{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T04:13:38Z","timestamp":1743308018547,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608041"},{"type":"electronic","value":"9789819608058"}],"license":[{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0805-8_20","type":"book-chapter","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T23:02:29Z","timestamp":1733526149000},"page":"281-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneous Multi Relation Trust for\u00a0SIoT Service Recommendation"],"prefix":"10.1007","author":[{"given":"Geming","family":"Xia","sequence":"first","affiliation":[]},{"given":"Chaodong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Linxuan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuze","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongfeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,7]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Abusafia, A., Bouguettaya, A., Lakhdari, A., Yangui, S.: Context-aware trustworthy iot energy services provisioning. In: 21st International Conference on Service-Oriented Computing (ICSOC) (2023)","DOI":"10.1007\/978-3-031-48424-7_13"},{"key":"20_CR2","first-page":"1193","volume-title":"Siot: Giving a social structure to the internet of things","author":"L Atzori","year":"2011","unstructured":"Atzori, L., Iera, A., Morabito, G.: Siot: Giving a social structure to the internet of things, pp. 1193\u20131195. Communications Letters, IEEE pp (2011)"},{"key":"20_CR3","unstructured":"Chen, Y., Wu, L., Zaki, M.J.: Iterative deep graph learning for graph neural networks: Better and robust node embeddings. In: NIPS\u201920: Proceedings of the 34st International Conference on Neural Information Processing Systems (2020)"},{"key":"20_CR4","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the International Conference on Artificial Intelligence and Statistics (2010)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: KDD \u201916: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"20_CR6","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: NIPS\u201917: Proceedings of the 31st International Conference on Neural Information Processing Systems (2017)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, N., Wen, J., Li, J., Liu, X., Jin, D.: Gatrust: A multi-aspect graph attention network model for trust assessment in osns. IEEE Transactions on Knowledge and Data Engineering pp. 5865\u20135878 (2023)","DOI":"10.1109\/TKDE.2022.3174044"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Kala\u00ef, A., Zayani, C.A., Amous, I., Sed\u00e8s, F.: Expertise and trust -aware social web service recommendation. In: 14th International Conference on Service Oriented Computing (ICSOC 2016) (2016)","DOI":"10.1007\/978-3-319-46295-0_32"},{"key":"20_CR9","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. In: Proceedings of the International Conference on Learning Representations (2015)"},{"key":"20_CR10","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: Proceedings of the International Conference on Learning Representations (2016)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Lin, W., Gao, Z., Li, B.: Guardian: Evaluating trust in online social networks with graph convolutional networks. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155370"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Lin, W., Li, B.: Medley: Predicting social trust in time-varying online social networks. In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488814"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Liu, G., Wang, Y., Orgun, M.A., Lim, E.P.: Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing pp. 152\u2013167 (2013)","DOI":"10.1109\/TSC.2011.58"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Liu, G., Chen, Q., Yang, Q., Zhu, B., Wang, H., Wang, W.: Opinionwalk: An efficient solution to massive trust assessment in online social networks. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057106"},{"key":"20_CR15","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: Proceedings of the International Conference on Learning Representations (2013)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: KDD \u201914: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)","DOI":"10.1145\/2623330.2623732"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Sun, Y., Han, J.: Mining heterogeneous information networks: a structural analysis approach. ACM SIGKDD Explorations Newsletter, pp. 20\u201328 (2012)","DOI":"10.1145\/2481244.2481248"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: WWW \u201915: Proceedings of the 24th International Conference on World Wide Web (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Liu, H., Sarma, A.D.: etrust: understanding trust evolution in an online world. In: KDD \u201912: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2012)","DOI":"10.1145\/2339530.2339574"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Truong, N.B., Lee, G.M., Um, T.W., Mackay, M.: Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the internet of things (article). IEEE Trans. Inform. Forensics Secur., 2705\u20132719 (2019)","DOI":"10.1109\/TIFS.2019.2903659"},{"key":"20_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the Conference and Workshop on Neural Information Processing Systems (2017)"},{"key":"20_CR22","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: Proceedings of the International Conference on Learning Representations (2018)"},{"key":"20_CR23","unstructured":"Wang, J., Jing, X., Yan, Z., Fu, Y., Witold, P., Laurence\u00a0T, Y.: A survey on trust evaluation based on machine learning. ACM Computing Surveys pp. 107\u2013143 (2020)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Ji, H., Shi, C., Wang, B., Ye, Y., Cui, P., Yu, P.S.: Heterogeneous graph attention network. In: Proceedings of WWW (2019)","DOI":"10.1145\/3308558.3313562"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Xu, P., Hu, W., Wu, J., Du, B.: Link prediction with signed latent factors in signed social networks. In: Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2019)","DOI":"10.1145\/3292500.3330850"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Xu, P., Hu, W., Wu, J., Liu, W., Du, B., Yang, J.: Social trust network embedding. In: 2019 IEEE International Conference on Data Mining (ICDM) (2019)","DOI":"10.1109\/ICDM.2019.00078"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Yu, C., Xia, G., Wang, Z.: Trust evaluation of computing power network based on improved particle swarm neural network. In: 17th IEEE International Conference on Mobility, Sensing and Networking (MSN) (2021)","DOI":"10.1109\/MSN53354.2021.00113"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Kgtrust: evaluating trustworthiness of siot via knowledge enhanced graph neural networks. In: 2023 World Wide Web Conference, WWW 2023 (2023)","DOI":"10.1145\/3543507.3583549"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0805-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:25:35Z","timestamp":1743265535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0805-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,7]]},"ISBN":["9789819608041","9789819608058"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0805-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,7]]},"assertion":[{"value":"7 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunis","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc2024.redcad.tn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}