{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:18:29Z","timestamp":1769102309407,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,6,27]],"date-time":"2015-06-27T00:00:00Z","timestamp":1435363200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11042-015-2732-0","type":"journal-article","created":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T05:50:45Z","timestamp":1435297845000},"page":"11585-11602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Social recommendation based on trust and influence in SNS environments"],"prefix":"10.1007","volume":"76","author":[{"given":"Weimin","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhengbo","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Minjun","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,27]]},"reference":[{"key":"2732_CR1","doi-asserted-by":"publisher","unstructured":"Anand SS, Griffiths N (2011) A market-based approach to address the new item problem. In: Proceedings of the 5th ACM conference on recommender systems. New York, NY, USA, p 205\u2013212","DOI":"10.1145\/2043932.2043970"},{"key":"2732_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/s10550-006-0080-3","volume":"24","author":"P Bonhard","year":"2006","unstructured":"Bonhard P, Sasse MA (2006) \u201cKnowingme knowing you\u201d\u2014using profiles and social networking to improve recommender systems. BT Technol J 24:84\u201398","journal-title":"BT Technol J"},{"key":"2732_CR3","doi-asserted-by":"crossref","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi K (2010) Measuring user influence in twitter: the million follower fallacy. In: Proceedings of international AAAI conference on weblogs and social media (ICWSM), p 10\u201317","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"2732_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1023\/A:1007369909943","volume":"27","author":"M FabPazzani","year":"1997","unstructured":"FabPazzani M, Billsus D (1997) Learning and revising user profiles: the identification of interesting web sites. Mach Learn 27:313\u2013331","journal-title":"Mach Learn"},{"key":"2732_CR5","unstructured":"Gayo-Avello D, Brenes DJ (2010) Overcoming spammers in twitter-a tale of five algorithms, Spanish conference on information retrieval (CERI)"},{"issue":"12","key":"2732_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/138859.138867","volume":"35","author":"D Goldberg","year":"1992","unstructured":"Goldberg D, Nichols D, Oki BM, Terry D (1992) Using collaborative filtering to weave an information tapestry. Commun ACM 35(12):61\u201370","journal-title":"Commun ACM"},{"issue":"6","key":"2732_CR7","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am J Sociol 78(6):1360\u20131380","journal-title":"Am J Sociol"},{"key":"2732_CR8","doi-asserted-by":"publisher","unstructured":"Guha R, Kumar R, Raghavan P et al (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on world wide web, p 403\u2013412","DOI":"10.1145\/988672.988727"},{"key":"2732_CR9","doi-asserted-by":"crossref","unstructured":"Guy I, Ronen I, Wilcox E (2009) Do you know?: recommending people to invite into your social network. In: Proceedings of the 14th international conference on intelligent user interfaces, p 77\u201386","DOI":"10.1145\/1502650.1502664"},{"key":"2732_CR10","volume-title":"A social network-based recommender system (SNRS)","author":"J He","year":"2010","unstructured":"He J, Chu WW (2010) A social network-based recommender system (SNRS). Springer, US"},{"issue":"1","key":"2732_CR11","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/963770.963775","volume":"22","author":"Z Huang","year":"2004","unstructured":"Huang Z, Chen H, Zeng D (2004) Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans Inf Syst 22(1):116\u2013142","journal-title":"ACM Trans Inf Syst"},{"key":"2732_CR12","doi-asserted-by":"publisher","unstructured":"Huang J, Cheng X-Q, Shen H-W, Zhou T, Jin X (2012) Exploring social influence via posterior effect of word-of-mouth recommendations. In: Proceedings of the fifth ACM international conference on web search and data mining","DOI":"10.1145\/2124295.2124365"},{"key":"2732_CR13","doi-asserted-by":"publisher","unstructured":"Jamali M, Ester M (2009) Trustwalker: a random walk model for combining trustbased and item-based recommendation. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, p 397\u2013406","DOI":"10.1145\/1557019.1557067"},{"key":"2732_CR14","doi-asserted-by":"publisher","unstructured":"Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on recommender systems. ACM, p 135\u2013142","DOI":"10.1145\/1864708.1864736"},{"key":"2732_CR15","unstructured":"Jebrin AS, Williams MA. Credibility-aware web-based social network recommender: follow the leader. In: Proceedings of the 2nd ACM RecSys\u201910 workshop on recommender system and the social web, Barcelona, p 1\u20138"},{"key":"2732_CR16","unstructured":"J\u00f8ang A, Quattrochicchi W, Karabeg D (2011) Taste and trust. In: Trust management V, p 312\u2013322"},{"key":"2732_CR17","doi-asserted-by":"publisher","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, p 137\u2013146","DOI":"10.1145\/956750.956769"},{"issue":"1","key":"2732_CR18","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.elerap.2009.08.004","volume":"9","author":"HN Kim","year":"2010","unstructured":"Kim HN, Ji AT, Ha I, Jo GS (2010) Collaborative filtering based on collaborative tagging for enhancing the quality of recommendation. Electron Commer Res Appl 9(1):73\u201383","journal-title":"Electron Commer Res Appl"},{"issue":"3","key":"2732_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.elerap.2011.06.003","volume":"11","author":"HW Kim","year":"2012","unstructured":"Kim HW, Xu Y, Gupta S (2012) Which is more important in internet shopping, perceived price or trust? Electron Commer Res Appl 11(3):241\u2013252","journal-title":"Electron Commer Res Appl"},{"key":"2732_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-0-387-09428-1_8","volume-title":"Trust Management II","author":"N Lathia","year":"2008","unstructured":"Lathia N, Hailes S, Capra L (2008) Trust-based collaborative filtering. In: Karabulut Y, Mitchell J, Herrmann P, Jensen C (eds) Trust Management II. Springer, Boston, pp 119\u2013134"},{"issue":"1","key":"2732_CR21","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dss.2010.12.007","volume":"51","author":"F Li","year":"2011","unstructured":"Li F, Du TC (2011) Who is talking? An ontology-based opinion leader identification framework for word-of-mouth marketing in online social blogs. Decis Support Syst 51(1):190\u2013197","journal-title":"Decis Support Syst"},{"key":"2732_CR22","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.ijhcs.2011.06.001","volume":"69","author":"D-R Liu","year":"2011","unstructured":"Liu D-R, Lai C-H, Chiu H (2011) Sequence-based trust in collaborative filtering for document recommendation. Int J Hum\u2013Comput Stud 69:587\u2013601","journal-title":"Int J Hum\u2013Comput Stud"},{"issue":"1","key":"2732_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2012.02.006","volume":"519","author":"L L\u00fc","year":"2012","unstructured":"L\u00fc L, Medo M, Yeung CH et al (2012) Recommender systems. Phys Rep 519(1):1\u201349","journal-title":"Phys Rep"},{"key":"2732_CR24","doi-asserted-by":"publisher","unstructured":"Massa P, Avesani P (2007) Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on recommender systems, p 17\u201324","DOI":"10.1145\/1297231.1297235"},{"key":"2732_CR25","first-page":"61","volume":"1","author":"S Milgram","year":"1967","unstructured":"Milgram S (1967) The small world problem. Psychol Today 1:61\u201367","journal-title":"Psychol Today"},{"key":"2732_CR26","unstructured":"Netflix.URL[EB\/OL] http:\/\/www.netflix.com"},{"issue":"3","key":"2732_CR27","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/j.joi.2014.06.005","volume":"8","author":"M Nykl","year":"2014","unstructured":"Nykl M, Je\u017eek K, Fiala D, Dostal M (2014) PageRank variants in the evaluation of citation networks. J Informetrics 8(3):683\u2013692","journal-title":"J Informetrics"},{"key":"2732_CR28","doi-asserted-by":"publisher","unstructured":"O\u2019Donovan J, Smyth B (2005) Trust in recommender systems. In: Proceedings of the 10th international conference on intelligent user interfaces. ACM, San Diego, California, USA, p 167\u2013174","DOI":"10.1145\/1040830.1040870"},{"key":"2732_CR29","unstructured":"Paterek A (2007) Improving regularized singular value decomposition for collaborative filtering. In: KDD-cup and workshop. ACM press"},{"key":"2732_CR30","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-72079-9_10","volume-title":"The adaptive web","author":"M Pazzani","year":"2007","unstructured":"Pazzani M, Billsus D (2007) Content-based recommendation systems. In: Brusilovsky P, Kobsa A, Nejdl W (eds) The adaptive web. Springer, Berlin, pp 325\u2013341"},{"key":"2732_CR31","doi-asserted-by":"crossref","unstructured":"Sarwar B, Karypis G, Konstan J, Riedl J (2000) Application of dimensionality reduction in recommender system-a case study. Minnesota Univ Minneapolis Dept of Computer Science","DOI":"10.21236\/ADA439541"},{"key":"2732_CR32","doi-asserted-by":"publisher","unstructured":"Singla P, Richardson M (2008) Yes, there is a correlation: from social networks to personal behavior on the web. In: Proceedings of the 17th international conference on world wide web, p 655\u2013664","DOI":"10.1145\/1367497.1367586"},{"key":"2732_CR33","doi-asserted-by":"publisher","unstructured":"Song X, Tseng BL, Lin C-Y, Sun M-T (2006) Personalized recommendation driven by information flow. In: SIGIR \u201906: proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval, p 509\u2013516","DOI":"10.1145\/1148170.1148258"},{"key":"2732_CR34","doi-asserted-by":"publisher","unstructured":"Tang J, Chang Y, Liu H (2014) Mining social media with social theories: a survey. ACM SIGKDD Explor Newsl 15(2):20\u201329","DOI":"10.1145\/2641190.2641195"},{"issue":"1","key":"2732_CR35","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MIS.2011.22","volume":"26","author":"P Victor","year":"2012","unstructured":"Victor P, Cornelis C, De Cock M et al (2012) Trust- and distrust-based recommendations for controversial reviews. IEEE Intell Syst 26(1):48\u201355","journal-title":"IEEE Intell Syst"},{"key":"2732_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/0-306-47815-3_5","volume-title":"A practical approach to microarray data analysis","author":"ME Wall","year":"2003","unstructured":"Wall ME, Rechtsteiner A, Rocha LM (2003) Singular value decomposition and principal component analysis. In: Berrar DP, Dubitzky W, Granzow M (eds) A practical approach to microarray data analysis. Kluwer, Norwell, pp 91\u2013109"},{"key":"2732_CR37","unstructured":"Qiao XQ, Yang C, Li XF, Chen JL (2011) A trust calculating algorithm based on social networking service users\u2019 context. Chin J Comput 34(12):2403\u20132413"},{"key":"2732_CR38","unstructured":"Yang B, Zhao P, Ping S, Huang J (2012) Improving the recommendation of collaborative filtering by fusing trust network, computational intelligence and security (CIS), In: Proceedings of 2012 Eighth International Conference on. IEEE, p 195\u2013199"},{"issue":"1","key":"2732_CR39","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TKDE.2004.1264822","volume":"16","author":"K Yu","year":"2004","unstructured":"Yu K, Schwaighofer A, Tresp V, Xiaowei X, Kriegel H-P (2004) Probabilistic memory-based collaborative filtering. IEEE Trans Knowl Data Eng 16(1):56\u201369","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2732_CR40","unstructured":"Yuan Q, Zhao S, Chen L, Liu Y, Ding S, Zhang X, Zheng W (2009) Augmenting collaborative recommender by fusing explicit social relationships. In: Proceedings of workshop on recommender systems and the social web, p 49\u201356"},{"key":"2732_CR41","doi-asserted-by":"publisher","unstructured":"Ziegler C, Lausen G (2004) Analyzing correlation between trust and user similarity in online communities. In: Trust management, p 251\u2013265","DOI":"10.1007\/978-3-540-24747-0_19"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2732-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2732-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2732-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2732-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T20:12:06Z","timestamp":1691784726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2732-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,27]]},"references-count":41,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["2732"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2732-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,27]]}}}