Skip to main content

Discovering Frequent Patterns to Bootstrap Trust

  • Conference paper
Agents and Data Mining Interaction (ADMI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7607))

Included in the following conference series:

Abstract

When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same a priori trust for all newcomers. However, assuming the same a priori trust for all agents may lead to other problems like whitewashing. In this paper, we leverage graph mining and knowledge representation to estimate a priori trust for agents. For this purpose, our approach first discovers significant patterns that may be used to characterise trustworthy and untrustworthy agents. Then, these patterns are used as features to train a regression model to estimate trustworthiness. Lastly, a priori trust for newcomers are estimated using the discovered features based on the trained model. Through extensive simulations, we have showed that the proposed approach significantly outperforms existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alpaydin, E.: Introduction to Machine Learning. MIT Press (2001)

    Google Scholar 

  2. Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proceedings of Autonomous Agents and Multiagent Systems (AAMAS 2010), pp. 241–248 (2010)

    Google Scholar 

  3. Cao, L., Gorodetsky, V., Mitkas, P.: Agent mining: The synergy of agents and data mining. IEEE Intelligent Systems 24(3), 64–72 (2009)

    Article  Google Scholar 

  4. Caverlee, J., Liu, L., Webb, S.: Towards robust trust establishment in web-based social networks with SocialTrust. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 1163–1164 (2008)

    Google Scholar 

  5. Chakrabarti, D., Faloutsos, C.: Graph mining: Laws, generators, and algorithms. ACM Comput. Surv. 38 (June 2006)

    Google Scholar 

  6. Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intelligent Systems 15(2), 32–41 (2000)

    Article  Google Scholar 

  7. Şensoy, M., Zhang, J., Yolum, P., Cohen, R.: Poyraz: Context-aware service selection under deception. Computational Intelligence 25(4), 335–366 (2009)

    Article  MathSciNet  Google Scholar 

  8. Donato, D., Gionis, A.: A survey of graph mining for web applications. In: Aggarwal, C.C., Wang, H., Elmagarmid, A.K. (eds.) Managing and Mining Graph Data, pp. 455–485 (2010)

    Google Scholar 

  9. W.O.W. Group. OWL 2 web ontology language: Document overview (2009), http://www.w3.org/TR/owl2-overview

  10. Jøsang, A.: Subjective Logic. Book Draft (2011)

    Google Scholar 

  11. Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the Fifteenth Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, pp. 48–64 (June 2002)

    Google Scholar 

  12. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)

    Article  Google Scholar 

  13. Liu, X., Datta, A., Rzadca, K., Lim, E.-P.: Stereotrust: a group based personalized trust model. In: Proceeding of the ACM Conference on Information and Knowledge Management, pp. 7–16 (2009)

    Google Scholar 

  14. Meinl, T., Wörlein, M., Urzova, O., Fischer, I., Philippsen, M.: The ParMol package for frequent subgraph mining. In: Electronic Communications of the EASST, pp. 94–105 (2007)

    Google Scholar 

  15. Quinlan, J.: Learning with continuous classes. In: Proceedings of the 5th Australian Joint Conference on Artificial Intelligence, Singapore, pp. 343–348 (1992)

    Google Scholar 

  16. Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: A practical OWL-DL reasoner. Web Semant. 5(2), 51–53 (2007)

    Article  Google Scholar 

  17. Teacy, W., Patel, J., Jennings, N., Luck, M.: TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems 12(2), 183–198 (2006)

    Article  Google Scholar 

  18. Yan, X., Han, J.: gSpan: Graph-based substructure pattern mining. In: Proceedings of the International Conference on Data Mining, pp. 721–724 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sensoy, M., Yilmaz, B., Norman, T.J. (2013). Discovering Frequent Patterns to Bootstrap Trust. In: Cao, L., Zeng, Y., Symeonidis, A.L., Gorodetsky, V.I., Yu, P.S., Singh, M.P. (eds) Agents and Data Mining Interaction. ADMI 2012. Lecture Notes in Computer Science(), vol 7607. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36288-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36288-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36287-3

  • Online ISBN: 978-3-642-36288-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics