Computer Science ›› 2018, Vol. 45 ›› Issue (8): 146-150.doi: 10.11896/j.issn.1002-137X.2018.08.026

• Information Security • Previous Articles     Next Articles

Trust Network Based Collaborative Filtering Recommendation Algorithm

ZHANG Hong-bo, WANG Jia-lei, ZHANG Li-juan, LIU Zhi-hong   

  1. School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Received:2017-01-06 Online:2018-08-29 Published:2018-08-29

Abstract: The problems of data sparsity and cold start cannot be solved by the classical collaborative filtering recommendation schemes.Although these problems can be solved effectively by exploiting the trust networks of users,the performance of these schemes need to be improved.Based on the ubiquitous phenomenon of“if a trusts b,then the similarity between a and b is relatively high”,this paper proposed a collaborative filtering recommendation algorithm,which exploits a penalty and reward mechanism to further promote its performance.Then it was compared with the classical collaborative filtering algorithms and the existing trust recommendation algorithms in terms of the coverage and accuracy.The results show that the performance of the proposed algorithm is improved.

Key words: Recommendation system, Trust network, Collaborative filtering, Cold start

CLC Number: 

  • TP393
ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:a survey of the state-of-the-art and possible extensions.IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749.
[2]Collaborative filtering-wikipedia[EB/OL].
[3]GOLBECK J.Generating predictive movie recommendationsfrom trust in social networks[C]∥International Conference on Trust Management.Springer Berlin Heidelberg,2006:93-104.
[4]PALAU J,MONTANER M,LÓPEZ B,et al.Collaborationanalysis in recommender systems using social networks[C]∥International Workshop on Cooperative Information Agents.Springer Berlin Heidelberg,2004:137-151.
[5]YUAN W W,GUAN D H,LEE Y K,et al.Improved trusta-ware recommender system using small-worldness of trust networks.Knowledge-Based Systems,2010,23(3):232-238.
[6]TONG X R,ZHANG W,LONG Y.Transitivity of Agent Subjective Trust.Journal of Software,2012,23(11):2862-2870.(in Chinese)童向荣,张伟,龙宇.Agent主观信任的传递性.软件学报,2012,23(11):2862-2870.
[7]HWANG C S,CHEN Y P.Using trustin collaborative filtering recommendation[C]∥International Conference on Industrial,Engineering and Other Applications of Applied Intelligent Systems.Springer Berlin Heidelberg,2007:1052-1060.
[8]AVESANI P,MASSA P,TIELLA R.A trust-enhanced recommender system application:Moleskiing[C]∥Proceedings of the 2005 ACM Symposium on Applied Computing.ACM,2005:1589-1593.
[9]GUO G B,ZHANG J,THALMANN D.Merging trust in colla-borative filtering to alleviate data sparsity and cold start.Knowledge-Based Systems,2014,57:57-68.
[10]MORADI P,AHMADIAN S.A reliability-based recommendation method to improve trust-aware recommender systems.Expert Systems with Applications,2015,42(21):7386-7398.
[11]JAMALI M,ESTER M.TrustWalker:a random walk model for combining trust-based and item-based recommendation[C]∥15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2009:397-406.
[12]TONG Z,MCAULEY J,KING I.Leveraging social connections to improve personalized ranking for collaborative filtering[C]∥23rd ACM International Conference on Conference on Information and Knowledge Management.ACM,2014:261-270.
[13]AZADJALAL M M,MORADI P,ABDOLLAHPOURI A.Application of game theory techniques for improving trust based recommender systems in social networks[C]∥2014 4th International Conference on Computer and Knowledge Engineering(ICCKE).IEEE,2014:261-266.
[14]FENG J Y.Research on Trust Management Technologies inOpen Peer-to-Peer Environment.Xi’an:Xidian University,2011.(in Chinese)冯景瑜.开放式P2P网络环境下的信任管理技术研究.西安:西安电子科技大学,2011.
[15]ZHANG M W,YANG B,YU Y.DS theory based Distributed trust model.Journal of Wuhan University,2009,55(1):41-44.(in Chinese)张明武,杨波,禹勇.基于 DS 理论的分布式信任模型.武汉大学学报,2009,55(1):41-44.
[16]HU X P,YIN J.Research on Trust Transfer Model .Journal of Southeast University(Philosophy and Social Science),2013(4):46-51.(in Chinese)胡祥培,尹进.信任传递模型研究综述.东南大学学报(哲学社会科学版),2013(4):46-51.
[1] WANG Han, XIA Hong-bin. Collaborative Filtering Recommendation Algorithm Mixing LDA Model and List-wise Model [J]. Computer Science, 2019, 46(9): 216-222.
[2] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation [J]. Computer Science, 2019, 46(8): 28-34.
[3] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[4] GUO Xu, ZHU Jing-hua. Deep Neural Network Recommendation Model Based on User Vectorization Representation and Attention Mechanism [J]. Computer Science, 2019, 46(8): 111-115.
[5] KANG Lin-yao, TANG Bing, XIA Yan-min, ZHANG Li. GPU-accelerated Non-negative Matrix Factorization-based Parallel Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2019, 46(8): 106-110.
[6] SHI Xiao-ling, CHEN Zhi, YANG Li-gong, SHEN Wei. Matrix Factorization Recommendation Algorithm Based on Adaptive Weighted Samples [J]. Computer Science, 2019, 46(6A): 488-492.
[7] WANG Xu, PANG Wei, WANG Zhe. MetaStruct-CF:A Meta Structure Based Collaborative Filtering Algorithm in Heterogeneous Information Networks [J]. Computer Science, 2019, 46(6A): 397-401.
[8] LIU Qing-qing, LUO Yong-long, WANG Yi-fei, ZHENG Xiao-yao, CHEN Wen. Hybrid Recommendation Algorithm Based on SVD Filling [J]. Computer Science, 2019, 46(6A): 468-472.
[9] LU Zhu-bing, LI Yu-zhou. Recommendation Strategy Based on Trust Model via Emotional Analysis of Online Comment [J]. Computer Science, 2019, 46(6): 75-79.
[10] SU Chang, WU Peng-fei, XIE Xian-zhong, LI Ning. Point of Interest Recommendation Based on User’s Interest and Geographic Factors [J]. Computer Science, 2019, 46(4): 228-234.
[11] WANG Yong, WANG Yong-dong, DENG Jiang-zhou, ZHANG Pu. Recommendation Algorithm Based on Jensen-Shannon Divergence [J]. Computer Science, 2019, 46(2): 210-214.
[12] ZENG An, NIE Wen-jun. Stock Recommendation System Based on Deep Bidirectional LSTM [J]. Computer Science, 2019, 46(10): 84-89.
[13] ZENG Xu-yu, YANG Yan, WANG Shu-ying, HE Tai-jun, CHEN Jian-bo. Hybrid Recommendation Algorithm Based on Deep Learning [J]. Computer Science, 2019, 46(1): 126-130.
[14] LIU Hui-ting, CHENG Lei, GUO Xiao-xue, ZHAO Peng. Real-time Personalized Micro-blog Recommendation System [J]. Computer Science, 2018, 45(9): 253-259, 265.
[15] ZHAO Xing-wang,LIANG Ji-ye,GUO Lan-jie. Collaborative Filtering Recommendation Algorithm Based on Space Transformation [J]. Computer Science, 2018, 45(7): 16-21.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .