{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:47:31Z","timestamp":1771670851942,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472289"],"award-info":[{"award-number":["61472289"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Project","award":["2016YFC0106305"],"award-info":[{"award-number":["2016YFC0106305"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s10489-019-01542-0","type":"journal-article","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T07:30:31Z","timestamp":1563953431000},"page":"314-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Learning adaptive trust strength with user roles of truster and trustee for trust-aware recommender systems"],"prefix":"10.1007","volume":"50","author":[{"given":"Yiteng","family":"Pan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fazhi","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haiping","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoran","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"1542_CR1","doi-asserted-by":"crossref","first-page":"15608","DOI":"10.1109\/ACCESS.2018.2810062","volume":"6","author":"A Anandhan","year":"2018","unstructured":"Anandhan A, Shuib L, Ismail MA, Mujtaba G (2018) Social media recommender systems: review and open research issues. IEEE Access 6:15608\u201315628","journal-title":"IEEE Access"},{"key":"1542_CR2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.knosys.2013.03.012","volume":"46","author":"J Bobadilla","year":"2013","unstructured":"Bobadilla J, Ortega F, Hernando A, Guti\u00e9rrez A (2013) Recommender systems survey. Knowl-Based Syst 46:109\u2013132","journal-title":"Knowl-Based Syst"},{"key":"1542_CR3","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1023\/A:1021240730564","volume":"12","author":"R Burke","year":"2002","unstructured":"Burke R (2002) Hybrid recommender systems: survey and experiments. User Model User-Adap Inter 12:331\u2013370","journal-title":"User Model User-Adap Inter"},{"key":"1542_CR4","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1007\/s00500-016-2407-4","volume":"22","author":"ZQ Cai","year":"2018","unstructured":"Cai ZQ, Hu H (2018) Session-aware music recommendation via a generative model approach. Soft Comput 22:1023\u20131031","journal-title":"Soft Comput"},{"key":"1542_CR5","doi-asserted-by":"crossref","unstructured":"Calero Valdez A, Ziefle M, Verbert K, Felfernig A, Holzinger A (2016) Recommender systems for health informatics: state-of-the-Art and future perspectives. In: Holzinger A (ed) Machine Learning for Health Informatics: State-of-the-Art and Future Challenges, Lecture Notes in Computer Science, Springer International Publishing, pp 391\u2013414","DOI":"10.1007\/978-3-319-50478-0_20"},{"key":"1542_CR6","doi-asserted-by":"crossref","unstructured":"Chaney AJ, Blei DM, Eliassi-Rad T (2015) A probabilistic model for using social networks in personalized item recommendation. In: Proceedings of the 9th ACM Conference on Recommender Systems, RecSys \u201915. ACM, New York, pp 43\u201350","DOI":"10.1145\/2792838.2800193"},{"key":"1542_CR7","doi-asserted-by":"crossref","first-page":"11173","DOI":"10.1007\/s11042-018-6690-1","volume":"78","author":"X Chen","year":"2019","unstructured":"Chen X, He F, Yu H (2019) A matting method based on full feature coverage. Multimed Tools Appl 78:11173\u201311201","journal-title":"Multimed Tools Appl"},{"key":"1542_CR8","doi-asserted-by":"crossref","unstructured":"Chin JY, Zhao K, Joty S, Cong G (2018) ANR: aspect-based neural recommender. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, CIKM \u201918. ACM, New York, pp 147\u2013156","DOI":"10.1145\/3269206.3271810"},{"key":"1542_CR9","doi-asserted-by":"crossref","unstructured":"Covington P, Adams J, Sargin E (2016) Deep neural networks for youtube recommendations. In: Proceedings of the 10th ACM Conference on Recommender Systems, RecSys \u201916. ACM, New York, pp 191\u2013198","DOI":"10.1145\/2959100.2959190"},{"key":"1542_CR10","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/963770.963776","volume":"22","author":"M Deshpande","year":"2004","unstructured":"Deshpande M, Karypis G (2004) Item-based top-n recommendation algorithms. ACM Trans Inf Syst (TOIS) 22:143\u2013177","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"1542_CR11","first-page":"2935","volume":"10","author":"A Gunawardana","year":"2009","unstructured":"Gunawardana A, Shani G (2009) A survey of accuracy evaluation metrics of recommendation tasks. J Mach Learn Res 10:2935\u20132962","journal-title":"J Mach Learn Res"},{"key":"1542_CR12","doi-asserted-by":"crossref","unstructured":"Guo G, Zhang J, Yorke-smith N (2015) trustSVD: collaborative filtering with both the explicit and implicit influence of user trust and of item ratings. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial, Austin, pp 123\u2013129","DOI":"10.1609\/aaai.v29i1.9153"},{"key":"1542_CR13","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1007\/s00500-014-1347-0","volume":"19","author":"L Guo","year":"2015","unstructured":"Guo L, Ma J, Chen Z, Zhong H (2015) Learning to recommend with social contextual information from implicit feedback. Soft Comput 19:1351\u20131362","journal-title":"Soft Comput"},{"key":"1542_CR14","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1214\/009053607000000677","volume":"36","author":"T Hofmann","year":"2008","unstructured":"Hofmann T, Sch\u00f6lkopf B, Smola AJ (2008) Kernel methods in machine learning. Ann Stat 36:1171\u20131220","journal-title":"Ann Stat"},{"key":"1542_CR15","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10617-019-09220-7","volume":"23","author":"N Hou","year":"2019","unstructured":"Hou N, Yan X, He F (2019) A survey on partitioning models, solution algorithms and algorithm parallelization for hardware\/software co-design. Des Autom Embed Syst 23:57\u201377","journal-title":"Des Autom Embed Syst"},{"key":"1542_CR16","doi-asserted-by":"crossref","unstructured":"Hu L, Cao J, Xu G, Cao L, Gu Z, Cao W (2014) Deep modeling of group preferences for group-based recommendation. In: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, AAAI\u201914. AAAI Press, Qu\u00e9bec City, pp 1861\u20131867","DOI":"10.1609\/aaai.v28i1.9007"},{"key":"1542_CR17","doi-asserted-by":"crossref","unstructured":"Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the Fourth ACM Conference on Recommender Systems, RecSys \u201910. ACM, New York, pp 135\u2013142","DOI":"10.1145\/1864708.1864736"},{"key":"1542_CR18","doi-asserted-by":"crossref","unstructured":"Ju C, Wang J, Xu C (2018) A novel application recommendation method combining social relationship and trust relationship for future internet of things Multimedia Tools and Applications","DOI":"10.1007\/s11042-018-6604-2"},{"key":"1542_CR19","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s40708-016-0046-2","volume":"3","author":"P Kieseberg","year":"2016","unstructured":"Kieseberg P, Malle B, Fr\u00fchwirt P, Weippl E, Holzinger A (2016) A tamper-proof audit and control system for the doctor in the loop. Brain Informatics 3:269\u2013279","journal-title":"Brain Informatics"},{"key":"1542_CR20","doi-asserted-by":"crossref","unstructured":"Koren Y (2008) Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201908. ACM, New York, pp 426\u2013434","DOI":"10.1145\/1401890.1401944"},{"key":"1542_CR21","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1721654.1721677","volume":"53","author":"Y Koren","year":"2010","unstructured":"Koren Y (2010) Collaborative filtering with temporal dynamics. Commun ACM 53:89\u201397","journal-title":"Commun ACM"},{"key":"1542_CR22","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.knosys.2016.03.008","volume":"100","author":"J Leng","year":"2016","unstructured":"Leng J, Jiang P (2016) A deep learning approach for relationship extraction from interaction context in social manufacturing paradigm. Knowl-Based Syst 100:188\u2013199","journal-title":"Knowl-Based Syst"},{"key":"1542_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11766-019-3706-1","volume":"34","author":"H Li","year":"2019","unstructured":"Li H, He F, Yan X (2019) IBEA-SVM: an indicator-based evolutionary algorithm based on pre-selection with classification guided by SVM. Applied Mathematics-A Journal of Chinese Universities 34:1\u201326","journal-title":"Applied Mathematics-A Journal of Chinese Universities"},{"key":"1542_CR24","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s11390-017-1764-5","volume":"33","author":"K Li","year":"2018","unstructured":"Li K, He F, Yu H (2018) Robust visual tracking based on convolutional features with illumination and occlusion handing. J Comput Sci Technol 33:223\u2013236","journal-title":"J Comput Sci Technol"},{"issue":"5","key":"1542_CR25","first-page":"1116","volume":"13","author":"K Li","year":"2019","unstructured":"Li K, He F, Yu H, Chen X (2019) A parallel and robust object tracking approach synthesizing adaptive bayesian learning and improved incremental subspace learning. J Parallel Distrib Comput 13(5):1116\u20131135","journal-title":"J Parallel Distrib Comput"},{"key":"1542_CR26","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/s11766-017-3466-8","volume":"32","author":"K Li","year":"2017","unstructured":"Li K, He F, Yu H, Chen X (2017) A correlative classifiers approach based on particle filter and sample set for tracking occluded target. Applied Mathematics-A Journal of Chinese Universities 32:294\u2013312","journal-title":"Applied Mathematics-A Journal of Chinese Universities"},{"key":"1542_CR27","doi-asserted-by":"crossref","first-page":"100963","DOI":"10.1016\/j.aei.2019.100963","volume":"42","author":"Y Liang","year":"2019","unstructured":"Liang Y, He F, Li H (2019) An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model. Adv Eng Inform 42:100963","journal-title":"Adv Eng Inform"},{"key":"1542_CR28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.dss.2015.03.008","volume":"74","author":"J Lu","year":"2015","unstructured":"Lu J, Wu D, Mao M, Wang W, Zhang G (2015) Recommender system application developments: a survey. Decis Support Syst 74:12\u201332","journal-title":"Decis Support Syst"},{"key":"1542_CR29","first-page":"1291","volume":"23","author":"J Luo","year":"2019","unstructured":"Luo J, He F, Yong J (2019) An efficient and robust bat algorithm with fusion of opposition-based learning and whale optimization algorithm. Intelligent Data Analysis 23:1291\u20131308","journal-title":"Intelligent Data Analysis"},{"key":"1542_CR30","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.jpdc.2019.05.005","volume":"132","author":"X Lv","year":"2019","unstructured":"Lv X, He F, Cai W, Cheng Y (2019) An optimized RGA supporting selective undo for collaborative text editing systems. J Parallel Distrib Comput 132:310\u2013330","journal-title":"J Parallel Distrib Comput"},{"key":"1542_CR31","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.future.2017.11.046","volume":"28","author":"X Lv","year":"2018","unstructured":"Lv X, He F, Cai W, Cheng Y (2018) Supporting selective undo of string-wise operations for collaborative editing systems. Futur Gener Comput Syst 28:41\u201362","journal-title":"Futur Gener Comput Syst"},{"key":"1542_CR32","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.future.2019.05.021","volume":"100","author":"X Lv","year":"2019","unstructured":"Lv X, He F, Yan X, Wu Y, Cheng Y (2019) Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems. Futur Gener Comput Syst 100:473\u2013497","journal-title":"Futur Gener Comput Syst"},{"key":"1542_CR33","doi-asserted-by":"crossref","unstructured":"Ma H (2014) On measuring social friend interest similarities in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR \u201914. ACM, New York, pp 465\u2013474","DOI":"10.1145\/2600428.2609635"},{"key":"1542_CR34","doi-asserted-by":"crossref","unstructured":"Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble. In: Proceedings of the 32Nd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201909. ACM, New York, pp 203\u2013210","DOI":"10.1145\/1571941.1571978"},{"key":"1542_CR35","doi-asserted-by":"crossref","unstructured":"Ma H, Yang H, Lyu MR, King I (2008) SoRec: social recommendation using probabilistic matrix factorization. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM \u201908. ACM, New York, pp 931\u2013940","DOI":"10.1145\/1458082.1458205"},{"key":"1542_CR36","doi-asserted-by":"crossref","unstructured":"Ma H, Zhou D, Liu C, Lyu MR, King I (2011) Recommender systems with Social Regularization. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM \u201911. ACM, New York, pp 287\u2013296","DOI":"10.1145\/1935826.1935877"},{"key":"1542_CR37","first-page":"9","volume":"29","author":"H Ma","year":"2011","unstructured":"Ma H, Zhou TC, Lyu MR, King I (2011) Improving recommender systems by incorporating social contextual information. ACM Trans Inf Syst (TOIS) 29:9","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"1542_CR38","unstructured":"Mnih A, Salakhutdinov RR (2008) Probabilistic matrix factorization. In: Platt JC, Koller D, Singer Y, Roweis ST (eds) Advances in Neural Information Processing Systems 20, Curran Associates, Inc, pp 1257\u20131264"},{"key":"1542_CR39","doi-asserted-by":"crossref","unstructured":"P\u00e1lovics R, Bencz\u00far AA, Kocsis L, Kiss T, Frig\u00f3 E (2014) Exploiting temporal influence in online recommendation. In: Proceedings of the 8th ACM Conference on Recommender Systems, ACM, pp. 273\u2013280","DOI":"10.1145\/2645710.2645723"},{"key":"1542_CR40","doi-asserted-by":"crossref","unstructured":"Pan Y, He F, Yu H (2018) An adaptive method to learn directive trust strength for trust-aware recommender systems. In: 2018 IEEE 22Nd International Conference on Computer Supported Cooperative Work in design (CSCWD), pp 10\u201316","DOI":"10.1109\/CSCWD.2018.8465255"},{"key":"1542_CR41","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.neucom.2018.12.025","volume":"332","author":"Y Pan","year":"2019","unstructured":"Pan Y, He F, Yu H (2019) A novel enhanced collaborative autoencoder with knowledge distillation for top-N recommender systems. Neurocomputing 332:137\u2013148","journal-title":"Neurocomputing"},{"key":"1542_CR42","doi-asserted-by":"publisher","unstructured":"Pan Y, He F, Yu H, Li H A correlative denoising autoencoder to model social influence for Top-N Recommender System. Frontiers of Computer Science. https:\/\/doi.org\/10.1007\/s11704-019-8123-3","DOI":"10.1007\/s11704-019-8123-3"},{"key":"1542_CR43","doi-asserted-by":"crossref","unstructured":"Rafailidis D, Crestani F (2016) Collaborative ranking with Social Relationships for top-N recommendations. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201916. ACM, New York, pp 785\u2013788","DOI":"10.1145\/2911451.2914711"},{"key":"1542_CR44","unstructured":"Rendle S, Freudenthaler C, Gantner Z, Schmidt-Thieme L (2009) BPR: bayesian personalized ranking from implicit feedback. In: Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI \u201909. AUAI Press, Arlington, pp 452\u2013461"},{"key":"1542_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4899-7637-6","volume-title":"Recommender Systems Handbook","author":"Francesco Ricci","year":"2015","unstructured":"Ricci F, Rokach L, Shapira B (2015) Recommender systems: introduction and challenges. In: Ricci F, Rokach L, Shapira B (eds) Recommender Systems Handbook. Springer, Boston, pp 1\u201334"},{"key":"1542_CR46","doi-asserted-by":"crossref","unstructured":"Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web, WWW \u201901. ACM, New York, pp 285\u2013295","DOI":"10.1145\/371920.372071"},{"key":"1542_CR47","doi-asserted-by":"crossref","first-page":"8289","DOI":"10.1007\/s00500-017-2774-5","volume":"22","author":"T Shanmuigapriya","year":"2018","unstructured":"Shanmuigapriya T, Swamynathan S (2018) Reliability score inference and recommendation using fuzzy-based technique for social media applications. Soft Comput 22:8289\u2013 8300","journal-title":"Soft Comput"},{"key":"1542_CR48","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s11766-016-3378-z","volume":"31","author":"J Sun","year":"2016","unstructured":"Sun J, He F, Chen Y, Chen X (2016) A multiple template approach for robust tracking of fast motion target. Applied Mathematics-A Journal of Chinese Universities 31:177\u2013197","journal-title":"Applied Mathematics-A Journal of Chinese Universities"},{"key":"1542_CR49","doi-asserted-by":"crossref","unstructured":"Tang J, Gao H, Hu X, Liu H (2013) Exploiting homophily effect for trust prediction, ACM, New York","DOI":"10.1145\/2433396.2433405"},{"key":"1542_CR50","doi-asserted-by":"crossref","unstructured":"Tang J, Gao H, Liu H (2012) mTrust: discerning multi-faceted trust in a connected world. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, WSDM \u201912. ACM, New York, pp 93\u2013102","DOI":"10.1145\/2124295.2124309"},{"key":"1542_CR51","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1007\/s13278-013-0141-9","volume":"3","author":"J Tang","year":"2013","unstructured":"Tang J, Hu X, Liu H (2013) Social recommendation: a review. Soc Netw Anal Min 3:1113\u20131133","journal-title":"Soc Netw Anal Min"},{"key":"1542_CR52","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s00500-017-2720-6","volume":"22","author":"JK Tarus","year":"2018","unstructured":"Tarus JK, Niu Z, Kalui D (2018) A hybrid recommender system for e-learning based on context awareness and sequential pattern mining. Soft Comput 22:2449\u20132461","journal-title":"Soft Comput"},{"key":"1542_CR53","doi-asserted-by":"crossref","unstructured":"Wang C, Blei DM (2011) Collaborative topic modeling for recommending scientific articles. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp 448\u2013456","DOI":"10.1145\/2020408.2020480"},{"key":"1542_CR54","doi-asserted-by":"crossref","unstructured":"Wang H, Zhang P, Lu T, Gu H, Gu N (2017) Hybrid recommendation model based on incremental collaborative filtering and content-based algorithms. In: 2017 IEEE 21St International Conference on Computer Supported Cooperative Work in design (CSCWD), pp 337\u2013342","DOI":"10.1109\/CSCWD.2017.8066717"},{"key":"1542_CR55","doi-asserted-by":"crossref","first-page":"3981","DOI":"10.1007\/s00500-015-1734-1","volume":"20","author":"M Wang","year":"2016","unstructured":"Wang M, Ma J (2016) A novel recommendation approach based on users\u2019 weighted trust relations and the rating similarities. Soft Comput 20:3981\u20133990","journal-title":"Soft Comput"},{"key":"1542_CR56","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.knosys.2018.01.003","volume":"145","author":"H Wu","year":"2018","unstructured":"Wu H, Zhang Z, Yue K, Zhang B, He J, Sun L (2018) Dual-regularized matrix factorization with deep neural networks for recommender systems. Knowl-Based Syst 145:46\u201358","journal-title":"Knowl-Based Syst"},{"key":"1542_CR57","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1109\/TSC.2015.2501981","volume":"11","author":"Y Wu","year":"2018","unstructured":"Wu Y, He F, Zhang D, Li X (2018) Service-oriented feature-based data exchange for cloud-based design and manufacturing. IEEE Trans Serv Comput 11:341\u2013353","journal-title":"IEEE Trans Serv Comput"},{"key":"1542_CR58","doi-asserted-by":"crossref","first-page":"6785","DOI":"10.1007\/s00500-018-3406-4","volume":"22","author":"Y Xiao","year":"2018","unstructured":"Xiao Y, Wang G, Hsu CH, Wang H (2018) A time-sensitive personalized recommendation method based on probabilistic matrix factorization technique. Soft Comput 22:6785\u20136796","journal-title":"Soft Comput"},{"key":"1542_CR59","first-page":"27","volume":"1741001","author":"X Yan","year":"2018","unstructured":"Yan X, He F, Hou N, Ai H (2018) An efficient particle swarm optimization for large-scale hardware\/software co-design system. International Journal of Cooperative Information Systems 1741001:27","journal-title":"International Journal of Cooperative Information Systems"},{"key":"1542_CR60","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1109\/TPAMI.2016.2605085","volume":"39","author":"B Yang","year":"2017","unstructured":"Yang B, Lei Y, Liu J, Li W (2017) Social Collaborative Filtering by trust. IEEE Trans Pattern Anal Mach Intell 39:1633\u20131647","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1542_CR61","doi-asserted-by":"crossref","unstructured":"Yao W, He J, Huang G, Zhang Y (2014) Modeling dual role preferences for trust-aware recommendation. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR \u201914. ACM, New York, pp 975\u2013978","DOI":"10.1145\/2600428.2609488"},{"key":"1542_CR62","doi-asserted-by":"crossref","first-page":"776","DOI":"10.2991\/ijcis.2017.10.1.52","volume":"10","author":"R Yera","year":"2017","unstructured":"Yera R, Mart\u00ednez L (2017) Fuzzy tools in recommender systems: a survey. International Journal of Computational Intelligence Systems 10:776\u2013803","journal-title":"International Journal of Computational Intelligence Systems"},{"issue":"4","key":"1542_CR63","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/s11766-019-3714-1","volume":"34","author":"Jia-shi Yong","year":"2019","unstructured":"Yong J, He F, Li H, Zhou W A Novel Bat Algorithm based on Cross Boundary Learning and Uniform Explosion Strategy. Applied Mathematics-A Journal of Chinese Universities. https:\/\/doi.org\/10.1007\/s11766-019-3714-1","journal-title":"Applied Mathematics-A Journal of Chinese Universities"},{"key":"1542_CR64","doi-asserted-by":"crossref","first-page":"24097","DOI":"10.1007\/s11042-018-5697-y","volume":"77","author":"H Yu","year":"2018","unstructured":"Yu H, He F, Pan Y (2018) A novel region-based active contour model via local patch similarity measure for image segmentation. Multimed Tools Appl 77:24097\u201324119","journal-title":"Multimed Tools Appl"},{"key":"1542_CR65","doi-asserted-by":"crossref","first-page":"11779","DOI":"10.1007\/s11042-018-6735-5","volume":"78","author":"H Yu","year":"2019","unstructured":"Yu H, He F, Pan Y (2019) A novel segmentation model for medical images with intensity inhomogeneity based on adaptive perturbation. Multimed Tools Appl 78:11779\u201311798","journal-title":"Multimed Tools Appl"},{"key":"1542_CR66","doi-asserted-by":"crossref","unstructured":"Yu L, Pan R, Li Z (2011) Adaptive social similarities for recommender systems. In: Proceedings of the Fifth ACM Conference on Recommender Systems, ACM, pp 257\u2013260","DOI":"10.1145\/2043932.2043978"},{"key":"1542_CR67","doi-asserted-by":"publisher","unstructured":"Zhang S, He F, Ren W, Yao J Joint learning of image detail and transmission map for single image dehazing. The Visual Computer. https:\/\/doi.org\/10.1007\/s00371-018-1612-9","DOI":"10.1007\/s00371-018-1612-9"},{"key":"1542_CR68","doi-asserted-by":"crossref","unstructured":"Zhao T, McAuley J, King I (2014) Leveraging social connections to improve personalized ranking for collaborative filtering. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM \u201914. ACM, New York, pp 261\u2013270","DOI":"10.1145\/2661829.2661998"},{"key":"1542_CR69","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10115-015-0897-5","volume":"49","author":"WX Zhao","year":"2016","unstructured":"Zhao WX, Li S, He Y, Wang L, Wen JR, Li X (2016) Exploring demographic information in social media for product recommendation. Knowl Inf Syst 49:61\u201389","journal-title":"Knowl Inf Syst"},{"key":"1542_CR70","doi-asserted-by":"crossref","unstructured":"Zhao XW, Guo Y, He Y, Jiang H, Wu Y, Li X (2014) We Know What You Want to buy: a demographic-based system for product recommendation on microblogs. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201914. ACM, New York, pp 1935\u20131944","DOI":"10.1145\/2623330.2623351"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-019-01542-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-019-01542-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-019-01542-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T12:48:43Z","timestamp":1664023723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-019-01542-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,24]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1542"],"URL":"https:\/\/doi.org\/10.1007\/s10489-019-01542-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,24]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Yiteng Pan declares that he has no conflict of interest. Fazhi He declares that he has no conflict of interest. Haiping Yu declares that she has no conflict of interest. Haoran Li declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}