{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:13:00Z","timestamp":1771470780932,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T00:00:00Z","timestamp":1492387200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology Development Planning of Shandong Province","award":["2014GGX101011"],"award-info":[{"award-number":["2014GGX101011"]}]},{"name":"Science and Technology Development Planning of Shandong Province","award":["2015GGX101018"],"award-info":[{"award-number":["2015GGX101018"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10489-017-0928-x","type":"journal-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T00:27:50Z","timestamp":1492388870000},"page":"659-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Personalized recommendation algorithm for social networks based on comprehensive trust"],"prefix":"10.1007","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9532-7158","authenticated-orcid":false,"given":"Zhijun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Gongwen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongkang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,17]]},"reference":[{"key":"928_CR1","unstructured":"Golbeck JA (2005) Computing and applying trust in web-based social networks. PhD thesis, University of Maryland College Park"},{"key":"928_CR2","doi-asserted-by":"crossref","unstructured":"Massa P, Avesani P (2007) Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on recommender systems. ACM, 17\u201324","DOI":"10.1145\/1297231.1297235"},{"key":"928_CR3","doi-asserted-by":"crossref","unstructured":"Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on recommender systems. ACM, 135\u2013142","DOI":"10.1145\/1864708.1864736"},{"issue":"9","key":"928_CR4","first-page":"1805","volume":"50","author":"L Guo","year":"2013","unstructured":"Guo L, Ma J, Chen Z (2013) Trust strength aware social recommendation method. J Comput Res Develop 50(9):1805\u20131813. (in Chinese)","journal-title":"J Comput Res Develop"},{"issue":"2","key":"928_CR5","first-page":"61","volume":"24","author":"JW Qin","year":"2013","unstructured":"Qin JW, Zheng QH, Tian F, Wang K (2013) Collaborative filtering algorithm integrating trust and preference of user\u2019semotion. J Softw 24(2):61\u201372. (in Chinese)","journal-title":"J Softw"},{"issue":"12","key":"928_CR6","first-page":"2852","volume":"25","author":"BY Zou","year":"2014","unstructured":"Zou BY, Li CP, Tan LW, Chen H, Wang SQ (2014). J Softw 25(12):2852\u20132864. (in Chinese)","journal-title":"J Softw"},{"issue":"3","key":"928_CR7","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/s10489-015-0681-y","volume":"43","author":"ZJ Zhang","year":"2015","unstructured":"Zhang ZJ, Liu H (2015) Social recommendation model combining trust propagation and sequential behaviors[J]. Appl Intell 43(3):695\u2013706","journal-title":"Appl Intell"},{"issue":"5","key":"928_CR8","first-page":"404","volume":"28","author":"ZJ Zhang","year":"2015","unstructured":"Zhang ZJ, Liu H (2015) Research on context-awareness mobile SNS recommendation algorithm[J]. Pattern Recognit Artif Intell 28(5):404\u2013410. (in Chinese)","journal-title":"Pattern Recognit Artif Intell"},{"issue":"32","key":"928_CR9","first-page":"80","volume":"48","author":"CC Yang","year":"2012","unstructured":"Yang CC, Sun J (2012) Personalized recommendation based on trust of user multi-faced interest. Comput Eng Appl 48(32):80\u2013 84","journal-title":"Comput Eng Appl"},{"key":"928_CR10","first-page":"002","volume":"11","author":"XQ Tan","year":"2014","unstructured":"Tan XQ, Huang CC, Luo LA (2014) Review of research on trust recommendation in social networks[J]. New Technol Library Inf Serv 11:002","journal-title":"New Technol Library Inf Serv"},{"issue":"1","key":"928_CR11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4018\/jswis.2007010103","volume":"3","author":"P Massa","year":"2007","unstructured":"Massa P, Avesani P (2007) Trust metrics on controversial users: balancing between tyranny of the majority and echo chambers [J]. Int J Semantic Web Infor Syst 3(1):39\u201364","journal-title":"Int J Semantic Web Infor Syst"},{"issue":"6","key":"928_CR12","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1142\/S0218213006003053","volume":"15","author":"J O\u2019Donovan","year":"2006","unstructured":"O\u2019Donovan J, Smyth B (2006) Mining trust values from recommendation errors [J]. Int J Artif Intell Tools 15(6):945\u2013962","journal-title":"Int J Artif Intell Tools"},{"key":"928_CR13","doi-asserted-by":"crossref","unstructured":"Victor P, Cornelis C, De Cock M (2011) Trust networks for recommender systems [M] springer","DOI":"10.2991\/978-94-91216-08-4"},{"key":"928_CR14","doi-asserted-by":"crossref","unstructured":"Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble[C]. In: Proceedings of the 32nd international ACM SIGIR conference on research and development in information retrieval. ACM, 203\u2013210","DOI":"10.1145\/1571941.1571978"},{"key":"928_CR15","volume-title":"A research on trust and distrust-based collaborative filtering recommendation model[D]","author":"M Fu","year":"2012","unstructured":"Fu M (2012) A research on trust and distrust-based collaborative filtering recommendation model[D]. Yanshan University, Qinhuangdao"},{"key":"928_CR16","unstructured":"Ma H, Yang H, Lyu MR, King I (2008) SoRec:Social recommendation using probabilistic matrix factorization. In: Proceedings of the 17th ACM conference on information and knowledge management. ACM, 931\u2013940"},{"issue":"8","key":"928_CR17","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren Y, Bell R, Volinsky C (2009) Matrix factorization techniques for recommender systems[J]. Computer 42(8):30\u2013 37","journal-title":"Computer"},{"issue":"6755","key":"928_CR18","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1038\/44565","volume":"401","author":"DD Lee","year":"1999","unstructured":"Lee DD, Seung HS (1999) Learning the parts of objects by non-negative matrix factorization[J]. Nature 401(6755):788\u2013791","journal-title":"Nature"},{"issue":"8","key":"928_CR19","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren Y, Bell R, Volinsky C (2009) Matrix factorization techniques for recommender systems[J]. IEEE Comput 42(8):30\u201337","journal-title":"IEEE Comput"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-017-0928-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0928-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0928-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T23:18:27Z","timestamp":1569021507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-017-0928-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,17]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["928"],"URL":"https:\/\/doi.org\/10.1007\/s10489-017-0928-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,17]]}}}