{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:44Z","timestamp":1760596304926,"version":"3.41.2"},"reference-count":40,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,2,10]],"date-time":"2019-02-10T00:00:00Z","timestamp":1549756800000},"content-version":"vor","delay-in-days":40,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872033"],"award-info":[{"award-number":["61872033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["18YJCZH204"],"award-info":[{"award-number":["18YJCZH204"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4184084"],"award-info":[{"award-number":["4184084"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Users in online networks exert different influence during the process of information propagation, and the heterogeneous influence may contribute to personalized recommendations. In this paper, we analyse the topology of social networks to investigate users\u2019 influence strength on their neighbours. We also exploit the user\u2010item rating matrix to find the importance of users\u2019 ratings and determine their influence on entire social networks. Based on the local influence between users and global influence over the whole network, we propose a recommendation method with indirect interactions that makes adequate use of users\u2019 relationships on social networks and users\u2019 rating data. The two kinds of influence are incorporated into a matrix factorization framework. We also consider indirect interactions between users who do not have direct links with each other. Experimental results on two real\u2010world datasets demonstrate that our proposed framework performs better than other state\u2010of\u2010the\u2010art methods for all users and cold\u2010start users. Compared with node degrees, betweenness, and clustering coefficients, coreness constitutes the best topological descriptor to identify users\u2019 local influence, and recommendations with the measure of coreness outperform other descriptors of user influence.<\/jats:p>","DOI":"10.1155\/2019\/6325654","type":"journal-article","created":{"date-parts":[[2019,2,10]],"date-time":"2019-02-10T23:35:32Z","timestamp":1549841732000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Topological Influence\u2010Aware Recommendation on Social Networks"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3449-3689","authenticated-orcid":false,"given":"Zhaoyi","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1610-335X","authenticated-orcid":false,"given":"Fei","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongshu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,2,10]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"SarwarB. KarypisG. KonstanJ. andRiedlJ. Item-based collaborative filtering recommendation algorithms Proceedings of the 10th International Conference on World Wide Web 2001 285\u2013295 2-s2.0-85052617391.","DOI":"10.1145\/371920.372071"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_8"},{"key":"e_1_2_9_3_2","doi-asserted-by":"crossref","unstructured":"MassaP.andAvesaniP. Trust-aware recommender systems Proceedings of the ACM Conference on Recommender Systems (RecSys \u203207) October 2007 ACM 17\u201324 https:\/\/doi.org\/10.1145\/1297231.1297235 2-s2.0-42149144140.","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721677"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2009.08.036"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3437854"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6928605"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1177\/0049124193022001006"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"MaH. YangH. LyuM. R. andKingI. SoRec: Social recommendation using probabilistic matrix factorization Proceedings of the 17th ACM conference on Information and knowledge mining October 2008 USA 2-s2.0-70349257904.","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"MaH. ZhouD. LiuC. LyuM. R. andKingI. Recommender systems with social regularization Proceedings of the 4th ACM International Conference on Web Search and Data Mining (WSDM \u203211) February 2011 Hong Kong China ACM 287\u2013296 https:\/\/doi.org\/10.1145\/1935826.1935877.","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_2_9_11_2","unstructured":"TangJ. HuX. GaoH. andLiuH. Exploiting local and global social context for recommendation Proceedings of the 23rd International Joint Conference on Artificial Intelligence August 2013 2712\u20132718 2-s2.0-84896062618."},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"JamaliM.andEsterM. A matrix factorization technique with trust propagation for recommendation in social networks Proceedings of the 4th ACM Recommender Systems Conference (RecSys \u203210) September 2010 Barcelona Spain 135\u2013142 https:\/\/doi.org\/10.1145\/1864708.1864736 2-s2.0-78649926860.","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2263128"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150479"},{"key":"e_1_2_9_15_2","unstructured":"KarypisG. Evaluation of item-based top-N recommendation algorithms Proceedings of the 10th International Conference on Information and Knowledge Management November 2001 247\u2013254 2-s2.0-0035747556."},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"HerlockerJ. L. KonstanJ. A. BorchersA. andRiedlJ. An algorithmic framework for performing collaborative filtering Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval August 1999 230\u2013237 2-s2.0-85015559680.","DOI":"10.1145\/312624.312682"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"RennieJ. D. M.andSrebroN. Fast maximum margin matrix factorization for collaborative prediction Proceedings of the 22nd International Conference on Machine Learning (ICML \u203205) August 2005 713\u2013719 https:\/\/doi.org\/10.1145\/1102351.1102441 2-s2.0-31844451557.","DOI":"10.1145\/1102351.1102441"},{"key":"e_1_2_9_18_2","unstructured":"SalakhutdinovR.andMnihA. Probabilistic matrix factorization Proceedings of the International Conference on Neural Information Processing Systems December 2007 1257\u20131264 2-s2.0-84858757335."},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2009.263"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1961209.1961212"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961201"},{"key":"e_1_2_9_22_2","doi-asserted-by":"crossref","unstructured":"ZhaoT. LiC. LiM. DingQ. andLiL. Social recommendation incorporating topic mining and social trust analysis Proceedings of the 22nd ACM International Conference on Information and Knowledge Management CIKM 2013 November 2013 USA 1643\u20131648 2-s2.0-84889607520.","DOI":"10.1145\/2505515.2505592"},{"key":"e_1_2_9_23_2","doi-asserted-by":"crossref","unstructured":"ZhangQ. WuJ. YangH. LuW. LongG. andZhangC. Global and local influence-based social recommendation Proceedings of the the 25th ACM International on Conference on Information and Knowledge Management October 2016 Indianapolis IN USA 1917\u20131920 https:\/\/doi.org\/10.1145\/2983323.2983873.","DOI":"10.1145\/2983323.2983873"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2633282"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2514368"},{"key":"e_1_2_9_26_2","doi-asserted-by":"crossref","unstructured":"ReshmaR. AmbikeshG. andSanthi ThilagamP. Alleviating data sparsity and cold start in recommender systems using social behaviour Proceedings of the 2016 International Conference on Recent Trends in Information Technology ICRTIT 2016 April 2016 2-s2.0-84991746018.","DOI":"10.1109\/ICRTIT.2016.7569532"},{"key":"e_1_2_9_27_2","unstructured":"YuanQ. ChenL. andZhaoS. Factorization vs. regularization: Fusing heterogeneous social relationships in top-N recommendation Proceedings of the 5th ACM Conference on Recommender Systems RecSys 2011 October 2011 245\u2013252 2-s2.0-82555195650."},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0923-y"},{"key":"e_1_2_9_29_2","doi-asserted-by":"crossref","unstructured":"YangX. SteckH. andLiuY. Circle-based recommendation in online social networks Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD 2012 August 2012 1267\u20131275 2-s2.0-84866046089.","DOI":"10.1145\/2339530.2339728"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2739752"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.08.005"},{"key":"e_1_2_9_32_2","unstructured":"ZhangQ. WuJ. ZhangP. LongG. TsangI. W. andZhangC. Inferring latent network from cascade data for dynamic social recommendation Proceedings of the 16th IEEE International Conference on Data Mining ICDM 2016 2017 669\u2013678 2-s2.0-85014523310."},{"key":"e_1_2_9_33_2","doi-asserted-by":"crossref","unstructured":"WangH. WuJ. ZhouC. JiZ. andWuJ. Mining subcascade features for cascade outbreak prediction in big networks Proceedings of the 2016 International Joint Conference on Neural Networks IJCNN 2016 July 2016 Canada 3942\u20133949 2-s2.0-85007158170.","DOI":"10.1109\/IJCNN.2016.7727711"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2616305"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"e_1_2_9_36_2","unstructured":"TangJ. AggarwalC. andLiuH. Recommendations in signed social networks Proceedings of the International Conference on World Wide Web April 2016 31\u201340 2-s2.0-85017148304."},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1108\/03090560710718148"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.03.070"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0507655102"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0252-3"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/6325654.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/6325654.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/6325654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:40:37Z","timestamp":1723030837000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/6325654"}},"subtitle":[],"editor":[{"given":"Vittorio","family":"Loreto","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/6325654"],"URL":"https:\/\/doi.org\/10.1155\/2019\/6325654","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2018-10-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6325654"}}