455
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Trust Prediction in Online Communities Employing Neurofuzzy Approach

&

REFERENCES

  • Abbasimehr, H., M. Setak, and J. Soroor. 2013. A framework for identification of high-value customers by including social network based variables for churn prediction using neurofuzzy techniques. International Journal of Production Research 51:1279–94. doi:10.1080/00207543.2012.707342.
  • Aggarwal, C. C. 2011. Social network data analytics. New York, NY: Springer.
  • Bishr, M., Y.-G. Yang, and G. Lee. 2000. Self-tuning pid control using an adaptive network-based fuzzy inference system. Intelligent Automation & Soft Computing 6:271–80. doi:10.1080/10798587.2000.10642795.
  • Bonacich, P. 2007. Some unique properties of eigenvector centrality. Social Networks 29:555–64. doi:10.1016/j.socnet.2007.04.002.
  • Clauset, A., M. E. J. Newman, and C. Moore. 2004. Finding community structure in very large networks. Physical Review E 70:066111. doi:10.1103/PhysRevE.70.066111.
  • Fiedler, M. 1973. Algebraic connectivity of graphs. Czechoslovak Mathematical Journal 23:298–305.
  • Ghorbani, A., F. Taghiyareh, and C. Lucas. 2009. The application of the locally linear model tree on customer churn prediction. Paper presented at International Conference of Soft Computing and Patter Recognition, December 4–7, 2009, Malacca, Malaysia.
  • Girvan, M., and M. E. Newman. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Sciences 99:7821–26. doi:10.1073/pnas.122653799.
  • Golbeck, J., and J. Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology 6:497–529. doi:10.1145/1183463.
  • Han, J., M. Kamber, and J. Pei. 2011. Data mining: Concepts and techniques. San Francisco, CA: Elsevier Science.
  • Hansen, D. L., B. Schneiderman, and M. A. Smith. 2010. Analyzing social media networks with NodeXL. San Francisco, CA: Elsevier, Morgan Kaufmann.
  • Jang, J.-S. R. 1993. ANFIS: Adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man, and Cybernetics 23:665–85. doi:10.1109/21.256541.
  • Jang, J. S. R., C. T. Sun, and E. Mizutani. 1997. Neuro-fuzzy and soft computing: A computational approach to learning and machine intelligence. Upper Saddle River, NJ: Prentice Hall.
  • Jelassi, T., and A. Enders. 2008. Strategies for e-business: Creating value through electronic and mobile commerce: Concepts and cases. Harlow, England: FT Prentice Hall.
  • Kamvar, S. D., M. T. Schlosser, and H. Garcia-Molina. 2002. The eigentrust algorithm for reputation management in p2p networks. Stanford, CA: Stanford InfoLab.
  • Kernighan, B. W., and S. Lin. 1970. An efficient heuristic procedure for partitioning graphs. Bell System Technical Journal 49:291–307. doi:10.1002/bltj.1970.49.issue-2.
  • Kim, Y. A., and R. Phalak. 2012. A trust prediction framework in rating-based experience sharing social networks without a web of trust. Information Sciences 191:128–45. doi:10.1016/j.ins.2011.12.021.
  • Liu, H., E.-P. Lim, H. W. Lauw, M.-T. Le, A. Sun, J. Srivastava, and Y. A. Kim. 2008. Predicting trusts among users of online communities: An epinions case study. In Proceedings of the 9th ACM conference on Electronic commerce. Chicago, IL: ACM.
  • Ma, N., E.-P. Lim, V.-A. Nguyen, A. Sun, and H. Liu. 2009. Trust relationship prediction using online product review data. In Proceedings of the 1st ACM international workshop on complex networks meet information & knowledge management. Hong Kong, China: ACM.
  • Mamdani, E. H., and S. Assilian. 1975. An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies 7:1–13. doi:10.1016/S0020-7373(75)80002-2.
  • Massa, P., and P. Avesani. 2005. Controversial users demand local trust metrics: An experimental study on epinions.com community. In Proceedings of the 20th national conference on artificial intelligence, vol.1. Pittsburgh, PA: AAAI Press.
  • Massa, P., and P. Avesani. 2006. Trust-aware bootstrapping of recommender systems. Paper presented at ECAI 2006 Workshop on Recommender Systems August 28–29, Riva del Garda, Italy.
  • Massa, P., and P. Avesani. 2007. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers, International Journal on Semantic Web & Information Systems 3:39–64 doi:10.4018/jswis.2007010103.
  • Matsuo, Y., and H. Yamamoto. 2009. Community gravity: Measuring bidirectional effects by trust and rating on online social networks. In Proceedings of the 18th international conference on world wide web. Madrid, Spain: ACM.
  • Mayer, R. C., J. H. Davis, and F. D. Schoorman. 1995. An integrative model of organizational trust. The Academy of Management Review 20:709–34.
  • Newman, M. E. J. 2004a. Detecting community structure in networks. The European Physical Journal B - Condensed Matter and Complex Systems 38:321–30. doi:10.1140/epjb/e2004-00124-y.
  • Newman, M. E. J. 2004b. Fast algorithm for detecting community structure in networks. Physical Review E 69, 066133.
  • Nguyen, V.-A., E.-P. Lim, J. Jiang, and A. Sun. 2009. To trust or not to trust? Predicting online trusts using trust antecedent framework. In Proceedings of the 2009 ninth IEEE international conference on data mining. Los Alamitos, CA: IEEE Computer Society.
  • O’Reilly, T. 2009. What is web 2.0. Sebastopol, CA: O’Reilly Media.
  • Page, L., S. Brin, R. Motwani, and T. Winograd. 1999. The pagerank citation ranking: Bringing order to the web. Stanford, CA: Stanford InfoLab.
  • Ruhnau, B. 2000. Eigenvector-centrality—A node-centrality? Social Networks 22:357–65. doi:10.1016/S0378-8733(00)00031-9.
  • Sharma, S., and P. Singh. 2012. A novel soft computing-based retrieval system for medical applications. Applied Artificial Intelligence 26:645–61. doi:10.1080/08839514.2012.701423.
  • Sugeno, M. 1985. Industrial applications of fuzzy control. New York, NY: Elsevier Science Inc.
  • Tan, P.-N., M. Steinbach, and V. Kumar. 2005. Introduction to data mining. San Francisco, CA: Pearson Education, Inc.
  • Toosi, A. N., and M. Kahani. 2007. A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection. Paper presented at IEEE International Conference on Networking, Sensing and Control, 2007, April 15–17, London, UK.
  • Witten, I. H., and E. Frank. 2005. Data mining: Practical machine learning tools and techniques. San Francisco, CA: Morgan Kaufmann.
  • Xu, G., Y. Zhang, and L. Li. 2010. Web mining and social networking: Techniques and applications. New York, NY: Springer-Verlag New York, Inc.
  • Zolfaghar, K., and A. Aghaie. 2012. A syntactical approach for interpersonal trust prediction in social web applications: Combining contextual and structural data. Knowledge-Based Systems 26:93–102. doi:10.1016/j.knosys.2010.10.007.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.