{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:39Z","timestamp":1750308579830,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":29,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3051151","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"1335-1341","source":"Crossref","is-referenced-by-count":6,"title":["User Relation Prediction Based on Matrix Factorization and Hybrid Particle Swarm Optimization"],"prefix":"10.1145","author":[{"given":"Zhenkun","family":"Shi","sequence":"first","affiliation":[{"name":"Jilin University, Changchun, China"}]},{"given":"Wanli","family":"Zuo","sequence":"additional","affiliation":[{"name":"Jilin University, Changchun, China"}]},{"given":"Weitong","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane , Australia"}]},{"given":"Lin","family":"Yue","sequence":"additional","affiliation":[{"name":"Northeast Normal University, Changchun, China"}]},{"given":"Jiayu","family":"Han","sequence":"additional","affiliation":[{"name":"Jilin University, Changchun, China"}]},{"given":"Lizhou","family":"Feng","sequence":"additional","affiliation":[{"name":"Tianjin University of Finance and Economics, Tianjin, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3051151-1","doi-asserted-by":"crossref","unstructured":"Rennie, Jasson D. M., and N. Srebro. \"Fast maximum margin matrix factorization for collaborative prediction.\" International Conference on Machine Learning ACM, 2005:713--719.","DOI":"10.1145\/1102351.1102441"},{"key":"key-10.1145\/3041021.3051151-2","doi-asserted-by":"crossref","unstructured":"Jian-Feng, Cai, et al. \"Cine cone beam CT reconstruction using low-rank matrix factorization: algorithm and a proof-of-principle study\" IEEE Transactions on Medical Imaging 33.8(2014):1581--1591.","DOI":"10.1109\/TMI.2014.2319055"},{"key":"key-10.1145\/3041021.3051151-3","doi-asserted-by":"crossref","unstructured":"Sainath, Tara N., et al. \"Low-rank matrix factorization for Deep Neural Network training with high-dimensional output targets.\" International Conference on Acoustics, Speech, &#38; Signal Processing, Icassp IEEE, 2013:6655--6659.","DOI":"10.1109\/ICASSP.2013.6638949"},{"key":"key-10.1145\/3041021.3051151-4","doi-asserted-by":"crossref","unstructured":"Koren, Yehuda. Factorization meets the neighborhood: a multifaceted collaborative filtering model. {C} Acm Sigkdd International Conference on Knowledge Discovery &#38; Data Mining. 2008:426--434.","DOI":"10.1145\/1401890.1401944"},{"key":"key-10.1145\/3041021.3051151-5","doi-asserted-by":"crossref","unstructured":"Tang, Jiliang, Gao, Huiji, Liu, Huan. mTrust: discerning multi-faceted trust in a connected world. {C} Proceedings of the fifth ACM international conference on Web search and data mining. ACM, 2012:93--102.","DOI":"10.1145\/2124295.2124309"},{"key":"key-10.1145\/3041021.3051151-6","doi-asserted-by":"crossref","unstructured":"Xu W, Liu X, Gong Y. Document clustering based on non-negative matrix factorization. {C} in Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval (SIGIR'03. 2003:267--273).","DOI":"10.1145\/860435.860485"},{"key":"key-10.1145\/3041021.3051151-7","doi-asserted-by":"crossref","unstructured":"Huang, Xiaodi, et al. \"Enhanced clustering of biomedical documents using ensemble non-negative matrix factorization.\" Information Sciences 181.11(2013):2293--2302.","DOI":"10.1016\/j.ins.2011.01.029"},{"key":"key-10.1145\/3041021.3051151-8","doi-asserted-by":"crossref","unstructured":"Tang, Jiliang, X. Wang, and H. Liu. \"Integrating social media data for community detection.\" Proceedings of the 2011 international conference on Modeling and Mining Ubiquitous Social Media Springer-Verlag, 2011:1--20.","DOI":"10.1007\/978-3-642-33684-3_1"},{"key":"key-10.1145\/3041021.3051151-9","doi-asserted-by":"crossref","unstructured":"Tang, Jiliang, et al. \"Exploiting homophily effect for trust prediction.\" Proceedings of the sixth ACM international conference on Web search and data mining ACM, 2013:53--62.","DOI":"10.1145\/2433396.2433405"},{"key":"key-10.1145\/3041021.3051151-10","doi-asserted-by":"crossref","unstructured":"Berry, Michael W., et al. \"Algorithms and applications for approximate nonnegative matrix factorization.\" Computational Statistics &#38; Data Analysis 52.1(2007):155--173.","DOI":"10.1016\/j.csda.2006.11.006"},{"key":"key-10.1145\/3041021.3051151-11","doi-asserted-by":"crossref","unstructured":"S Zhou, Z Yu, C Wang. An improved non-negative matrix factorization algorithm based on genetic algorithm, 2014 International Conference on Computer Science and Electronic Technology (ICCSET 2014).","DOI":"10.2991\/iccset-14.2015.88"},{"key":"key-10.1145\/3041021.3051151-12","doi-asserted-by":"crossref","unstructured":"Merino, S., J. Mart&#237;nez, and F. Guzm&#225;n. \"Metadomotic optimization using genetic algorithms.\" Applied Mathematics &#38; Computation 267(2015):170--178.","DOI":"10.1016\/j.amc.2015.04.029"},{"key":"key-10.1145\/3041021.3051151-13","doi-asserted-by":"crossref","unstructured":"Ding, Chris, Tao Li, and Michael I. Jordan. \"Nonnegative matrix factorization for combinatorial optimization: Spectral clustering, graph matching, and clique finding.\" Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on. IEEE, 2008.","DOI":"10.1109\/ICDM.2008.130"},{"key":"key-10.1145\/3041021.3051151-14","doi-asserted-by":"crossref","unstructured":"Liben-Nowell, David, and Jon Kleinberg. \"The link prediction problem for social networks.\" Journal of the American society for information science and technology 58.7 (2007): 1019--1031.","DOI":"10.1002\/asi.20591"},{"key":"key-10.1145\/3041021.3051151-15","unstructured":"Cui, Laizhong, et al. \"Exploring A Trust Based Recommendation Approach for Videos in Online Social Network.\" Journal of Signal Processing Systems (2016): 1--13."},{"key":"key-10.1145\/3041021.3051151-16","doi-asserted-by":"crossref","unstructured":"Zhang, Zhijun, and Hong Liu. \"Social recommendation model combining trust propagation and sequential behaviors.\" Applied Intelligence 43.3 (2015): 695--706.","DOI":"10.1007\/s10489-015-0681-y"},{"key":"key-10.1145\/3041021.3051151-17","doi-asserted-by":"crossref","unstructured":"Agag, Gomaa, and Ahmed A. El-Masry. \"Understanding consumer intention to participate in online travel community and effects on consumer intention to purchase travel online and WOM: An integration of innovation diffusion theory and TAM with trust.\" Computers in Human Behavior 60 (2016): 97--111.","DOI":"10.1016\/j.chb.2016.02.038"},{"key":"key-10.1145\/3041021.3051151-18","doi-asserted-by":"crossref","unstructured":"Matsutani, Kanji, et al. \"Combining activity-evaluation information with NMF for trust-link prediction in social media.\" Big Data (Big Data), 2015 IEEE International Conference on. IEEE, 2015.","DOI":"10.1109\/BigData.2015.7364015"},{"key":"key-10.1145\/3041021.3051151-19","unstructured":"Agrawal, Priyanka, Vikas K. Garg, and Ramasuri Narayanam. \"Link Label Prediction in Signed Social Networks.\" IJCAI. 2013."},{"key":"key-10.1145\/3041021.3051151-20","doi-asserted-by":"crossref","unstructured":"Ostadrahimi, Leila, Miguel A. Mari&#241;o, and Abbas Afshar. \"Multi-reservoir operation rules: multi-swarm PSO-based optimization approach.\" Water resources management 26.2 (2012): 407--427.","DOI":"10.1007\/s11269-011-9924-9"},{"key":"key-10.1145\/3041021.3051151-21","doi-asserted-by":"crossref","unstructured":"Papadopoulos, Konstantinos A., et al. \"Particle swarm optimization of antenna arrays with efficiency constraints.\" Progress in Electromagnetics Research M 17 (2011): 237--251.","DOI":"10.2528\/PIERM11012504"},{"key":"key-10.1145\/3041021.3051151-22","unstructured":"Spiliotis, M. \"A Particle Swarm Optimization (PSO) heuristic for water distribution system analysis.\" Water Util J 8 (2014): 47--56."},{"key":"key-10.1145\/3041021.3051151-23","doi-asserted-by":"crossref","unstructured":"DuBois, Thomas, Jennifer Golbeck, and Aravind Srinivasan. \"Predicting trust and distrust in social networks.\" Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. IEEE, 2011.","DOI":"10.1109\/PASSAT\/SocialCom.2011.56"},{"key":"key-10.1145\/3041021.3051151-24","doi-asserted-by":"crossref","unstructured":"Ye, Jihang, et al. \"Predicting positive and negative links in signed social networks by transfer learning.\" Proceedings of the 22nd international conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2013.","DOI":"10.1145\/2488388.2488517"},{"key":"key-10.1145\/3041021.3051151-25","doi-asserted-by":"crossref","unstructured":"Menon A K, Elkan C. Link Prediction via Matrix Factorization{C} European Conference on Machine Learning and Knowledge Discovery in Databases. Springer-Verlag, 2011:437--452.","DOI":"10.1007\/978-3-642-23783-6_28"},{"key":"key-10.1145\/3041021.3051151-26","unstructured":"Kuter, Ugur, and J. Golbeck. \"SUNNY: a new algorithm for trust inference in social networks using probabilistic confidence models.\" AAAI Conference on Artificial Intelligence, July 22--26, 2007, Vancouver, British Columbia, Canada 2007:1377--1382."},{"key":"key-10.1145\/3041021.3051151-27","doi-asserted-by":"crossref","unstructured":"Qian, Yi, and Sibel Adali. \"Extended structural balance theory for modeling trust in social networks.\" Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. IEEE, 2013.","DOI":"10.1109\/PST.2013.6596064"},{"key":"key-10.1145\/3041021.3051151-28","doi-asserted-by":"crossref","unstructured":"Hsieh, Cho-Jui, Kai-Yang Chiang, and Inderjit S. Dhillon. \"Low rank modeling of signed networks.\" Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2012.","DOI":"10.1145\/2339530.2339612"},{"key":"key-10.1145\/3041021.3051151-29","doi-asserted-by":"crossref","unstructured":"Forsati R, Mahdavi M, Shamsfard M, et al. Matrix factorization with explicit trust and distrust side information for improved social recommendation{J}. ACM Transactions on Information Systems (TOIS), 2014, 32(4): 17.","DOI":"10.1145\/2641564"}],"event":{"number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '17 Companion","name":"the 26th International Conference","start":{"date-parts":[[2017,4,3]]},"location":"Perth, Australia","end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3051151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3051151&ftid=1865344&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:58Z","timestamp":1750273498000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3051151"}},"subtitle":[],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1145\/3041021.3051151","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}