2013
DOI: 10.1080/15427951.2012.678194
|View full text |Cite
|
Sign up to set email alerts
|

Dirichlet PageRank and Ranking Algorithms Based on Trust and Distrust

Abstract: Abstract. Motivated by numerous models of representing trust and distrust within a network ranking system, we examine a quantitative vertex ranking with consideration of the influence of a subset of nodes. We propose and analyze a general ranking metric, called Dirichlet PageRank, which gives a ranking of vertices in a subset S of nodes subject to some specified conditions on the vertex boundary of S. In addition to the usual Dirichlet boundary condition (which disregards the influence of nodes outside of S), … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…In this context, the entries of the adjacency matrix are hyperlinks, and it is known that a consistent fraction of links can in principle be classifiable as "negative" links (links from spamindexing, cloaking and other "black hat" search engine optimization practices). Several algorithms have already appeared in order to cope with them [14], [13], [42]. None of these approaches is similar to ours.…”
Section: Introductionmentioning
confidence: 86%
See 1 more Smart Citation
“…In this context, the entries of the adjacency matrix are hyperlinks, and it is known that a consistent fraction of links can in principle be classifiable as "negative" links (links from spamindexing, cloaking and other "black hat" search engine optimization practices). Several algorithms have already appeared in order to cope with them [14], [13], [42]. None of these approaches is similar to ours.…”
Section: Introductionmentioning
confidence: 86%
“…where we have applied (8) and (13). Furthermore, since H is essentially nonnegative and K ≥ 0, α ′ = e Et α ≥ 0 and β ′ = e H(t−τ ) Kβ ≥ 0, meaning that…”
Section: Proposition 2 ([29] Proposition 1) Consider the System (10)mentioning
confidence: 99%
“…• Utilization of Distrust in Social Networks [25][26][27][32][33][34][35][36] [37][38][39][40][41]. Wei et al…”
Section: Proposed Approachesmentioning
confidence: 99%
“…As mentioned in chapters 1-2, most of the existing topological Sybil detection mechanisms are designed only considering inherent trust underlying social networks, while ignore the distrust factor. However, many studies reveal that distrust plays an important role in uncovering illegitimate accounts [37,41,63,64]. For example, Yang et al [50] perform an empirical analysis of characteristics of criminal accounts' social relationships on Twitter and find that the cyber criminal ecosystem in real world is more sophisticated than anticipated, which constitutes of multi-level organizations.…”
Section: Chapter 4 Exploiting Trust and Distrust Information To Impromentioning
confidence: 99%
See 1 more Smart Citation