Advertisement

Discovering Frequent Patterns to Bootstrap Trust

  • Murat Sensoy
  • Burcu Yilmaz
  • Timothy J. Norman
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7607)

Abstract

When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same a priori trust for all newcomers. However, assuming the same a priori trust for all agents may lead to other problems like whitewashing. In this paper, we leverage graph mining and knowledge representation to estimate a priori trust for agents. For this purpose, our approach first discovers significant patterns that may be used to characterise trustworthy and untrustworthy agents. Then, these patterns are used as features to train a regression model to estimate trustworthiness. Lastly, a priori trust for newcomers are estimated using the discovered features based on the trained model. Through extensive simulations, we have showed that the proposed approach significantly outperforms existing approaches.

Keywords

Multiagent System Frequent Pattern Discriminative Feature Interaction History Subjective Logic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alpaydin, E.: Introduction to Machine Learning. MIT Press (2001)Google Scholar
  2. 2.
    Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proceedings of Autonomous Agents and Multiagent Systems (AAMAS 2010), pp. 241–248 (2010)Google Scholar
  3. 3.
    Cao, L., Gorodetsky, V., Mitkas, P.: Agent mining: The synergy of agents and data mining. IEEE Intelligent Systems 24(3), 64–72 (2009)CrossRefGoogle Scholar
  4. 4.
    Caverlee, J., Liu, L., Webb, S.: Towards robust trust establishment in web-based social networks with SocialTrust. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 1163–1164 (2008)Google Scholar
  5. 5.
    Chakrabarti, D., Faloutsos, C.: Graph mining: Laws, generators, and algorithms. ACM Comput. Surv. 38 (June 2006)Google Scholar
  6. 6.
    Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intelligent Systems 15(2), 32–41 (2000)CrossRefGoogle Scholar
  7. 7.
    Şensoy, M., Zhang, J., Yolum, P., Cohen, R.: Poyraz: Context-aware service selection under deception. Computational Intelligence 25(4), 335–366 (2009)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Donato, D., Gionis, A.: A survey of graph mining for web applications. In: Aggarwal, C.C., Wang, H., Elmagarmid, A.K. (eds.) Managing and Mining Graph Data, pp. 455–485 (2010)Google Scholar
  9. 9.
    W.O.W. Group. OWL 2 web ontology language: Document overview (2009), http://www.w3.org/TR/owl2-overview
  10. 10.
    Jøsang, A.: Subjective Logic. Book Draft (2011)Google Scholar
  11. 11.
    Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the Fifteenth Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, pp. 48–64 (June 2002)Google Scholar
  12. 12.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)CrossRefGoogle Scholar
  13. 13.
    Liu, X., Datta, A., Rzadca, K., Lim, E.-P.: Stereotrust: a group based personalized trust model. In: Proceeding of the ACM Conference on Information and Knowledge Management, pp. 7–16 (2009)Google Scholar
  14. 14.
    Meinl, T., Wörlein, M., Urzova, O., Fischer, I., Philippsen, M.: The ParMol package for frequent subgraph mining. In: Electronic Communications of the EASST, pp. 94–105 (2007)Google Scholar
  15. 15.
    Quinlan, J.: Learning with continuous classes. In: Proceedings of the 5th Australian Joint Conference on Artificial Intelligence, Singapore, pp. 343–348 (1992)Google Scholar
  16. 16.
    Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: A practical OWL-DL reasoner. Web Semant. 5(2), 51–53 (2007)CrossRefGoogle Scholar
  17. 17.
    Teacy, W., Patel, J., Jennings, N., Luck, M.: TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems 12(2), 183–198 (2006)CrossRefGoogle Scholar
  18. 18.
    Yan, X., Han, J.: gSpan: Graph-based substructure pattern mining. In: Proceedings of the International Conference on Data Mining, pp. 721–724 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Murat Sensoy
    • 1
    • 2
  • Burcu Yilmaz
    • 1
    • 3
  • Timothy J. Norman
    • 1
  1. 1.Department of Computing ScienceUniversity of AberdeenUK
  2. 2.Ozyegin UniversityIstanbulTurkey
  3. 3.Gebze Institute of TechnologyKocaeliTurkey

Personalised recommendations