Trust Relationship Prediction Using Online Product Review Data Nan Ma 1, Ee-Peng Lim 2, Viet-An Nguyen 2, Aixin Sun 1, Haifeng Liu 3 1 Nanyang Technological.

Slides:



Advertisements
Similar presentations
A Comparison of Implicit and Explicit Links for Web Page Classification Dou Shen 1 Jian-Tao Sun 2 Qiang Yang 1 Zheng Chen 2 1 Department of Computer Science.
Advertisements

Google News Personalization: Scalable Online Collaborative Filtering
+ Multi-label Classification using Adaptive Neighborhoods Tanwistha Saha, Huzefa Rangwala and Carlotta Domeniconi Department of Computer Science George.
Learning Trajectory Patterns by Clustering: Comparative Evaluation Group D.
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
Towards Twitter Context Summarization with User Influence Models Yi Chang et al. WSDM 2013 Hyewon Lim 21 June 2013.
Finding your friends and following them to where you are by Adam Sadilek, Henry Kautz, Jeffrey P. Bigham Presented by Guang Ling 1.
Modeling Relationship Strength in Online Social Networks Rongjian Xiang 1, Jennifer Neville 1, Monica Rogati 2 1 Purdue University, 2 LinkedIn WWW 2010.
A New Suffix Tree Similarity Measure for Document Clustering Hung Chim, Xiaotie Deng City University of Hong Kong WWW 2007 Session: Similarity Search April.
Guha et al (WWW 2004). Growing economic motivation to spread information & DISINFORMATION. Open standards and low barrier to publication on the Web. Unscrupulous.
Yuan Yao Joint work with Hanghang Tong, Xifeng Yan, Feng Xu, and Jian Lu MATRI: A Multi-Aspect and Transitive Trust Inference Model 1 May 13-17, WWW 2013.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
Explorations in Tag Suggestion and Query Expansion Jian Wang and Brian D. Davison Lehigh University, USA SSM 2008 (Workshop on Search in Social Media)
Precision and Recall.
Mohsen Jamali, Martin Ester Simon Fraser University Vancouver, Canada ACM RecSys 2010.
Chen Cheng1, Haiqin Yang1, Irwin King1,2 and Michael R. Lyu1
Context-Aware Query Classification Huanhuan Cao 1, Derek Hao Hu 2, Dou Shen 3, Daxin Jiang 4, Jian-Tao Sun 4, Enhong Chen 1 and Qiang Yang 2 1 University.
Predicting the Semantic Orientation of Adjective Vasileios Hatzivassiloglou and Kathleen R. McKeown Presented By Yash Satsangi.
Computing Trust in Social Networks
Mapping Between Taxonomies Elena Eneva 11 Dec 2001 Advanced IR Seminar.
Heterogeneous Consensus Learning via Decision Propagation and Negotiation Jing Gao† Wei Fan‡ Yizhou Sun†Jiawei Han† †University of Illinois at Urbana-Champaign.
Web Projections Learning from Contextual Subgraphs of the Web Jure Leskovec, CMU Susan Dumais, MSR Eric Horvitz, MSR.
Causal Modeling for Anomaly Detection Andrew Arnold Machine Learning Department, Carnegie Mellon University Summer Project with Naoki Abe Predictive Modeling.
EVENT IDENTIFICATION IN SOCIAL MEDIA Hila Becker, Luis Gravano Mor Naaman Columbia University Rutgers University.
Quality-aware Collaborative Question Answering: Methods and Evaluation Maggy Anastasia Suryanto, Ee-Peng Lim Singapore Management University Aixin Sun.
Quality-Aware Collaborative Question Answering: Methods and Evaluation Maggy Anastasia Suryanto, Ee-Peng Lim, Aixin Sun, and Roger H. L. Chiang. In Proceedings.
To Trust of Not To Trust? Predicting Online Trusts using Trust Antecedent Framework Viet-An Nguyen 1, Ee-Peng Lim 1, Aixin Sun 2, Jing Jiang 1, Hwee-Hoon.
Jinhui Tang †, Shuicheng Yan †, Richang Hong †, Guo-Jun Qi ‡, Tat-Seng Chua † † National University of Singapore ‡ University of Illinois at Urbana-Champaign.
Slide Image Retrieval: A Preliminary Study Guo Min Liew and Min-Yen Kan National University of Singapore Web IR / NLP Group (WING)
Extracting Key Terms From Noisy and Multi-theme Documents Maria Grineva, Maxim Grinev and Dmitry Lizorkin Institute for System Programming of RAS.
Semantic Similarity over Gene Ontology for Multi-label Protein Subcellular Localization Shibiao WAN and Man-Wai MAK The Hong Kong Polytechnic University.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Learning to Classify Short and Sparse Text & Web with Hidden Topics from Large- scale Data Collections Xuan-Hieu PhanLe-Minh NguyenSusumu Horiguchi GSIS,
MASTER THESIS num. 802 ANALYSIS OF ALGORITHMS FOR DETERMINING TRUST AMONG FRIENDS ON SOCIAL NETWORKS Mirjam Šitum Ao. Univ. Prof. Dr. Dieter Merkl Univ.
Glasgow 02/02/04 NN k networks for content-based image retrieval Daniel Heesch.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
Predicting Positive and Negative Links in Online Social Networks
--He Xiangnan PhD student Importance Estimation of User-generated Data.
Mining Social Network for Personalized Prioritization Language Techonology Institute School of Computer Science Carnegie Mellon University Shinjae.
Mining Social Networks for Personalized Prioritization Shinjae Yoo, Yiming Yang, Frank Lin, II-Chul Moon [KDD ’09] 1 Advisor: Dr. Koh Jia-Ling Reporter:
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Stefan Mutter, Mark Hall, Eibe Frank University of Freiburg, Germany University of Waikato, New Zealand The 17th Australian Joint Conference on Artificial.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
Automatic Video Tagging using Content Redundancy Stefan Siersdorfer 1, Jose San Pedro 2, Mark Sanderson 2 1 L3S Research Center, Germany 2 University of.
CoCQA : Co-Training Over Questions and Answers with an Application to Predicting Question Subjectivity Orientation Baoli Li, Yandong Liu, and Eugene Agichtein.
Semantic Overlay Networks in P2P systems A. Crespo, H. Garcia-Molina Speaker: Pavel Serdyukov Tutor: Jens Graupmann.
Network Community Behavior to Infer Human Activities.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying, Eric Hsueh-Chan Lu, Wen-Ning Kuo and Vincent S. Tseng Institute of Computer Science.
Recommender Systems with Social Regularization Hao Ma, Dengyong Zhou, Chao Liu Microsoft Research Michael R. Lyu The Chinese University of Hong Kong Irwin.
Understanding and Predicting Interestingness of Videos Yu-Gang Jiang, Yanran Wang, Rui Feng, Hanfang Yang, Yingbin Zheng, Xiangyang Xue School of Computer.
Improved Video Categorization from Text Metadata and User Comments ACM SIGIR 2011:Research and development in Information Retrieval - Katja Filippova -
Context-Aware Query Classification Huanhuan Cao, Derek Hao Hu, Dou Shen, Daxin Jiang, Jian-Tao Sun, Enhong Chen, Qiang Yang Microsoft Research Asia SIGIR.
26/01/20161Gianluca Demartini Ranking Categories for Faceted Search Gianluca Demartini L3S Research Seminars Hannover, 09 June 2006.
Divided Pretreatment to Targets and Intentions for Query Recommendation Reporter: Yangyang Kang /23.
11 A Classification-based Approach to Question Routing in Community Question Answering Tom Chao Zhou 1, Michael R. Lyu 1, Irwin King 1,2 1 The Chinese.
KAIST TS & IS Lab. CS710 Know your Neighbors: Web Spam Detection using the Web Topology SIGIR 2007, Carlos Castillo et al., Yahoo! 이 승 민.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Supervised Random Walks: Predicting and Recommending Links in Social Networks Lars Backstrom (Facebook) & Jure Leskovec (Stanford) Proc. of WSDM 2011 Present.
Hao Ma, Dengyong Zhou, Chao Liu Microsoft Research Michael R. Lyu
Experience Report: System Log Analysis for Anomaly Detection
Name: Sushmita Laila Khan Affiliation: Georgia Southern University
Neighborhood - based Tag Prediction
Sofus A. Macskassy Fetch Technologies
Saisai Gong, Wei Hu, Yuzhong Qu
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
iSRD Spam Review Detection with Imbalanced Data Distributions
Leverage Consensus Partition for Domain-Specific Entity Coreference
A Classification-based Approach to Question Routing in Community Question Answering Tom Chao Zhou 22, Feb, 2010 Department of Computer.
Presentation transcript:

Trust Relationship Prediction Using Online Product Review Data Nan Ma 1, Ee-Peng Lim 2, Viet-An Nguyen 2, Aixin Sun 1, Haifeng Liu 3 1 Nanyang Technological University 2 Singapore Management University 3 IBM Research China CNIKM’09, November 6, 2009, Hong Kong

Motivation Online links between users are getting popular. 2 Facebook networkEpinion’s Web of Trust A B C D E trust distrust

Trust relationships Trust is a user-user link. Web of Trust (WOT): –A network of users and their trust + distrust links –This paper focuses on trust links only Trust can be used in various applications –Personalized search –Personalized recommendation –P2P file sharing 3 AB trust trustortrustee

Trust Data Sparseness A few users with many trust relationships. Majority users with few or no trust relationships. –Users may be lazy. –Users just don’t have many trusted friends. A lack of trust relationships → difficulties in building useful applications. 4

Research Goal To predict trust among users – Trust Prediction Previous trust prediction work –Trust propagation: [WWW2004, AAAI2005, TOIT2006] A trusts B, B trusts C → A trusts C –Trust classification: [EC2008,WWW2009] Represent a user pair (A,B) by a set of features. Train a classifier to label (A,B) as trusted pair or not. Apply the trained classifier on unseen user pairs. 5

Contribution We take the trust classification approach. –Features from both user and user-user interaction We use two Epinions datasets. –EpinionsVideo –EpinionsTrustlet Previous trust classification approaches: –Global classifier is used. Treat every user the same. Apply personalized and cluster-based classifiers to trust prediction. 6

Epinions schema 7 Product Review Rating Comment User Category Posting time Score Text Score Time Text Posting time has n n n n n rates writes 1 n trusts

EpinionsVideo + EpinionsTrustlet EpinionsVideo –We crawled product reviews and Web of Trust of“Videos & DVDs”category on April 15, EpinionsTrustlet –Made available by Massa for trust research –Product reviews and ratings from all categories before May 30, 2002, and both Web of trust and distrust relationships before August

Statistics 9

WOT Statistics 10 EpinionsVideoEpinionsTrustlet

Overview of General Classification (GC) Approach 11 Classifier Training Labeled Training Pairs Trained Classifier Apply Classifier Labeled Training Pairs SVM

User Interactions in Epinions Users can interact with one another in the following forms: (a) one reads the reviews written by another (b) one rates the reviews written by another (c) one comments on the reviews written by another (d) one reads the ratings by another (e) one reads the comments by another 12

User Interactions in Epinions Users can interact with one another in the following forms: (a) one reads the reviews written by another (b) one rates the reviews written by another (c) one comments on the reviews written by another (d) one reads the ratings by another (e) one reads the comments by another Only (b) and (c) are observable in our data. We use mainly (b) in this paper. 13

Review Rating Statistics Write-rate writer count of u i = # of review writers rated by u i 14

User and Interaction Features for (u1,u2) 15 Known to be good features in our earlier work. u u u u u u u u u u u i i i i i i i i i u

Cluster-Centric + Personalized Classification Earlier classification approach uses a global classifier (GC) GC may not suit all users as each user may have different criteria to trust Personalized classifier (PC): –One classifier for each user (as trustor) Cluster-centric classifier (CC): –One classifier for a cluster of users (as trustors) 16

CC Method – Clustering of Users Graph partitioning Divisive hierarchical clustering method using normalized minimum cut [TPAMI2000] –Directions of trust relationships are ignored –Edge weight of (u1,u2) = 2 if u1 and u2 trust each other 1 if only u1 trusts u2 0 otherwise –Normalized Cut of user sets U A and U B 17

Experiment Setup To evaluate GC, CC, and PC methods Enough training data? –Users with write-rate writer count >= 50 –Users with # trustees among rated writers >= 25 User activeness –measured by write-rate writer count –Highly active users (U t ): top 500 with highest counts –Less active users (U b ): bottom 500 with lowest counts 18

User Activeness Statistics 19

Methods to be evaluated {GC,CC,PC} - {Active, LessAct} combinations CC with k= 2 to 10 clusters User pairs (u i,u j )’s for experiments For each Active (or LessAct) user u i, include all u j ’s that u i rates and trusts; and equal number of other users u j ’s u i has no trust relationships with. F1= 2 Precision x Recall / (Precision + Recall) Results obtained using 5-fold validation 20

F1 Results – EpinionsVideo 21 F1

F1 Results - EpinionsTrustlet 22 K clusters F1

F1 of PC classifiers - EpinionsVideo 23

F1 of PC classifiers - EpinionsTrustlet 24

Comparison of Propagation and Classification Approaches Trust propagation method: Moletrust Limitation: can only predict if there is a path from trustor to trustee. Leave out such user pairs from experiment. 25

Conclusions Trust prediction using classification methods using both user and user interaction features. Personalized and Cluster centric classification. –Training examples relevant to trustors are more useful. Active users enjoys better prediction accuracy Classification methods are better than propagation methods Future works: –Other interaction features –User clustering –Trust aware search and recommendation 26

Thank you Ee-Peng Lim