Firm and Manufacturer Working Relationships[J]. Journal of Marketing, 1990, 54(1): 42-58.
    [43] Artz D, Gil Y. A survey of trust in computer Science and the semantic web. Journal of Web Semantics, 2007,5(2):58-71. .
    [44] Aimeur E, Brassard G, Fernandez JM, et al. A lambic: a privacy-preserving recommender system for electronic commerce[J]. International Journal of Information Security, 2008,7(5): 307-334.
    [45] Balabanovic M, Shoham Y. FAB: Content-based collaborative recommendation[J]. Communications of the ACM, 1997,40(3): 66-72.
    [46] Berscheid E. Interpersonal attraction. The Handbook of Social Psgchology, volume II[M]. McGraw-Hill, New York. NY. USA. 4th edition. 1998.
    [47] Beth T, Borcherding M, Klein B. Valuation of trust in open networks[C]. In Proceedings of the 1994 European Smposium on Research in Computer Security, 1994,3-18.
    [48] Billsus D, Pazzani M. Learning Collaborative Information Filters[C]. In Proceedings of the International Conference on Machine Learning, Morgan Kaufmann Publishers, 1998.
    [49] Boyce B. Beyond topicality: A two stage relevance and the retrieval process[J]. Infomation Processing and Management, 1982,18(3): 105-109.
    [50] Breese J S, Heckerman D, Kadie C. Empirical Analysis of Predictive Algorithms for Collaborative Filtering[C]. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence(UAI-98),1998,43-52.
    [51] Burke R. Semantic ratings and heuristic similarity for collaborative filtering[C]. In Proceedings of the Seventeenth National Conference on Artificial Intelligence, Austin, Texas, 2000.
    [52] Burke R. Hybrid recommender systems: Survey and experiments[J]. User Modeling and User-Adapted Interaction, 2002,12(4): 331 -370.
    [53] Burke R, Mobasher B, Bhaumik R. Limited knowledge shilling attacks in collaborative filtering systems[C]. In Proceedings of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization, 2005a.
    [54] Burke R, Mobasher B, Williams C, et al. Segment-based injection attacks against collaborative recommender systems[C]. In Proceedings of the International Conference of Data Mining, 2005b, 577-580.
    [55] Burke R, Mobasher B, Williams C, et al. Classification features for attack detection in collaborative recommender systems[C]. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, USA: ACM Press, 2006. 542-547.
    [56] Burke R, Mobasher B, Zabicki R, et al. Identifying attack models for secure recommendation[C]. In Proceedings of Beyond Personalisation Workshop at the International Conferece on Intelligent User Interfaces, 2005, 347-361.
    [57] Carbone M, Nielsen M, Sassone V. A Formal Model for Trust in Dynamic Networks[C]. In Proc. of International Conference on Software Engineering and Formal Methods (SEFM'03), Brisbane, September 2003.
    [58] Chen R, Yeager W. Poblano: A distributed trust model for peer-to-peer networks[R]. Technical report, Sun Microsystems, Santa Clara, CA, USA, . February 2003.
    [59] Chirita P A, Nejdl W, Zamfir C. Preventing shilling attacks in online recommender systems[C]. In Proceedings of ACM International Workshop on web Information and Data Management, New York, USA: ACM Press, 2005, 67-74.
    [60] Claypool M, Gokhale A, Miranda T. Combining content-based and collaborative filters in an online newspaper[C]. In Proceedings of the SIGIR-99 Workshop on Recommender Systems: Algorithms and Evaluation, 1999.
    [61] Cleaverdon C, Kean M. Factors Determining the Performance of Indexing System[M]. Aslib Cranfield Research Project, Cranfield, England, 1968.
    [62] Cook K S. Trust in Society[M]. New York, Russell Sage Foundation, 2001.
    [63] Corritore C L, Kracher B, Wiedenbeck S. An Overview of Trust[OL]. http://cobacourses.creighton.edu/trust/articles/trustpaper2-9-01_final.rtf, 2001.
    [64] Cosley D, Lawrence S, Pennock D. An open framework for practical testing of recommender systems using ResearchIndex[C]. In Proceedings of the 28th international Conference on Very Large Databases, 2002, 35-46.
    [65] Cotter P, Smyth B. PTV: Intelligent personalized TV guides[C]. In Proceedings of Twelfth Conference on Innovative Applications of Artificial Intelligence, 2000, 957-964.
    [66] Cvetkovich G, Lofstedt R. Social Trust and the Management of Risk[M], London, Earthscan,1999.
    [67] Deutsch M. Cooperation and Trust: Some Theoretical Notes[C]. In Proceedings of Nebraska Symposium on Motivation. Nebraska University Press, 1962.
    [68] Deshpande M, Karypis G.Item-Based Top-N Recommendation Algorithms[J]. ACM Trans. Information Systems, 2004,22(1): 143-177.
    [69] Dahlen B J, Konstan J A, Herlocker J L, et al. Jump-starting Movielens: User Benefits of Starting a Collaborative Filtering System with "Dead Data"[R]. University of Minnesota Technical Report, 1998.
    
    [70] Dumbill E. Finding friends with XML and RDF. IBM's XML Watch, 2002.
    [71] Gambetta D. Can We Trust Trust?[M]. In Gambetta D, editor, Trust. Making and Breaking Cooperative Relations, Basil Blackwell. Oxford, 1990,213-238.
    [72] Gerck E. Toward Real-World Models of Trust: Reliance on Received Information. http://www.safevote.com/papers/trustdef.htm, 1998.
    [73] Golbeck J. Computing and Applying Trust in Web-Based Social Networks[D]. Ph.D. Dissertation, University of Maryland, College Park, 2005.
    [74] Golbeck J. Generating Predictive Movie Recommendations from Trust in Social Networks[C]. In Proceedings of the International Conference on Trust Management, 2006.
    [75] Golbeck J, Parsia B, Hendler J. Trust networks on the semantic web[C]. In Proceedings of Cooperative Intelligent Agents, Helsinki, Finland, 2003.
    [76] Goldberg D, Nichols D, Oki B M, et al. Using Collaborative Filtering to Weave an Information Tapestry[J]. Communications of the ACM ,1992, 35(12), 61-70.
    [77] Good N, Schafer B, Konstan J, et al. Combining collaborative filtering with personal agents for better recommendations[C]. In Proceedings of the 16th Conference of the American Association of Artificial Intelligence, Orlando, FL: AAAI Press, 1999,439-446.
    [78] Guernsey L. Making Intelligence a Bit Less Artificial[J]. New York Times, 5 January 2003.
    [79] Guha R. Open rating systems. Technical report, Stanford Knowledge Systems Laboratory, Stanford, CA, USA, 2003.
    [80] Guha R, Kumar R, Raghavan P, et al. Propagation of Trust and Distrust. In Proceedings of the 13th Annual International World Wide Web Conference, New York, 2003.
    [81] Gyongyi Z, Garcia-Molina H, Pedersen J. Web spam with TrustRank[C]. In Proceedings of the Thirtieth International Conference on Very large data bases, 2004.
    [82] Hardin R. Trust & Trustworthiness [M]. New York: Russell Sage Foundation, 2002.
    [83] Heckerman D. A Tutorial on Learning with Bayesian Networks. MSR-TR-95-06, Microsoft Research report, 1995.
    [84] Herlocker J L, Konstan J, Borchers A, et al. An Algorithmic Framework For Performing Collaborative Filtering[C]. In Proceedings of the 22th annual International ACM SIGIR Conference on Research and Development in Information Retrieval, New York, USA: ACM Press, 1999,230-237.
    [85] Herlocker J L, Konstan J A, Riedl J. Explaining Collaborative Filtering Recommendations[C]. In Proceedings of CSCW 2000,2000,241-250.
    [86] Herlocker J L, Konstan J A. Content-Independent Task-Focused Recommendation[J]. IEEE Internet Computing, 2001,5(6):40-47.
    [87] Herlocker J, Konstan J, Terveen L, et al. Evaluating Collaborative Filtering Recommender Systems[J]. ACM Transactions on Information Systems, 2004, 22(1):5-53.
    [88] Hijikata Y, Shimizu T, Nishida S. Discovery-oriented collaborative filtering for improving user satisfaction[C]. In Proceedings of the 13th international conference on Intelligent user interfaces, 2009, 67-76 .
    [89] Hill W, Stead L, Rosenstein M, et al. Recommending and Evaluating Choices in a Virtual Community of Use[C]. In Proceedings of ACM CHI'95 Conference on human factors in computing systems, 1995.
    [90] Holland P, Leinhardt S. Some Evidence on the Transitivity of Positive Interpersonal Sentiment[J]. American Journal of Sociology, 1972.
    [91] Hosmer L T. Trust: the Connection Link between Organizational Theory and Philosophical Ethics[J]. Academy of Management Review, 1995,20(2):379-403,
    [92] Huang Chen-Lin, Hu Hua-Ping, Wang Zhi-Ying. Modeling Time-related Trust[C]. In Proceedings of the 3rd International Conference on Grid and Cooperative Computing,Wuhan, China, 2004,382-389.
    [93] Huang Z, Chen H, Zeng D. Applying Associative Retrieval Techniques to Alleviate the Sparsity Problem in Collaborative Filtering[J]. ACM Trans. Information Systems, 2004a, 22(1):116-142.
    [94] Huang Z, Chung W, Chen H. A graph model for E-commerce recommender systems. Journal of the American Society for Information Science and Technology, 2004b, 55(3): 259-274.
    [95] Huston T, Levinger G.Interpersonal attraction and relationships. Annual Review of Psychology[J], 1978, 29:115-156.
    [96] Jφsang A. The Right Type of Trust for Distributed Systems[C]. In Proceedings of New Security Paradigms 96 Workshop, 1996.
    [97] Jφsang A, Ismail R. The beta reputation system[C]. In Proceedings of the 15th Bled Electronic Commerce Conference, 2002.
    [98] Jφsang A, Knapskog S J. A Metric for Trusted Systems[C]. In Proceedings of the 21th National Information Systems Security Conference. NSA, 1998.
    [99] Jφsang A, Gray E, Kinateder M. Analysing topologies of transitive trust[C]. In Proceedings of the Workshop of Formal Aspects of Security and Trust, Pisa, Italy, 2003.
    [100]Jφsang A, Ismail R, Boyd C. A Survey of Trust and Reputation Systems For Online Service Provision[J]. Decision Support Systems, 2007,43(2):618-644.
    [101]Kamvar S, Schlosser M, Garcia-Molina H. The EigenTrust Algorithm for Reputation Management in P2P Networks[C]. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, 2003.
    [102]Kim W, Kerschberg L, Scime A. Learning for Automatic Personalization in a Semantic Based meta-search agent[J]. Electronic Commerce Research and Applications, 2002,1(2): 150-173.
    [103]Konstan J A, Miller B N, Maltz D, et al. GroupLens: Applying Collaborative Filtering to Usenet News[J]. Communications of the ACM, 1997,40(3):77-87.
    [104]Krishnan V, Raj R. Web Spam Detection with Anti-trust Rank[C]. In Proceedings of the Workshop on Adversarial Information Retrieval on the Web, 2006.
    [105]Krulwich B. Lifestyle Finder: Intelligent User Profiling Using Large-Scale Demographic Data[J]. Artificial Intelligence Magazine, 1997,18 (2):37-45.
    [106]Labalme F, Burton K. Enhancing the Internet with Reputations: an Openprivacy White Paper, 2001.
    [107]Lam C. SNACK: Incorporating Social Network Information in Automated Collaborative Filtering[C]. ACM Conference on Electronic Commerce 2004, 254-255.
    [108] Lam S K, Riedl J. Shilling recommender systems for fun and profit[C]. In Proceeding of the 13th international conference on World Wide Web, New York, USA: ACM Press, 2004, 393-402.
    [109]Lan M, Yu S, Bacher R, et al. A Co-Recommendation Algorithm for Web Searching[C]. In Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, 2002.
    [110]Lang K. Newsweeder: Learning to Filter News[C]. In Proceedings of the 12th International Conference on Machine Learning, Lake Tahoe, CA, 1995, 331-339.
    [111]Lawrence R D, Almasi G S, Kotlyar V, et al. Personalization of supermarket product recommendations[R], IBM Research Report, 2000.
    [112]Levien R. Advogato Trust Metric[OL]. http://www.advogato.org/trust-metric.html, 2000.
    [113]Levien R. Advogato Trust Metric[D]. Ph.D. Dissertation, UC Berkeley, USA, 2003.
    [114]Levien R, Aiken A. Attack-resistant Trust Metrics for Public Key Certification[C]. In Proceedings of the 7th USENIX Security Smposium, San Antonio, TX, USA, 1998.
    [115]Levien R, Aiken A. An Attack-resistant, Scalable Name Service[C]. Draft submission to the Fourth International Conference on Financial Cryptography, 2000.
    [116] Li Q, Kim B M. Constructing user profiles for collaborative recommender system[C]. In Proceeding of sixth Asia Pacific Web Conference, Springer Berlin, 2004,100-110.
    [117] Liu H, Maes P. InterestMap: Harvesting Social Network Profiles for Recommendations[C]. In Proceedings of the Workshop: Beyond Personalization IUI'OS, San Diego, California, USA, 2005.
    [118]Maltz D, Ehrlich K. Pointing the Way: Active Collaborative Filtering[C]. In Proceedings of CHI-95, Denver,CO, 1995,202-209.
    [119]Marsh S. Formalising Trust As a Computational Concept[D]. PhD Thesis, Scotland, University of Stirling, 1994a.
    [120] Marsh S. Optimism and Pessimism in Trust[C]. In Proceedings of the Ibero-American Conference on Artificial Intelligence, Caracas, Venezuela, McGraw-Hill, 1994b.
    [121]Massa P, Bhattacharjee B. Using trust in recommender systems: an experimental analysis[C]. In Proceedings of Second International Conference on Trust Management, Springer Berlin, 2004,221-235.
    [122]Maurer U. Modelling a public key infrastructure[C]. In Proceedings of the 1996 European Smposium on Research in Computer Security, volume 1146 of LNCS, Springer-Verlag, 1996:325-350.
    [123] Mayer F L. A brief comparison of two different environmental guidelines for determining 'levels of trust' (computer security) [C]. In Proceedings of the Sixth Annual Computer Security Applications Conference, 1990.
    [124]McKnight D H, Chervany N L. The Meanings of Trust[R]. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center, URL: http://www.misrc.umn.edu/Workingpape-rs, 1996.
    [125]McNee S M, Riedl J, Konstan J. A. Being Accurate Is Not Enough: How Accuracy Metrics Have Hurt Recommender Systems[C]. In Proceedings of Conference on Human Factors in Computing Systems, 2006, 1097-1101. Milgram S. The Small World Problem/Psychology Today 2,1967,60-67.
    [126]Mobasher B, Burke R, Bhaumik R, et al. Effective attack models for shilling item-based collaborative filtering systems[C]. In Proceedings of the WebKDD Workshop, 2005.
    [127]Mobasher B, Burke R, Williams C, et al. Analysis and Detection of Segment-focused Attacks Against Collaborative Recommendation[C]. In Proceedings of the 2006 WebKDD Workshop, 2006.
    [128]Mobasher B, Burke R, Bhaumik R, et al. Attacks and Remedies in Collaborative Recommendation[J]. IEEE Intelligent Systems, 2007a, 22(3):56-63.
    [129]Mobasher B, Burke R, Bhaumik R, et al. Toward Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness[J]. ACM Transactions on Internet Technology, 2007b, 7(4).
    [130]MoeasHea B, BuaKe R, Sandvig J. Model-based Collaborative Filtering as a Defense Against Profile Injection Attacks[C]. In Proceedings of the 21st National Conference on Artificial Intelligence, 2006.
    [131]Mooney R J, Roy L. Content-based Book Recommending Using Learning for Text Categorization. In Proceedings of the fifth ACM conference on Digital libraries, 2000,195-204.
    
    [132]Mui L. Computational Models of Trust and Reputation[D]. PhD thesis, MIT, 2002.
    [133]Nichols D. Implicit Rating and Filtering[C]. In Proceedings of 5th DELOS Workshop, 1998.
    [134]Oard D W, Marchionini G.A Conceptual Framework for Text Filtering[R]. Technical Report CARTR-830, Human Computer Interaction Laboratory, University of Maryland at College Park, 1996.
    [135]O'Donovan J, Smyth B. Trust in Recommender Systems [C]. In Proceedings of the 10th international Conference on Intelligent User Interfaces. California, USA: 2005,167-174.
    [136]O'Donovan J, Smyth B. Mining Trust Values From Recommendation Errors[J], International Journal on Artificial Intelligence Tools, 2006, 6(15); 945-962.
    [137]O'Mahony P, Hurley N, Kushmerick N, et al. Collaborative Recommendation: A Robustness Analysis[J]. ACM Transactions on Internet Technology, 2003, 4(4):344-377.
    
    [138]Page L, Brin S, Motwani R, et al. The Pagerank Citation Ranking: Bringing Order to the Web[R]. Technical report, Stanford Digital Library Technologies Project, 1998.
    
    [139]Papagelis M, Plexousakis D, Kutsuras T. Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences[C]. In Proceedings of the 3rd International Conference on Trust Management. Springer-Verlag, Rocquencourt, France, 2005.
    
    [140]Pazzani M J. A Framework for Collaborative, Content-Based and Demographic Filtering[J]. Artificial Intelligence Review, 1999,13 (5/6): 393-408.
    
    [141]Radlinsk F, Dumais S. Improving personalized web search using result diversification[C]. In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, 2006.
    
    [142]Reiter M, Stubblebine S. Path Independence for Authentication in Large-Scale Systems[C]. In Proceedings of ACM Conference on Computer and Communications Security, 1996, 57-66.
    [143]Reiter M, Stubblebine S. Toward Acceptable Metrics of Authentication[C]. In Proceedings of the IEEE Symposium on Security and Privacy, 1997,10-20.
    [144]Resnick P, Varian HR. Recommender Systems[J]. Communications of the ACM, 1997,40(3):56-58.
    [145]Resnick P, Iacovou N, Sushak M, et al. GroupLens: An Open Architecture for Collaborative Filtering of Netnews[C]. In Proceedings of ACM Conference on Computer Supported Cooperative Work, New York, USA: ACM Press, 1994, 175-186.
    [146]Resnick P, Kuwahara K, Zeckhauser R, et al. Reputation Systems[J], Communications of the ACM, 2000,43(12):45-58.
    [147] Richardson M, Agrawal R, Domingos P. Trust management for the semantic web[C]. In Proceedings of the Second International Semantic Web Conference, Sanibel Island, FL, USA, 2003.
    [148]Rosenstein M, Lochbaum C. Recommending from Content: Preliminary Results from an E-Commerce Experiment[C]. In Proceedings of CHI'00: Conference on Human Factors in Computing, The Hague, Netherlands, 2000.
    [149] Rotter J. A New Scale for the Measurement of Interpersonal Trust[J]. Journal of Personality, 1967,35.(4): 651-665.
    [150]Sabel C F. Studied Trust: Building New Forms of Cooperation in a Volatile Economy[J]. American Psychologist, 1993, (35):1-7.
    [151]Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems[C]. In Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy, 2002.
    [152]Sarwar B M, Konstan J A, Borchers A, et al. Using Filtering Agents to Improve Prediction Quality in the Grouplens Research Collaborative Filtering System [C]. In Proceedings of the ACM 1998 Conference on Computer Supported Cooperative Work, 1998.
    [153]Sarwar B, Karypis G., Konstan J, et al. Analysis of Recommendation Algorithms for E-Commerce [C]. In Proceedings of the2nd ACM conference on Electronic commerce, 2000a.
    [154]Sarwar B, Karypis G, Konstan J, et al. Application of Dimensionality Reduction In Recommender Systems-A Case Study[C]. In Proceedings of ACM WebKDD Workshop, 2000b.
    [155]Sarwar B, Karypis G, Konstan J, et al. Item-based collaborative filtering recommendation algorithms [C]. In Proceeding of the 10th International World Wide Web Conference, New York, USA: ACM Press, 2001,285- 295.
    [156]Schafer JB, Konstan J, Riedl J. Recommender Systems in E-Commerce[C]. In Proceedings of ACM E-Commerce, 1999.
    [157]Schafer JB, Konstan JA, Riedl J. E-Commerce Recommendation Applications. Data Mining and Knowledge Discovery, 2001.
    [158]Schein A, Popescnl A, Ungar L, et al. Methods and Metrics for Cold-Start Recommendations[C]. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2002.
    [159] Schmitt S, Bergmann. Applying case-based reasoning technology for product selection and customization in electronic commerce environments[C]. In Proceedings of the 12th Bled Electronic Commerce Conference. Bled, Slovenia, 1999.
    [160]Shardanand U, Maes P. Social Information Filtering: Algorithms for Automating "Word of Mouth"[C]. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, New York, 1995,210-217.
    [161]Sinha R, Swearingen K. Comparing recommendations made by online systems and friends[C]. In Proceedings of the DELOS-NSF Workshop on Personalization and Recommender Systems in Digital Libraries, Dublin, Ireland, June, 2001.
    [162]Slovic P. Trust, Emotion, Sex, Politics, and Science: Surveying the Risk-assessment Battlefield[J]. Risk Analysis, 1999,19(4).
    [163] Smyth B and McClave P. Similarity vs. diversity[C]. In Proceedings of the 4th International Conference on case-based Reasoning,Springer, 2001, 347-361.
    [164] Song S, Hwang K, Zhou R F. Trusted P2P Transactions with Fuzzy Reputation Aggregation[J]. IEEE Internet Computing, 2005, 18-28.
    [165]Srivatsa M, Xiong L, Liu L. Trust Guard: Countering vulnerabilities in reputation management for decentralized overlay networks[C]. In Proceedings of the 14th World Wide Web Conference(WWW 2005), Chiba, Japan, 2005,422-431.
    [166]Sztompka P. Trust: A Sociological Theory[M]. Cambridge University Press, 1999.
    [167]Tintarev N, Masthoff J. A Survey of Explanations in Recommender Systems[C]. In Proceedings of IEEE 23rd International Conference on Data Engineering Workshop, 2007.
    [168]Trcek D. Towards trust management standardization[S]. Computer Standards and Interfaces, 543-548,2004.
    [169] Victor P, Comelis C, Cock M D, et al. Gradual trust and distrust in recommender systems[J]. Fuzzy Sets and Systems, 2009,160(10): 1367-1382.
    [170] Wang Y, Vassileva J. Bayesian network trust model in peer-to-peer networks[C]. In Proceedings of the 2nd Int'l Workshop on Agents and Peer-to-Peer Computing, Berlin: Springer-Verlag, 2004,23-34.
    [171]Weng J, Miao C, Goh A. Improving Collaborative Filtering with Trust-based Metrics[C]. In Proceedings of the 2006 ACM symposium on Applied computing, 2006.
    [172]Woodrufifi A, Stonebraker M. Supporting Fine-grained Data Lineage in a Database Visualization Environment[C]. In Proceedings of the 13th Conference on Data Engnieering(IEEE ICDE),1997,91-102.
    [173]Wrightsman LS. Interpersonal trust and attitudes toward human nature. Measures of Personality and Psychological Attitudes. San diego: Academic Press,1991,373-412.
    [174] Wu Z, Weaves A C. Application of fuzzy logic in federated trust management for pervasive computing[C]. In Proceedings of the 30th Annual International Computer Software and Applications Conference, Chicago, Illinois, USA, 2006, 215-222.
    [175] Wu B, Goel V, Davison BD. Propagating trust and distrust to demote web spam[C]. In Proceedings of Workshop on Models of Trust for the Web (MTW), 2006a.
    [176] Wu B, Goel V, Davison BD. Topical TrustRank: using topicality to combat web spam[C]. In Proceedings of the 15th international conference on World Wide Web, 2006b.
    [177]Xiong L, Liu L. PeerTrust:Supporting reputation-based trust in peer-to-peer communities[J]. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management, 2004,16 (7):843-857.
    [178]Yoshii K, Goto M, Komatani K, et al. An efficient hybrid music recommender system using an incrementally trainable probabilistic Generative Model[C]. IEEE Transactions on Audio Speech and Language Processing, 2008.
    [179] Zan Huang, Wingyan Chung, Thian-Huat Ong, et al. A Graph-based Recommender System for Digital Library[C]. In Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries, 2002.
    [180] Zhang S, Ford J, Makedon F. Low-dimensional linear model under Analysis of a low-dimensional recommendation attacks[C]. In Proceedings of the 29th ACM SIGIR, New York, USA: ACM Press, 2006a, 517-524.
    [181]Zhang S, Chakrabarti A, Ford J, et al. Attack detection in time series for recommender systems[C]. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, USA: ACM Press, 2006b, 809-914.
    [182]Ziegler CN, Golbeck J. Investigating interactions of trust and interest similarity[J]. Decision Support Systems, 2007,43(2):460-475.
    [183]Ziegler CN, Lauren G.Spreading Activation Models for Trust Propagation[C]. In Proceedings of IEEE International Conference on e-Technology, e-Commerce, and e-Service, 2004a.
    [184]Ziegler CN, Lausen G.Analyzing Correlation Between Trust and User Similarity in Online Communities[C]. In Proceedings of Second International Conference on Trust Management, 2004b.
    [185]Ziegler CN, Lausen G.Propagation Models for Trust and Distrust in Social Networks[C]. Information Systems Frontiers, 2005,7(4-5):337-358.
    [186]Ziegler CN, Lausen G, Schmidt-Thieme L. Taxonomy-driven computation of product recommendations[C]. In Proceedings of the thirteenth ACM international conference on Information and knowledge management, ACM Press, Washington, D.C., USA, 2004,406-415.
    [187]Ziegler CN, McNee SM, Konstan JA, et al. Improving recommendation lists through topic diversification[C]. In Proceedings of the 14th international conference on World Wide Web, 2005,22-32.
    
    [188] Zhong Y, Lu Y, Bhargava B. Dynamic Trust Production Based on Interaction . Sequence[R]. Technical Report, CSD-TR 03-006, Dept, of Computer Sciences, Purdue University, 2003.