Skip to main content

Subgraph Extraction for Trust Inference in Social Networks

  • Living reference work entry
  • First Online:
Book cover Encyclopedia of Social Network Analysis and Mining
  • 45 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Bäck T (1996) Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford University Press, New York

    MATH  Google Scholar 

  • Barbian G (2011) Assessing trust by disclosure in online social networks. In: Proceedings of the international conference on advances in social networks analysis and mining. In: ASONAM’11, Kaohsiung, pp 163–170

    Google Scholar 

  • Buchegger S, Le Boudec JY (2004) A robust reputation system for mobile ad-hoc networks. Technical report, KTH Royal Institute of Technology, Theoretical Computer Science Group

    Google Scholar 

  • Faloutsos C, McCurley KS, Tomkins A (2004) Fast discovery of connection subgraphs. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, ACM, KDD’04, Seattle, pp 118–127

    Google Scholar 

  • Golbeck J, Hendler J (2006) Inferring binary trust relationships in web-based social networks. ACM Trans Internet Technol 6:497–529

    Article  Google Scholar 

  • Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, WWW’04, New York. ACM, pp 403–412

    Google Scholar 

  • Hang CW, Wang Y, Singh MP (2009) Operators for propagating trust and their evaluation in social networks. In: Proceedings of the 8th international conference on autonomous agents and multiagent systems. In AAMAS’09, Budapest, vol 2. International Foundation for Autonomous Agents and Multiagent Systems, pp 1025–1032

    Google Scholar 

  • Hershberger J, Maxel M, Suri S (2007) Finding the k shortest simple paths: a new algorithm and its implementation. ACM Trans Algorithms 3(4):45

    Article  MathSciNet  Google Scholar 

  • Hintsanen P, Toivonen H (2008) Finding reliable subgraphs from large probabilistic graphs. Data Mini Knowl Disc 17(1):3–23

    Article  MathSciNet  Google Scholar 

  • Hintsanen P, Toivonen H, Sevon P (2010) Fast discovery of reliable subnetworks. In: Proceedings of the international conference on advances in social networks analysis and mining, ASONAM’10, Odense, pp 104–111

    Google Scholar 

  • Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web, WWW’03, Budapest. ACM, pp 640–651

    Google Scholar 

  • Koren Y, North S, Volinsky C (2006) Measuring and extracting proximity in networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, KDD’06, Philadelphia. ACM, pp 245–255

    Google Scholar 

  • Liu G, Wang Y, Orgun M (2010) Optimal social trust path selection in complex social networks. In: Proceedings of the twenty-fourth AAAI conference on artificial intelligence, AAAI’10, Atlanta, pp 1391–1398

    Google Scholar 

  • Martins E, Pascoal M (2003) A new implementation of Yen’s ranking loopless paths algorithm. 4OR Q J Oper Res 1(2):121–133

    Google Scholar 

  • Massa P, Avesani P (2005) Controversial users demand local trust metrics: an experimental study on epin-ions.com community. In: Proceedings of the AAAI conference on artificial intelligence, AAAI’05, Pittsburgh, pp 121–126

    Google Scholar 

  • Mui L, Mohtashemi M, Halberstadt A (2002) A computational model of trust and reputation. In: Proceedings of the 35th annual Hawaii international conference on system sciences, HICSS’02, Big Island. IEEE, pp 2431–2439

    Google Scholar 

  • Nordheimer K, Schulze T, Veit D (2010) Trustworthiness in networks: a simulation approach for approximating local trust and distrust values. In: Trust management IV, Morioka. IFIP advances in information and communication technology, vol 321. Springer, Boston, pp 157–171

    Google Scholar 

  • Richardson M, Agrawal R, Domingos P (2003) Trust management for the semantic web. In: The semantic web, Sanibel Island. Lecture notes in computer science, vol 2870. Springer, Berlin/Heidelberg, pp 351–368

    Google Scholar 

  • Robins G, Pattison P, Kalish Y, Lusher D (2007) An introduction to exponential random graph (p*) models for social networks. Soc Networks 29(2):173–191

    Article  Google Scholar 

  • Tong H, Faloutsos C, Koren Y (2007) Fast direction-aware proximity for graph mining. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, KDD’07, San Jose. ACM, pp 747–756

    Google Scholar 

  • Wang Y, Singh MP (2006) Trust representation and aggregation in a distributed agent system. In: Proceedings of the AAAI conference on artificial intelligence, AAAI’06, Boston, pp 1425–1430

    Google Scholar 

  • Wang Y, Singh MP (2007) Formal trust model for multia-gent systems. In: Proceedings of the 20th international joint conference on artificial intelligence, IJCAI’07, Hyderabad, pp 1551–1556

    Google Scholar 

  • Wang G, Wu J (2011) Multi-dimensional evidence-based trust management with multi-trusted paths. Futur Gener Comput Syst 27(5):529–538

    Article  Google Scholar 

  • Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  • Yao Y, Zhou J, Han L, Xu F, Lü J (2011) Comparing linkage graph and activity graph of online social networks. In: Social informatics, Singapore. Lecture notes in computer science, vol 6984. Springer, Berlin/Heidelberg, pp 84–97

    Google Scholar 

  • Yen J (1971) Finding the k shortest loopless paths in a network. Manag Sci 17(11):712–716

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou R, Hwang K (2007) Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473

    Article  Google Scholar 

  • Ziegler C, Lausen G (2005) Propagation models for trust and distrust in social networks. Inf Syst Front 7(4):337–358

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the National 863 Program of China (No. 2012AA011205), and the National Natural Science Foundation of China (No. 91318301, 61021062, 61073030). The second author was partly sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-09-2-0053.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Yao .

Editor information

Editors and Affiliations

Section Editor information

Appendix

Appendix

To find K short paths from graph G(V, E) in the path selection stage, many existing algorithms can be used. We consider two representative algorithms from the literature. Here, we present the detailed algorithm description for completeness.

The first algorithm is Yen’s k-shortest loopless paths (KS) algorithm (Yen 1971), which is shown in Algorithm 3.

Algorithm 3 Detailed KS Algorithm

Input: Weighted directed graph G(V, E), two nodes s, tV, and a parameter K of path number Output: Set C with K paths from s to t 1: X shortest path from s to t 2:C shortest path from s to t 3: while |C| < K and X ≠ Ø do 4:  P ← remove the shortest path in X 5:  d ← the deviation node of P 6:  for each node v between d (inclusive) and trustee t (exclusive) in P do 7:   pre ← subpath from trustor s to v in P 8:   post ← the deviated shortest path from v to t 9:   combine pre and post, and add it to X 10:  end for 11:  CC + the shortest path in X 12:  end while 13:  return C

In the algorithm, we use Dijkstra’s algorithm for finding a shortest path. All the computed paths are loopless by temporarily removing visited nodes. The key idea of the KS algorithm is deviation. The deviation node d of path P is the node that makes P deviate from existing paths in the candidate set C. For each node v between d (inclusive) and trustee t (exclusive) in P, the deviated shortest path from node v to t is computed by temporarily removing the edge starting at v in P. The computed deviated shortest path post and the subpath pre (the path from s to v in P) are combined to form a possible path candidate. For the nodes before d, possible shortest paths are already computed and included in X. Based on deviation, KS finds the K-shortest paths from trustor s to trustee t one by one. Following Martins and Pascoal’s implementation (Martins and Pascoal 2003), we compute the deviated shortest path from deviation node d to the trustee in a reverse order.

The other algorithm is the randomized algorithm path sampling (PS) (Hintsanen et al. 2010), which is proposed for the most reliable subgraph problem (Hintsanen and Toivonen 2008). While PS is proposed for undirected graphs, trust relationships in social networks should be directed as trust is asymmetric in nature (Golbeck and Hendler 2006). Therefore, we adapt PS (as shown in Algorithm 4) for a directed graph.

Algorithm 4 PS Algorithm

Input: Weighted directed graph G(V, E). two nodes s, tV, and a parameter K of path number Output: Set C with K paths from s to t 1: C shortest path from s to t 2: while |C| < K do 3:  re-decide all the edges in E 4:  for each path P in C do 5:   if P is decided as true then 6:    F ← F + P 7:   end if 8:  end for 9:  while F ≠ Ø do 10:   re-decide the most overlapped edge in F as failed 11:   remove failed paths from F, if there are any 12:  end while 13:  P the shortest path among the non-failed edges from s to t 14:  if P ≠ Ø then 15:   C C + P 16:  end if 17: end while 18: return C

PS considers the input graph as a Bernoulli random graph (Robins et al. 2007), and the algorithm is based on the edge decision of this random graph. An edge is randomly decided as true with probability p(e), and a path is decided as true if all the edges on the path are decided as true. At the beginning of each iteration, all the edges of the graph are re-decided, and these graph decisions provide opportunities for distrust information to be contained. Like KS, PS first adds a shortest path into candidate set C. PS then tries to find a graph decision based on which none of the paths in C are true. To avoid the situation when this graph decision is hardly found, PS stores the true paths in C to a temporary set F and deliberately fails the most overlapping edges in F until none of the paths in F are true. Finally, based on the results of graph decision and edge failing, PS finds the shortest path P among the non-failed edges from trustor s to trustee t and adds it to C. The algorithm ends until K paths are found.

PS allows some distrust information to be incorporated into the extracted subgraph, which could in turn lower the P-error based on our experiments. However, the time complexity of PS is difficult to estimate, since the wall-clock time depends on the graph density. In addition, as shown in our experiments, the wall-clock time of PS is especially long when K becomes sufficiently large. We conjecture that PS can be used in dense graphs where numerous paths exist between node pairs.

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media LLC

About this entry

Cite this entry

Yao, Y., Tong, H., Xu, F., Lu, J. (2017). Subgraph Extraction for Trust Inference in Social Networks. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_357-1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7163-9_357-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7163-9

  • Online ISBN: 978-1-4614-7163-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics