{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:45Z","timestamp":1750220745954,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1145\/3396452.3396457","type":"proceedings-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T22:04:26Z","timestamp":1590444266000},"page":"65-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Ring-based Trust Modeling in Online Education Platform"],"prefix":"10.1145","author":[{"given":"Bowen","family":"Sun","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Department of Computer Science and Technology, Harbin, Heilongjiang, China"}]},{"given":"Quanlong","family":"Li","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Department of Computer Science and Technology, Harbin, Heilongjiang, China"}]},{"given":"Guocheng","family":"Li","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Department of Computer Science and Technology, Harbin, Heilongjiang, China"}]},{"given":"Yuanlong","family":"Chen","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Department of Computer Science and Technology, Harbin, Heilongjiang, China"}]}],"member":"320","published-online":{"date-parts":[[2020,5,22]]},"reference":[{"volume-title":"ACM","author":"Chaney A J B","unstructured":"Chaney A J B , Blei D M , Eliassi-Rad T. A probabilistic model for using social networks in personalized item recommendation[C]\/\/Proceedings of the 9th ACM Conference on Recommender Systems . ACM , 2015: 43--50. Chaney A J B, Blei D M, Eliassi-Rad T. A probabilistic model for using social networks in personalized item recommendation[C]\/\/Proceedings of the 9th ACM Conference on Recommender Systems. ACM, 2015: 43--50.","key":"e_1_3_2_1_1_1"},{"volume-title":"ACM","author":"Gao P","unstructured":"Gao P , Miao H , Baras J S , Star : Semiring trust inference for trust-aware social recommenders[C]\/\/Proceedings of the 10th ACM Conference on Recommender Systems . ACM , 2016: 301--308. Gao P, Miao H, Baras J S, et al. Star: Semiring trust inference for trust-aware social recommenders[C]\/\/Proceedings of the 10th ACM Conference on Recommender Systems. ACM, 2016: 301--308.","key":"e_1_3_2_1_2_1"},{"volume-title":"ACM","author":"Massa P","unstructured":"Massa P , Avesani P. Trust-aware recommender systems[C]\/\/Proceedings of the 2007 ACM conference on Recommender systems . ACM , 2007: 17--24. Massa P, Avesani P. Trust-aware recommender systems[C]\/\/Proceedings of the 2007 ACM conference on Recommender systems. ACM, 2007: 17--24.","key":"e_1_3_2_1_3_1"},{"volume-title":"ACM","author":"Jamali M","unstructured":"Jamali M , Ester M. A matrix factorization technique with trust propagation for recommendation in social networks[C]\/\/Proceedings of the fourth ACM conference on Recommender systems . ACM , 2010: 135--142. Jamali M, Ester M. A matrix factorization technique with trust propagation for recommendation in social networks[C]\/\/Proceedings of the fourth ACM conference on Recommender systems. ACM, 2010: 135--142.","key":"e_1_3_2_1_4_1"},{"volume-title":"ACM","author":"Ma H","unstructured":"Ma H , King I , Lyu M R . Learning to recommend with social trust ensemble[C]\/\/Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval . ACM , 2009: 203--210. Ma H, King I, Lyu M R. Learning to recommend with social trust ensemble[C]\/\/Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. ACM, 2009: 203--210.","key":"e_1_3_2_1_5_1"},{"volume-title":"ACM","author":"Duricic T","unstructured":"Duricic T , Lacic E , Kowald D , Trust-based collaborative filtering: tackling the cold start problem using regular equivalence[C]\/\/Proceedings of the 12th ACM Conference on Recommender Systems . ACM , 2018: 446--450. Duricic T, Lacic E, Kowald D, et al. Trust-based collaborative filtering: tackling the cold start problem using regular equivalence[C]\/\/Proceedings of the 12th ACM Conference on Recommender Systems. ACM, 2018: 446--450.","key":"e_1_3_2_1_6_1"},{"volume-title":"ACM","author":"Tang J","unstructured":"Tang J , Gao H , Hu X , Exploiting homophily effect for trust prediction[C]\/\/Proceedings of the sixth ACM international conference on Web search and data mining . ACM , 2013: 53--62. Tang J, Gao H, Hu X, et al. Exploiting homophily effect for trust prediction[C]\/\/Proceedings of the sixth ACM international conference on Web search and data mining. ACM, 2013: 53--62.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Exploring different types of trust propagation[C]\/\/International Conference on Trust Management","author":"J\u00f8sang A","year":"2006","unstructured":"J\u00f8sang A , Marsh S , Pope S. Exploring different types of trust propagation[C]\/\/International Conference on Trust Management . Springer , Berlin, Heidelberg , 2006 : 179--192. J\u00f8sang A, Marsh S, Pope S. Exploring different types of trust propagation[C]\/\/International Conference on Trust Management. Springer, Berlin, Heidelberg, 2006: 179--192."},{"key":"e_1_3_2_1_9_1","volume-title":"A survey of trust and reputation systems for online service provision[J]. Decision support systems","author":"J\u00f8sang A","year":"2007","unstructured":"J\u00f8sang A , Ismail R , Boyd C. A survey of trust and reputation systems for online service provision[J]. Decision support systems , 2007 , 43(2): 618--644. J\u00f8sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision[J]. Decision support systems, 2007, 43(2): 618--644."},{"key":"e_1_3_2_1_10_1","volume-title":"Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic[C]\/\/IEEE INFOCOM 2014-IEEE Conference on Computer Communications","author":"Liu G","year":"2014","unstructured":"Liu G , Yang Q , Wang H , Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic[C]\/\/IEEE INFOCOM 2014-IEEE Conference on Computer Communications . IEEE , 2014 : 1698--1706. Liu G, Yang Q, Wang H, et al. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic[C]\/\/IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014: 1698--1706."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA447900","volume-title":"Generating predictive movie recommendations from trust in social networks[C]\/\/International Conference on Trust Management","author":"Golbeck J.","year":"2006","unstructured":"Golbeck J. Generating predictive movie recommendations from trust in social networks[C]\/\/International Conference on Trust Management . Springer , Berlin, Heidelberg , 2006 : 93--104. Golbeck J. Generating predictive movie recommendations from trust in social networks[C]\/\/International Conference on Trust Management. Springer, Berlin, Heidelberg, 2006: 93--104."},{"volume-title":"ACM","author":"Leskovec J","unstructured":"Leskovec J , Huttenlocher D , Kleinberg J. Predicting positive and negative links in online social networks[C]\/\/Proceedings of the 19th international conference on World wide web . ACM , 2010: 641--650. Leskovec J, Huttenlocher D, Kleinberg J. Predicting positive and negative links in online social networks[C]\/\/Proceedings of the 19th international conference on World wide web. ACM, 2010: 641--650.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Open university learning analytics dataset[J]. Scientific data","author":"Kuzilek J","year":"2017","unstructured":"Kuzilek J , Hlosta M , Zdrahal Z. Open university learning analytics dataset[J]. Scientific data , 2017 , 4: 170--171. Kuzilek J, Hlosta M, Zdrahal Z. Open university learning analytics dataset[J]. Scientific data, 2017, 4: 170--171."},{"key":"e_1_3_2_1_14_1","volume-title":"Predicting trust and distrust in social networks[C]\/\/2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing","author":"DuBois T","year":"2011","unstructured":"DuBois T , Golbeck J , Srinivasan A. Predicting trust and distrust in social networks[C]\/\/2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing . IEEE , 2011 : 418--424. DuBois T, Golbeck J, Srinivasan A. Predicting trust and distrust in social networks[C]\/\/2011 IEEE third international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing. IEEE, 2011: 418--424."},{"volume-title":"ACM","author":"Turrin R.","unstructured":"Turrin R. Personalization challenges in e-Learning[C]\/\/ the Eleventh ACM Conference . ACM , 2017: 345--345. Turrin R. Personalization challenges in e-Learning[C]\/\/ the Eleventh ACM Conference. ACM, 2017:345--345.","key":"e_1_3_2_1_15_1"}],"event":{"sponsor":["University of Sunderland, UK University of Sunderland, UK","City University of Hong Kong City University of Hong Kong"],"acronym":"ICBDE '20","name":"ICBDE '20: 2020 The 3rd International Conference on Big Data and Education","location":"London United Kingdom"},"container-title":["Proceedings of the 2020 3rd International Conference on Big Data and Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3396452.3396457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3396452.3396457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:46Z","timestamp":1750199926000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3396452.3396457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":15,"alternative-id":["10.1145\/3396452.3396457","10.1145\/3396452"],"URL":"https:\/\/doi.org\/10.1145\/3396452.3396457","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]},"assertion":[{"value":"2020-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}