{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:35:10Z","timestamp":1762868110277,"version":"3.41.0"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["#1614576"],"award-info":[{"award-number":["#1614576"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ARO","award":["W911NF-15-1-0328"],"award-info":[{"award-number":["W911NF-15-1-0328"]}]},{"name":"ONR","award":["N00014-17-1-2605"],"award-info":[{"award-number":["N00014-17-1-2605"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>Many real-world relations can be represented by signed networks with positive links (e.g., friendships and trust) and negative links (e.g., foes and distrust). Link prediction helps advance tasks in social network analysis such as recommendation systems. Most existing work on link analysis focuses on unsigned social networks. The existence of negative links piques research interests in investigating whether properties and principles of signed networks differ from those of unsigned networks and mandates dedicated efforts on link analysis for signed social networks. Recent findings suggest that properties of signed networks substantially differ from those of unsigned networks and negative links can be of significant help in signed link analysis in complementary ways. In this article, we center our discussion on a challenging problem of<jats:italic>signed link analysis<\/jats:italic>. Signed link analysis faces the problem of data sparsity, i.e., only a small percentage of signed links are given. This problem can even get worse when negative links are much sparser than positive ones as users are inclined more toward positive disposition rather than negative. We investigate how we can take advantage of other sources of information for signed link analysis. This research is mainly guided by three social science theories,<jats:italic>Emotional Information<\/jats:italic>,<jats:italic>Diffusion of Innovations<\/jats:italic>, and<jats:italic>Individual Personality<\/jats:italic>. Guided by these, we extract three categories of related features and leverage them for signed link analysis. Experiments show the significance of the features gleaned from social theories for signed link prediction and addressing the data sparsity challenge.<\/jats:p>","DOI":"10.1145\/3364222","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T22:12:06Z","timestamp":1585951926000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Social Science\u2013guided Feature Engineering"],"prefix":"10.1145","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5839-7408","authenticated-orcid":false,"given":"Ghazaleh","family":"Beigi","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Michigan State Universtiy, East Lansing, MI, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316500"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587339"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00013"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-017-0029-8"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.6.1531"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291026"},{"volume-title":"Leveraging Community Detection for Accurate Trust Prediction","author":"Beigi Ghazaleh","key":"e_1_2_1_8_1"},{"volume-title":"Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191","year":"2018","author":"Beigi Ghazaleh","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_15"},{"volume-title":"Identifying novel privacy issues of online users on social media platforms by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. ACM SIGWEB Newslett. Winter","year":"2019","author":"Beigi Ghazaleh","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316469"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342220.3344925"},{"volume-title":"Proceedings of the 10th International AAAI Conference on Web and Social Media.","year":"2016","author":"Beigi Ghazaleh","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.10"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762012000200002"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420240104"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.82.1.102"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(97)00005-1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1994.13.2.138"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.02.033"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/10290-019"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271740"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063742"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2005.11.002"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1086\/224515"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.09.003"},{"volume-title":"Proceedings of the International Workshop on Fuzzy Logic and Applications. Springer, 114--120","year":"2005","author":"Cock Martine De","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271746"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00113"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"edition":"1","volume-title":"Feature Engineering for Machine Learning and Data Analytics","author":"Dong Guozhu","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.88.5.736"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/1130655"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Joseph P. Forgas. 2003. Affective influences on attitudes and judgments. (2003). Joseph P. Forgas. 2003. Affective influences on attitudes and judgments. (2003).","DOI":"10.1093\/oso\/9780195126013.003.0030"},{"key":"e_1_2_1_38_1","first-page":"107","article-title":"Seeing the glass half full: A review of the causes and consequences of optimism","volume":"18","author":"Forgeard M. J. C.","year":"2012","journal-title":"Pratiq. Psychol."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-998-1017-4"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979614"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"volume-title":"Distrust: Manifestations and management. In Distrust","year":"2004","author":"Hardin Russell","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5607\/en.2013.22.3.173"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1946.9917275"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.21.1.92.22405"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.18.4.433"},{"volume-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 507--515","author":"Hsieh Cho-Jui","key":"e_1_2_1_47_1"},{"volume-title":"Proceedings of the 1st Workshop on Emotions and Personality in Personalized Services (EMPIRE at UMAP).","year":"2013","author":"Hu Rong","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581317"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.001"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.10.013"},{"key":"e_1_2_1_52_1","first-page":"665","article-title":"Information cascades in complex networks","volume":"5","author":"Jalili Mahdi","year":"2017","journal-title":"J. Complex Netw."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501977"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.09.011"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.069"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.49"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639746"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.62.6.1067"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1992.tb00970.x"},{"volume-title":"Chervany","year":"2001","author":"McKnight D. Harrison","key":"e_1_2_1_62_1"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpw026"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cny012"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0984(199609)10:3<201::AID-PER257>3.0.CO;2-#"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078727"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.91.3.347"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.76.1.104"},{"key":"e_1_2_1_72_1","unstructured":"Everett M. Rogers. 2010. Diffusion of Innovations. Simon 8 Schuster. Everett M. Rogers. 2010. Diffusion of Innovations. Simon 8 Schuster."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488483"},{"volume-title":"Carver","year":"1985","author":"Scheier Michael F.","key":"e_1_2_1_74_1"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01173489"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.67.6.1063"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1037\/10385-009"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249215.n15"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2006.09.004"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2012.10.009"},{"volume-title":"Ranking nodes in signed social networks. Soc. Netw. Anal. Min. 4, 1","year":"2014","author":"Shahriari Moshen","key":"e_1_2_1_81_1"},{"volume-title":"Joobin Gharibshah, and Mahdi Jalili.","year":"2016","author":"Shahriari Mohsen","key":"e_1_2_1_82_1"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.07.033"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.48.4.813"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-013-0228-2"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1004008107"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882971"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685295"},{"volume-title":"A survey of signed network mining in social media. ACM Computing Surveys (CSUR) 49, 3","year":"2016","author":"Tang Jiliang","key":"e_1_2_1_89_1"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433405"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631793"},{"volume-title":"Network Models of the Diffusion of Innovations","author":"Valente Thomas W.","key":"e_1_2_1_92_1"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.37"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348359"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488517"},{"volume-title":"The diffusion of innovations in social networks. The Economy as an Evolving Complex System III: Current Perspectives and Future Directions","year":"2006","author":"Young H. Peyton","key":"e_1_2_1_96_1"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2746258"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364222","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:26Z","timestamp":1750203866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364222"}},"subtitle":["A Novel Approach to Signed Link Analysis"],"short-title":[],"issued":{"date-parts":[[2020,1,9]]},"references-count":98,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3364222"],"URL":"https:\/\/doi.org\/10.1145\/3364222","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2020,1,9]]},"assertion":[{"value":"2019-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}