[1]ELLISON N B.Social network sites:definition,history,and scholarship[J].Journal of Computer-Mediated Communication,2007,13(1):210-230.
[2]CHEN J,GEYER W,DUGAN C,et al.Make new friends,but keep the old:recommending people on social networking sites[C]//Proceedings of SIGCHI Conference on Human Factors in Computing Systems.New York,USA:ACM Press,2009:201-210.
[3]PAGE L,BRIN S,MOTWANI R,et al.The PageRank citation ranking:bringing order to the Web:SIDL-WP-1999-0120[R].Stanford InfoLab,1999.
[4]KLEINBERG J M.Authoritative sources in a hyperlinked environment[J].Journal of the ACM,1999,46(5):604-632.
[5]GYNGYI Z,GARCIA-MOLINA H,PEDERSEN J.Combating Web spam with trustrank[C]//Proceedings of the 30th International Conference on Very Large Data Bases.[S.l.]:VLDB Endowment,2004:576-587.
[6]ZHAO D,ROSSON M B.How and why people Twitter:the role that micro-blogging plays in informal communication at work[C]//Proceedings of ACM International Conference on Supporting Group Work.New York,USA:ACM Press,2009:243-252.
[7]KRISHNAMURTHY B,GILL P,ARLITT M.A few chirps about Twitter[C]//Proceedings of the 1st Workshop on Online Social Networks.New York,USA:ACM Press,2008:19-24.
[8]MEYFFRET S,MDINI L,LAFOREST F.Trust-based local and social recommendation[C]//Proceedings of the 4th ACM RecSys Workshop on Recommender Systems and the Social Web.New York,USA:ACM Press,2012:53-60.
[9]O’DONOVAN J,SMYTH B.Trust in recommender systems[C]//Proceedings of the 10th International Conference on Intelligent User Interfaces.New York,USA:ACM Press,2005:167-174.
[10]ANDERSEN R,BORGS C,CHAYES J,et al.Trust-based recommendation systems:an axiomatic approach[C]//Proceedings of the 17th International Conference on World Wide Web.New York,USA:ACM Press,2008:199-208.
[11]GUPTA M,ZHAO P,HAN J.Evaluating event credibility on Twitter[C]//Proceedings of Conference on Sustainable Design and Manufacturing.Berlin,Germany:Springer,2012:153-164.
[12]MORRIS M R,COUNTS S,ROSEWAY A,et al.Tweeting is believing?:understanding microblog credibility perceptions[C]//Proceedings of ACM Conference on Computer Supported Cooperative Work.New York,USA:ACM Press,2012:441-450.
[13]CASTILLO C,MENDOZA M,POBLETE B.Information credibility on Twitter[C]//Proceedings of the 20th International Conference on World Wide Web.New York,USA:ACM Press,2011:675-684.
[14]GUO L,ZHANG C,FANG Y.A trust-based privacy-preserving friend recommendation scheme for online social networks[J].IEEE Transactions on Dependable and Secure Computing,2015,12(4):413-427.
[15]WANG Y,YIN G,CAI Z,et al.A trust-based probabilistic recommendation model for social networks[J].Journal of Network and Computer Applications,2015,55:59-67.
[16]DE MEO P,FERRARA E,ROSACI D,et al.Trust and compactness in social network groups[J].IEEE Transactions on Cybernetics,2015,45(2):205-216.
[17]宋波伟,伍伟丽.基于信任社交圈的好友推荐算法[J].计算机工程,2017,43(5):149-155.
[18]王培人,毛剑,马寒军,等.基于用户信息的社交网络信任评估方法[J].计算机应用研究,2018,35(2):1-2.
[19]文俊浩,何波,胡远鹏.基于社交网络用户信任度的混合推荐算法研究[J].计算机科学,2016,43(1):255-258.
[20]刘慧婷,熊瑞瑞,赵鹏.基于信任关系重建和社交网络传递的推荐算法[J].计算机工程,2016,42(1):174-179.
[21]HU Y,DENG B,WANG B,et al.Analyzing and predicting forwarding behaviors in Sina Weibo[C]//Proceedings of 2015 International Conference on Electrical and Information Technologies for Rail Transportation.Berlin,Germany:Springer,2016:83-92. |