{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T21:18:43Z","timestamp":1761167923411,"version":"build-2065373602"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T00:00:00Z","timestamp":1538438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572119"],"award-info":[{"award-number":["61572119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61622202"],"award-info":[{"award-number":["61622202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732003"],"award-info":[{"award-number":["61732003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61729201"],"award-info":[{"award-number":["61729201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61702086"],"award-info":[{"award-number":["61702086"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1401256"],"award-info":[{"award-number":["U1401256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["N150402005"],"award-info":[{"award-number":["N150402005"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["N171904007"],"award-info":[{"award-number":["N171904007"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s12559-018-9600-y","type":"journal-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T02:40:44Z","timestamp":1538448044000},"page":"965-979","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Trust-Aware Personalized Route Query Using Extreme Learning Machine in Location-Based Social Networks"],"prefix":"10.1007","volume":"10","author":[{"given":"Yuliang","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0247-9866","authenticated-orcid":false,"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,2]]},"reference":[{"key":"9600_CR1","first-page":"6","volume":"27","author":"J Adwereboamah","year":"2015","unstructured":"Adwereboamah J, Hufstedler S. Predicting social trust with binary logistic regression. Research in Higher Education Journal 2015;27:6.","journal-title":"Research in Higher Education Journal"},{"issue":"2","key":"9600_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","volume":"25","author":"U Brandes","year":"2001","unstructured":"Brandes U. A faster algorithm for betweenness centrality. J Math Sociol 2001;25(2):163\u2013177.","journal-title":"J Math Sociol"},{"issue":"1","key":"9600_CR3","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/s12559-014-9279-7","volume":"7","author":"K Cao","year":"2015","unstructured":"Cao K, Wang G, Han D, Ning J, Zhang X. Classification of uncertain data streams based on extreme learning machine. Cogn Comput 2015;7(1):150\u2013160.","journal-title":"Cogn Comput"},{"issue":"11","key":"9600_CR4","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.14778\/2350229.2350234","volume":"5","author":"X Cao","year":"2012","unstructured":"Cao X, Chen L, Cong G, Xiao X. Keyword-aware optimal route search. Proceedings of the VLDB Endowment 2012;5(11):1136\u20131147.","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"3","key":"9600_CR5","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V. Support-vector networks. Mach Learn 1995;20(3):273\u2013297.","journal-title":"Mach Learn"},{"issue":"4","key":"9600_CR6","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s11280-015-0352-2","volume":"19","author":"J Dai","year":"2016","unstructured":"Dai J, Liu C, Xu J, Ding Z. On personalized and sequenced route planning. World Wide Web 2016; 19(4):679\u2013705.","journal-title":"World Wide Web"},{"key":"9600_CR7","unstructured":"Deng C, Wang S, Li Z, Huang GB, Lin W. 2017. Content-insensitive blind image blurriness assessment using weibull statistics and sparse extreme learning machine. IEEE Trans Syst Man Cybern: Syst."},{"issue":"6","key":"9600_CR8","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1007\/s12559-017-9494-0","volume":"9","author":"L Duan","year":"2017","unstructured":"Duan L, Bao M, Cui S, Qiao Y, Miao J. Motor imagery eeg classification based on kernel hierarchical extreme learning machine. Cogn Comput 2017;9(6):758\u2013765.","journal-title":"Cogn Comput"},{"key":"9600_CR9","doi-asserted-by":"crossref","unstructured":"Falcone R, Castelfranchi C. Social trust: a cognitive approach. Trust and deception in virtual societies, p. 55\u201390. Springer; 2001.","DOI":"10.1007\/978-94-017-3614-5_3"},{"issue":"6","key":"9600_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"RW Floyd","year":"1962","unstructured":"Floyd RW. Algorithm 97: shortest path. Commun ACM 1962;5(6):345.","journal-title":"Commun ACM"},{"issue":"1","key":"9600_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC. A set of measures of centrality based on betweenness. Sociometry 1977;40(1):35\u201341.","journal-title":"Sociometry"},{"issue":"4","key":"9600_CR12","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/1183463.1183470","volume":"6","author":"J Golbeck","year":"2006","unstructured":"Golbeck J, Hendler J. Inferring binary trust relationships in web-based social networks. ACM Trans Internet Technol (TOIT) 2006;6(4):497\u2013529.","journal-title":"ACM Trans Internet Technol (TOIT)"},{"key":"9600_CR13","doi-asserted-by":"crossref","unstructured":"Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. Proceedings of the 13th international conference on World Wide Web. p. 403\u2013412. ACM; 2004.","DOI":"10.1145\/988672.988727"},{"issue":"4","key":"9600_CR14","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s12559-017-9474-4","volume":"9","author":"T Guo","year":"2017","unstructured":"Guo T, Zhang L, Tan X. Neuron pruning-based discriminative extreme learning machine for pattern classification. Cogn Comput 2017;9(4):581\u2013595.","journal-title":"Cogn Comput"},{"key":"9600_CR15","doi-asserted-by":"crossref","unstructured":"Gutierrez-Garcia JO, Lpez-Neri E. Cognitive computing: a brief survey and open research challenges. International conference on applied computing and information technology\/ international conference on computational science and intelligence. p. 328\u2013333; 2015.","DOI":"10.1109\/ACIT-CSI.2015.64"},{"key":"9600_CR16","unstructured":"Hang CW, Wang Y, Singh MP. Operators for propagating trust and their evaluation in social networks. Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2. p. 1025\u20131032. International Foundation for Autonomous Agents and Multiagent Systems; 2009."},{"key":"9600_CR17","doi-asserted-by":"crossref","unstructured":"Heinermann J, Kramer O. 2014. Precise wind power prediction with SVM ensemble regression springer international publishing.","DOI":"10.1007\/978-3-319-11179-7_100"},{"issue":"4","key":"9600_CR18","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"GB Huang","year":"2006","unstructured":"Huang GB, Chen L, Siew CK, et al. Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Networks 2006;17(4):879\u2013892.","journal-title":"IEEE Trans Neural Networks"},{"key":"9600_CR19","doi-asserted-by":"crossref","unstructured":"Huang GB, Siew CK. Extreme learning machine: Rbf network case. Control, automation, robotics and vision conference, 2004. ICARCV 2004 8th. vol. 2, p. 1029\u20131036. IEEE; 2004.","DOI":"10.1109\/ICARCV.2004.1468985"},{"issue":"2","key":"9600_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"GB Huang","year":"2011","unstructured":"Huang GB, Wang DH, Lan Y. Extreme learning machines: a survey. International Journal of Machine Learning and Cybernetics 2011;2(2):107\u2013122.","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"9600_CR21","unstructured":"Huang GB, Zhu QY, Siew CK. Extreme learning machine: a new learning scheme of feedforward neural networks. IEEE international joint conference on Neural networks, 2004. Proceedings. 2004. vol. 2, p. 985\u2013990. IEEE; 2004."},{"issue":"1","key":"9600_CR22","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing 2006; 70(1):489\u2013501.","journal-title":"Neurocomputing"},{"key":"9600_CR23","doi-asserted-by":"crossref","unstructured":"Jamali M, Ester M. Trustwalker: a random walk model for combining trust-based and item-based recommendation. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. p. 397\u2013406. ACM; 2009.","DOI":"10.1145\/1557019.1557067"},{"key":"9600_CR24","doi-asserted-by":"crossref","unstructured":"Jamali M, Ester M. A matrix factorization technique with trust propagation for recommendation in social networks. ACM Conference on recommender systems, p. 135\u2013142; 2010.","DOI":"10.1145\/1864708.1864736"},{"key":"9600_CR25","doi-asserted-by":"crossref","unstructured":"Kurashima T, Iwata T, Irie G, Fujimura K. Travel route recommendation using geotags in photo sharing sites. Proceedings of the 19th ACM international conference on Information and knowledge management, p. 579\u2013588. ACM; 2010.","DOI":"10.1145\/1871437.1871513"},{"key":"9600_CR26","doi-asserted-by":"crossref","unstructured":"Li F, Cheng D, Hadjieleftheriou M, Kollios G, Teng SH. On trip planning queries in spatial databases. International symposium on spatial and temporal databases, p. 273\u2013290. Springer; 2005.","DOI":"10.1007\/11535331_16"},{"key":"9600_CR27","doi-asserted-by":"crossref","unstructured":"Liu G, Wang Y, Orgun MA, Liu H. Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks. 2012 IEEE 19th international conference on web services (ICWS). p. 384\u2013391. IEEE; 2012.","DOI":"10.1109\/ICWS.2012.47"},{"issue":"4","key":"9600_CR28","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s12559-017-9455-7","volume":"9","author":"N Liu","year":"2017","unstructured":"Liu N, Sakamoto JT, Cao J, Koh ZX, Ho AFW, Lin Z, Ong MEH. Ensemble-based risk scoring with extreme learning machine for prediction of adverse cardiac events. Cogn Comput 2017;9(4):545\u2013554.","journal-title":"Cogn Comput"},{"issue":"6","key":"9600_CR29","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1007\/s12559-017-9504-2","volume":"9","author":"W Mao","year":"2017","unstructured":"Mao W, Jiang M, Wang J, Li Y. Online extreme learning machine with hybrid sampling strategy for sequential imbalanced data. Cogn Comput 2017;9(6):780\u2013800.","journal-title":"Cogn Comput"},{"issue":"1","key":"9600_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro G. A guided tour to approximate string matching. ACM Comput. Surv. 2001;33(1):31\u201388.","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"9600_CR31","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s12559-016-9440-6","volume":"9","author":"L Oneto","year":"2017","unstructured":"Oneto L, Bisio F, Cambria E, Anguita D. Slt-based elm for big social data analysis. Cogn Comput 2017;9(2):259\u2013274.","journal-title":"Cogn Comput"},{"key":"9600_CR32","doi-asserted-by":"crossref","unstructured":"Scott J. 2012. Social network analysis. Sage.","DOI":"10.1007\/978-1-4614-1800-9_178"},{"key":"9600_CR33","doi-asserted-by":"crossref","unstructured":"Tang M, Xu Y, Liu J, Zheng Z, Liu X. Trust-aware service recommendation via exploiting social networks. IEEE International conference on services computing, p. 376\u2013383; 2013.","DOI":"10.1109\/SCC.2013.15"},{"issue":"1","key":"9600_CR34","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s12559-008-9001-8","volume":"1","author":"JG Taylor","year":"2009","unstructured":"Taylor JG. Cognitive computation. Cogn Comput 2009;1(1):4\u201316.","journal-title":"Cogn Comput"},{"issue":"1","key":"9600_CR35","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10458-007-9021-x","volume":"16","author":"FE Walter","year":"2008","unstructured":"Walter FE, Battiston S, Schweitzer F. A model of a trust-based recommendation system on a social network. Auton Agent Multi-Agent Syst 2008;16(1):57\u201374.","journal-title":"Auton Agent Multi-Agent Syst"},{"issue":"1","key":"9600_CR36","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/s12559-016-9435-3","volume":"9","author":"B Wang","year":"2017","unstructured":"Wang B, Zhu R, Luo S, Yang X, Wang G. H-mrst: a novel framework for supporting probability degree range query using extreme learning machine. Cogn Comput 2017;9(1):68\u201380.","journal-title":"Cogn Comput"},{"key":"9600_CR37","doi-asserted-by":"crossref","unstructured":"Wang H, Hernandez JM, Van MP. Betweenness centrality in a weighted network. Phys Rev E Stat Nonlin Soft Matter Phys 2008;77(4 Pt 2):046105.","DOI":"10.1103\/PhysRevE.77.046105"},{"issue":"1","key":"9600_CR38","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TCYB.2015.2512852","volume":"47","author":"S Wang","year":"2017","unstructured":"Wang S, Deng C, Lin W, Huang GB, Zhao B. Nmf-based image quality assessment using extreme learning machine. IEEE transactions on cybernetics 2017;47(1):232\u2013243.","journal-title":"IEEE transactions on cybernetics"},{"key":"9600_CR39","doi-asserted-by":"crossref","unstructured":"Wang Y, Varadharajan V. Role-based recommendation and trust evaluation. The 9th IEEE international conference on E-commerce technology and the 4th IEEE international conference on enterprise computing, e-commerce, and e-services, 2007. CEC\/EEE 2007, p. 278\u2013288. IEEE; 2007.","DOI":"10.1109\/CEC-EEE.2007.83"},{"issue":"4","key":"9600_CR40","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/s12559-016-9414-8","volume":"8","author":"PK Wong","year":"2016","unstructured":"Wong PK, Gao XH, Wong KI, Vong CM. An analytical study on reasoning of extreme learning machine for classification from its inductive bias. Cogn Comput 2016;8(4):746\u2013756.","journal-title":"Cogn Comput"},{"issue":"C","key":"9600_CR41","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.knosys.2016.01.011","volume":"97","author":"H Wu","year":"2016","unstructured":"Wu H, Yue K, Pei Y, Li B, Zhao Y, Dong F. Collaborative topic regression with social trust ensemble for recommendation in social media systems. Knowl-Based Syst 2016;97(C):111\u2013122.","journal-title":"Knowl-Based Syst"},{"key":"9600_CR42","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.knosys.2016.01.004","volume":"96","author":"J Wu","year":"2016","unstructured":"Wu J, Xiong R, Chiclana F. Uninorm trust propagation and aggregation methods for group decision making in social network with four tuple information. Knowl-Based Syst 2016;96:29\u201339.","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"9600_CR43","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/s12559-016-9409-5","volume":"8","author":"L Xu","year":"2016","unstructured":"Xu L, Ding S, Xu X, Zhang N. Self-adaptive extreme learning machine optimized by rough set theory and affinity propagation clustering. Cogn Comput 2016;8(4):720\u2013728.","journal-title":"Cogn Comput"},{"key":"9600_CR44","unstructured":"Xu Y, Hu T, Li Y. A travel route recommendation algorithm with personal preference. 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD), p. 390\u2013396. IEEE; 2016."},{"key":"9600_CR45","unstructured":"Zeng Y, Chen X, Cao X, Qin S, Cavazza M, Xiang Y. Optimal route search with the coverage of users\u2019 preferences. IJCAI, p. 2118\u20132124; 2015."},{"issue":"3","key":"9600_CR46","first-page":"1","volume":"9","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Zhao X, Wang G. FE-ELM: a new friend recommendation model with extreme learning machine. Cogn Comput 2017;9 (3):1\u201312.","journal-title":"Cogn Comput"},{"key":"9600_CR47","doi-asserted-by":"crossref","unstructured":"Zheng X, Wang Y, Orgun MA, Zhong Y, Liu G, et al. Trust prediction with propagation and similarity regularization. AAAI, p. 237\u2013244; 2014.","DOI":"10.1609\/aaai.v28i1.8722"},{"issue":"6","key":"9600_CR48","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TKDE.2017.2662236","volume":"29","author":"R Zhu","year":"2017","unstructured":"Zhu R, Wang B, Yang X, Zheng B, Wang G. Sap: Improving continuous top-k queries over streaming data. IEEE Trans Knowl Data Eng 2017;29(6):1310\u20131328.","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12559-018-9600-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-018-9600-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-018-9600-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T23:13:08Z","timestamp":1761088388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12559-018-9600-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,2]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9600"],"URL":"https:\/\/doi.org\/10.1007\/s12559-018-9600-y","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"type":"print","value":"1866-9956"},{"type":"electronic","value":"1866-9964"}],"subject":[],"published":{"date-parts":[[2018,10,2]]},"assertion":[{"value":"31 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}},{"value":"Informed consent was obtained from all individual participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"This article does not contain any studies involving human participants and\/or animals by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}