{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:37:35Z","timestamp":1761597455644,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596064","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"283-290","source":"Crossref","is-referenced-by-count":11,"title":["Extended structural balance theory for modeling trust in social networks"],"prefix":"10.1109","author":[{"given":"Yi","family":"Qian","sequence":"first","affiliation":[]},{"given":"Sibel","family":"Adali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780195342161.013.0028"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(01)00051-X"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.11.005"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2307\/2096399"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X05000129"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.56"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7031-1"},{"key":"10","first-page":"655658","article-title":"Rigorous probabilistic trustinference with applications to clustering","volume":"1","author":"dubois","year":"2009","journal-title":"Proc of the 2009 WI-IAT Conf"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"6","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-31843-9_25","article-title":"Graph drawing by stress majorization","volume":"3383","author":"gansner","year":"2005","journal-title":"Graph Drawing ser Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1177\/001872676702000206"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596064.pdf?arnumber=6596064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:11:23Z","timestamp":1498068683000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596064","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}