Stage: stereotypical trust assessment through graph extraction
dc.contributor.author | Şensoy, Murat | |
dc.contributor.author | Yilmaz, B. | |
dc.contributor.author | Norman, T. J. | |
dc.date.accessioned | 2016-02-15T07:33:14Z | |
dc.date.available | 2016-02-15T07:33:14Z | |
dc.date.issued | 2016-02 | |
dc.identifier.isbn | 1467-8640 | |
dc.identifier.uri | http://hdl.handle.net/10679/2148 | |
dc.identifier.uri | http://onlinelibrary.wiley.com/doi/10.1111/coin.12046/abstract | |
dc.description.abstract | Bootstrapping trust assessment where there is little or no evidence regarding a subject is a significant challenge for existing trust and reputation systems. When direct or indirect evidence is absent, existing approaches usually assume that all agents are equally trustworthy. This naive assumption makes existing approaches vulnerable to attacks such as Sybil and whitewashing. Inspired by real-life scenarios, we argue that malicious agents may share some common patterns or complex features in their descriptions. If such patterns or features can be detected, they can be exploited to bootstrap trust assessments. Based on this idea, we propose the use of frequent subgraph mining and state-of-the-art knowledge representation formalisms to estimate a priori trust for agents. Our approach first discovers significant patterns that may be used to characterize trustworthy and untrustworthy agents. Then, these patterns are used as features to train a regression model to estimate the trustworthiness of agents. Last, a priori trust for unknown agents (e.g., newcomers) is estimated using the discovered features based on the trained model. Through empirical evaluation, we show that the proposed approach significantly outperforms well-known trust approaches if trustworthiness of agents is correlated with patterns in their descriptions or social networks. Furthermore, we show that the proposed approach performs at least as good as the existing approaches if such correlations do not exist. | |
dc.description.sponsorship | U.S. Army Research Laboratory ; U.K. Ministry of Defence ; U.S. Army Research Laboratory ; TÜBİTAK | |
dc.language.iso | eng | en_US |
dc.publisher | Wiley | en_US |
dc.relation | info:turkey/grantAgreement/TUBITAK/113E238 | |
dc.relation.ispartof | Computational Intelligence | |
dc.rights | restrictedAccess | |
dc.title | Stage: stereotypical trust assessment through graph extraction | en_US |
dc.type | Article | en_US |
dc.peerreviewed | yes | en_US |
dc.publicationstatus | published | en_US |
dc.contributor.department | Ŏzyeğin University | |
dc.contributor.authorID | (ORCID 0000-0001-8806-4508 & YÖK ID 41438) Şensoy, Murat | |
dc.contributor.ozuauthor | Şensoy, Murat | |
dc.identifier.volume | 32 | |
dc.identifier.issue | 1 | |
dc.identifier.startpage | 72 | |
dc.identifier.endpage | 101 | |
dc.identifier.wos | WOS:000369837800003 | |
dc.identifier.doi | 10.1111/coin.12046 | |
dc.subject.keywords | Trust and reputation | en_US |
dc.subject.keywords | Semantic Web | en_US |
dc.subject.keywords | Graph mining | en_US |
dc.identifier.scopus | SCOPUS:2-s2.0-84957426398 | |
dc.contributor.authorMale | 1 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
Share this page