The official PGP user's guide
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
The elements of computer credibility
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Authoritative sources in a hyperlinked environment
Journal of the ACM (JACM)
Query-based sampling of text databases
ACM Transactions on Information Systems (TOIS)
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
A survey of data provenance in e-science
ACM SIGMOD Record
A content-driven reputation system for the wikipedia
Proceedings of the 16th international conference on World Wide Web
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
Databases with uncertainty and lineage
The VLDB Journal — The International Journal on Very Large Data Bases
Truth Discovery with Multiple Conflicting Information Providers on the Web
IEEE Transactions on Knowledge and Data Engineering
High-Assurance Integrity Techniques for Databases
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
An Approach to Evaluate Data Trustworthiness Based on Data Provenance
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Computing trust from revision history
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
On Temporal Properties of Knowledge Base Inconsistency
Transactions on Computational Science V
StereoTrust: a group based personalized trust model
Proceedings of the 18th ACM conference on Information and knowledge management
An evidence-based iterative content trust algorithm for the credibility of online news
Concurrency and Computation: Practice & Experience
Data fusion: resolving data conflicts for integration
Proceedings of the VLDB Endowment
Integrating conflicting data: the role of source dependence
Proceedings of the VLDB Endowment
Truth discovery and copying detection in a dynamic world
Proceedings of the VLDB Endowment
Topic-Based Computing Model for Web Page Popularity and Website Influence
AI '09 Proceedings of the 22nd Australasian Joint Conference on Advances in Artificial Intelligence
Corroborating information from disagreeing views
Proceedings of the third ACM international conference on Web search and data mining
Automatic extraction of clickable structured web contents for name entity queries
Proceedings of the 19th international conference on World wide web
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement
Proceedings of the 19th international conference on World wide web
For members only: local and robust group management in DTNS
Proceedings of the 5th ACM workshop on Challenged networks
Knowing what to believe (when you already know something)
COLING '10 Proceedings of the 23rd International Conference on Computational Linguistics
Probabilistic models to reconcile complex data from inaccurate data sources
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
Evaluating importance of websites on news topics
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Find Answers from Web Search Results
WISA '10 Proceedings of the 2010 Seventh Web Information Systems and Applications Conference
Global detection of complex copying relationships between sources
Proceedings of the VLDB Endowment
SOLOMON: seeking the truth via copying detection
Proceedings of the VLDB Endowment
Trust analysis with clustering
Proceedings of the 20th international conference companion on World wide web
Proceedings of the 20th international conference companion on World wide web
Factal: integrating deep web based on trust and relevance
Proceedings of the 20th international conference companion on World wide web
Semi-supervised truth discovery
Proceedings of the 20th international conference on World wide web
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement
Proceedings of the 20th international conference on World wide web
FACTO: a fact lookup engine based on web tables
Proceedings of the 20th international conference on World wide web
Information credibility on twitter
Proceedings of the 20th international conference on World wide web
Ranking tweets considering trust and relevance
Proceedings of the Ninth International Workshop on Information Integration on the Web
Assessing relevance and trust of the deep web sources and results based on inter-source agreement
ACM Transactions on the Web (TWEB)
RAProp: ranking tweets by exploiting the tweet/user/web ecosystem and inter-tweet agreement
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Agreement based source selection for the multi-topic deep web integration
Proceedings of the 17th International Conference on Management of Data
Hi-index | 0.00 |
Different information sources publish information with different degrees of correctness and originality. False information can often result in considerable damage. Hence, trustworthinessof information is an important issue in this datadriven world economy. Reputation of different agents in a network has been studied earlier in a variety of domains like e-commerce, social sciences, sensor networks, and P2P networks. Recently there has been work in the data mining community on performing trust analysis based on the data provided by multiple information providers for different objects, and such agents and their provided information about data objects form a multi-typed heterogeneous network. The trust analysis under such a framework is considered as heterogeneous network-based trust analysis. This paper will survey heterogeneous network-based trust analysis models and their applications. We would conclude with a summary and some thoughts on future research in the area.