Next Article in Journal
A Multifunctional MR Damper with Dual Damping and Locking Mechanisms for Seismic Control of Multi-Span Continuous Bridges
Previous Article in Journal
A Lightweight Instance Segmentation Model for Simultaneous Detection of Citrus Fruit Ripeness and Red Scale (Aonidiella aurantii) Pest Damage
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra

1
Computer Technologies Department, Vocational School of Arapgir, Malatya Turgut Özal University, Malatya 44800, Turkey
2
Software Engineering Department, Faculty of Engineering, İnönü University, Malatya 44100, Turkey
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(17), 9744; https://doi.org/10.3390/app15179744
Submission received: 3 August 2025 / Revised: 1 September 2025 / Accepted: 3 September 2025 / Published: 4 September 2025
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

The growing importance of social networks has led to increased research into trust estimation and interpretation among network entities. It is important to predict the trust score between users in order to minimize the risks in user interactions. This article enables the identification of the most reliable and least reliable entities in a network by expressing trust scores numerically. In this paper, the social network is modeled as a graph, and trust scores are calculated by taking the powers of the ratio matrix between entities and summing them. Taking the power of the proportion matrix based on the number of entities in the network requires a lot of arithmetic load. After taking the powers of the eigenvalues of the ratio matrix, these are multiplied by the eigenvector matrix to obtain the power of the ratio matrix. In this way, the arithmetic cost required for calculating trust between entities is reduced. This paper calculates the trust score between entities using linear algebra techniques to reduce the arithmetic load. Trust detection algorithms use shortest paths and similar methods to eliminate paths that are deemed unimportant, which makes the result questionable because of the loss of data. The novelty of this method is that it calculates the trust score without the need for explicit path numbering and without any data loss.

1. Introduction

Trust, a complex social phenomenon, is one of the basic components of social interactions. If users readily accept information from a source, this indicates trust in that source [1]. Trust plays a central role in data exchange, which carries unknown risks, for example, from whom information can be accepted, from whom it cannot, or with whom information can be shared [2]. Therefore, modeling or expressing trust is important in many areas, especially in social network analysis. Trust is the relationship established between a trusting person (or truster) and a trusted person (or trustee), taking into account the direction of the relationship. Trust is subjective, asymmetric, non-transitive, propagative, context-dependent, composable, dynamic, self-reinforcing, and fragile [3].
Trust in social networks has been studied not only as a structural or probabilistic phenomenon but also as a socio-technical construct. Foundational works in the trust literature conceptualize trust as a multidimensional relationship shaped by ability, integrity, and benevolence [4], by users’ perceptions in technology-mediated interactions [5], and by institutional and interpersonal dimensions in online environments [6]. Incorporating these perspectives shows that our algorithmic approach only addresses one layer of trust: its structural–probabilistic dimension. However, it remains complementary to socio-technical foundations that emphasize cognitive, affective, and contextual factors.
The main objectives are to identify trustworthy entities to share information in social networks, to keep untrustworthy entities away from the network, and to prevent information from being misused [7]. Trust in social networks arises as a result of social interaction and resource sharing between entities. Entities can decide whether to trust the data they receive and spread it to other entities with a trust measure. The concept of distrust between entities negatively affects the interactions of entities. If social networks can offer sufficient and stable trust, they can provide entities with a well-established platform of collaboration and network expansion, effectively attract entities, and promote the consensus of the social network [8,9]. If trust relationships are found, clustering and group decision-making can also be performed in light of these data [10,11].
To reveal the trust score (degree of trust) of an entity’s relationship with another entity is the purpose of trust inference in the social network. Generally, this score is derived from the trusted interactions of mutual friends of entities. In addition, common interests, etc., are also used.
Traditional trust detection methods are insufficient for inferring common trust, as they consider each entity as an independent entity. However, in reality, entities are not independent entities but communities connected by social relations such as relationships of trust and distrust [12]. Many studies [13,14,15] ignore some connections or nodes in the network, leading to incomplete trust assessments. This study addresses these shortcomings by proposing a trust inference approach that utilizes the full graph structure without omitting any relationships and calculates trust levels efficiently using linear algebra-based methods instead of traditional path enumeration techniques.
In the context of a simple undirected graph G, let A denote the adjacency matrix of G. When a process similar to the Markov process is applied to matrix A, the resulting matrix can be treated as a probability transition matrix. The kth power of this matrix represents the trust between node pairs at k distance in G. When the first, second, …, kth powers of the matrix are taken and summed, the trust score between node pairs at max k distance in G is found. Finding the trust scores in this way incurs a high time cost of ( k 1 ) n 3 . In order to eliminate these time costs and obtain secure results without thinning or losing data, the trust calculation between entities has been performed using a low-cost linear algebra method. This is the main source of inspiration and motivation for this study.
While trust in social networks is a multifaceted phenomenon encompassing semantic, contextual, and temporal dimensions, this study focuses specifically on its structural–probabilistic layer. The present algorithm treats trust as a property emerging from the topology of interactions expressed through graph-based and algebraic computations. The proposed method provides a scalable basis for measuring structural trust scores.

2. Related Work

Graph algorithms such as shortest path, maximum flow, and node traversal are frequently used while finding the trust path [13]. TidalTrust is one of the most typical algorithms for finding the trust ratio between two users in a social network [14]. The TidalTrust algorithm determines a threshold based on the trust values obtained from the shortest paths between two users and eliminates the paths that it deems unimportant. Although the elimination of most trust paths has accelerated the operation of the algorithm, the accuracy of the trust score found is debatable. Taherian et al. developed the RN-Trust algorithm, which models trust as if it were a resistive network, in determining the trust scores of entities who are not directly connected to the social network [15]. This algorithm finds trust values with circuit likeness analysis, and while doing this, all paths are taken into account. Mao and his colleagues [13] use the trust-spreading strategy and weighted subject similarity to find trust paths between two users. While choosing the strong ones among the found trust paths, the decision is based on “small world” theory, and a depth restriction is applied.
The issue of trust in social networks is a widely studied topic, especially in recommendation systems, and it is based on the principle that users generally listen to the recommendations of their trusted friends. An entity gives relatively better and more reliable advice to entities that are closely related to it, compared to entities that have no social relationship with it [16]. Liu and his colleagues constructed a trust-sensitive recommendation system that combined explicit and implicit trust relationships [17]. Chen and his colleagues have redeveloped traditional trust spreading strategies such as TrustRank and Appleseed as a system that is sensitive to different issues to provide accurate recommendations in different categories according to users’ preferences [18]. To find trusted recommendations, Liu et al. applied a spread of trust model to the network, determined the trust relationship between pairs of unknown experts, and obtained subjective and objective weights [19]. In [20], a trust-based system using heterogeneous graphs of user–user, user–item, and item–item is presented. TTDNN (trust- and tag-aware deep neural network) is a recommendation system that calculates user similarity using users’ social links and tags [21]. In addition, a recommendation system that uses trust scores to provide location recommendations to users has been developed, and thus, more accurate and personalized recommendations have been provided to users [22]. As another example of a recommendation system, KTPGN (knowledge-enhanced trust propagation graph neural network) overcomes the limitations of traditional group recommendation methods by using social trust propagation in recommending groups to users [23].
In group decision-making (GDM) processes, trust also comes into play when evaluating the opinions of entities/experts in choosing the most appropriate alternative [24,25,26,27]. Xing et al. model how trust relationships among experts change over time and how these relationships can be fostered through interaction in order to increase consensus in group decision-making processes [24].
It has been seen that studies that find the trust score produce solutions with approaches such as probability, cloud modeling, machine learning, and fuzzy analysis [8]. Most of the trust inference algorithms in the social network use the trust values at the edges and the topological information of the network to find the trust scores. These algorithms, which are graph-based, make a restricted traversal and path selection. Finally, the trust scores are found using aggregation strategies. In addition to these, semantic information such as social distance between users is also used when finding the trust score [13]. Jethava and Rao have studied the prediction of trust using characteristics such as trait similarity of adjacent users, similarity of preferences made by nonadjacent users, and social proximity [28]. Acharjee and Panicker also showed that trust depends on the size of the network and the interactions between users [29].
While proposed method focuses on structural–probabilistic trust inference, other approaches in the literature address complementary aspects of trust. For example, overlapping community detection methods based on symmetric nonnegative matrix factorization provide insights into how community structures affect trust propagation [30], while emotion-driven frameworks employing BERT [31] capture the semantic and affective layers of trust in social media content.
Unlike all these studies, our proposed algorithm determines the trust score without any restriction and regardless of the path. In this paper, a relational probability-based calculation is performed for trust analysis in social networks. These calculations are grounded in a transition probability matrix, which naturally reveals the structural differences and trust dynamics among entities within a social network.

3. Concepts and Definitions

In this study, we briefly recall the fundamental concepts of graph theory [32] and linear algebra that underpin our approach.
Definition 1.
Graph: A graph G = V , E  consists of a set of vertices V  and edges E . Graphs are widely used to represent complex systems such as social networks, communication platforms, and biological systems [33,34].
Definition 2.
Graph types: Depending on the application, graphs may be directed or undirected and weighted or unweighted. Directed graphs assign orientation to edges, while weighted graphs associate a numerical value (e.g., cost, distance, probability) with each edge [32].
Definition 3.
Eigenvalues and eigenvectors: For a square matrix A , an eigenvalue λ  and corresponding eigenvector x  satisfy the relation A x = λ x . Eigenvalues and eigenvectors are widely used in linear algebra to capture structural properties of matrices and play a central role in spectral decompositions applied to graphs [35].

4. Proposed Method: Social Trusty Algorithm

The establishment of a relationship with an element of the network is dependent upon the reliability of that element being clearly expressed numerically and concrete evidence being presented. Such evidence would facilitate the determination of a relationship based on reliability and would also enable careful action to be taken. The present study investigates the relationship between entities in a social network by determining numerical trust values. The entities that an entity in the network trusts the most and trusts the least are identified. Furthermore, the method also identifies the most trusted and least trusted entities in the network.
When interactions are used to obtain the trust score between two entities on social networks, a score matrix (P) similar to a Markov probability matrix is first obtained using the adjacency matrix. This matrix provides the trust score between all pairs of entities at a distance of 1 step. By taking the powers of the matrix, the trust ratios at distances of 1, 2, …, k steps are found. If all of these are found and summed, an upper bound for the trust scores is obtained. This process is quite computationally expensive. Therefore, the eigenvalues and eigenvectors of the P matrix are found, and trust scores for individual pairs are determined by applying orthogonal operations to them. The powers of the eigenvalues are taken in order and summed. Then, the resulting expression is multiplied by the eigenvector. The approach applied in this study is summarized in Figure 1.
In this study, the process begins with the construction of a model of the social network. During the construction of the model, which is a ratio-based graph model, graph theory is used. A social network is modeled as a weighted or unweighted and undirected graph. The next step is to find the adjacency matrix of the graph.
In Figure 2, a simple social network is modeled and shown as a graph. Table 1 shows the adjacency matrix formed by the nodes and edges of this weighted graph.
Then, by applying the trust score model to the graph, a trust scores matrix (probability transition matrix), which is the representation of inter-entity relations, in which the sum of each row is 1 (probability sum), is formed (Table 2). As a result, the reliability problem in social networks can be considered as a Markov process [36,37].
Social networks are modeled as graphs where the adjacency matrix represents the structure of a weighted or unweighted graph. Therefore, Definition 4 gives us the trust score for adjacent nodes. In this way, a social network graph model can be used to obtain the trust score matrix for a step. This means that a social network can be modeled as a trust score matrix process in order to obtain the trust score between two adjacent nodes.
Definition 4.
Trust degree (Td) expresses the degree of trust (trust score) between entities defined in the range (0 ≤ Td ≤ 1). If T d X Y   = 0, it is said that X and Y do not trust each other at all. If T d X Y   = 1, it is said that X and Y are very closely related and they trust each other very absolutely. Equation (1) gives the formula for finding trust scores for adjacent nodes.
T d X Y = w ( x , y ) v j N ( X ) w ( x , v j )
To calculate the trust score of entities in social networks, paths are found between two related nodes, and the degree of trust is obtained by using these paths. If the aim is to find the degree of trust of only two entities to each other, it is shown by the method developed in this study that calculating all paths is a costly process, and there is no need for this. For this purpose, after obtaining the transition scores matrix of a social network, the degree of trust is calculated according to the distance between entities. In this context, in the proposed method, after obtaining the transition score matrix for the trust process of the social network, when the strength of this matrix is taken according to distance and summed, each element of the resulting matrix gives the trust level of the entities in the relevant indices.
Before the proposed method is explained in detail, it is necessary to give information about linear algebra.
Assume that P is the proportion matrix. P x = λ x equality is provided, where P is a square matrix and x is a column vector, and for this equality, the value of λ is called the eigenvalue and the column vector corresponding to this eigenvalue is the eigenvector x. Matrix P has n eigenvalues and n eigenvectors if it is an n × n matrix. Eigenvalues and eigenvector pairs can be given as λ 1 , v 1 , λ 2 , v 2 , λ 3 , v 3 , , λ n , v n . In this case, the following Equation (2) can be written.
P v i = λ i v i
Computing P k by direct multiplication requires O( k . n 3 ). It is an arithmetically costly operation, and the eigenvalues and eigenvectors of the matrix can be used to reduce the multiplication and addition operations here.
The power k of matrix P can be calculated as in (3). Figure 3 illustrates the matrix product vector and scaler product vector.
P k v i = P k 1 P v i = P k 1 λ i v i = P k 2 λ i 2 v i = P k 3 λ i 3 v i = = λ i k v i
In this step, when the powers of the scalar numbers are taken, the kth power of the P matrix is calculated with n × n scalar products. At this aim, P k = λ k v i v i T v i v i T 1 = λ k D where D = v i v i T v i v i T 1 should be computed.
Figure 3. Matrix, eigenvalues, and eigenvector relations.
Figure 3. Matrix, eigenvalues, and eigenvector relations.
Applsci 15 09744 g003
In order to model a system as a trust process, the transition scores between the states of that system are calculated and the transition scores matrix is obtained. The matrix given in Table 2 is used as the transition score matrix for the trust process. The transition score matrix P is calculated as follows.
P = i j p 1,1 t i , j p 1 , n p n , 1 p n , n
The t i , j value of the P matrix represents the scores of going from state i to state j in one step. The transition score matrix (Table 2) obtained from the social network can be used in this way, and in this case, the value t i , j will show the trust of entity i in entity j. In a trust process, whose transition scores matrix is given as P, the scores of transitioning from one state to another after k steps will be the value transition scores represented by the relevant indices after taking the k power of the P matrix (5).
P k = Q = i j q 1,1 r i , j q 1 , n q n , 1 q n , n
The value of r in the matrix gives the scores of starting from state i and being in state j at the end of k steps. If there is a probability of staying in the same state for this matrix, then it is taken into account. When the values given in Table 2 are evaluated as one-step trust degrees, it will be seen that the diagonal values are zero. This means that it will not stand on itself and cause repetition. When Table 2 is represented as a matrix, let this matrix be represented as T d p . The T d p matrix shows the degree of trust of entities who are directly connected to each other in the relevant social network. When the T d p matrix is squared, the degree of trust of entities with a distance of 2 to each other is calculated. If the k t h power of this matrix is taken, the degree of trust between entities at a distance of k is obtained. As a result, the degree of trust of entities in each other is calculated (Figure 4). Figure 4 depicts the matrix power relation with eigenvalues and eigenvectors relations. This method gets rid of finding all paths by using breadth first search or other technique like breadth first search. For this purpose, the powers of the T d p matrix will need to be taken, and this is a costly operation (more multiplication operations). In the present model, eigenvalues and eigenvectors have been used to calculate the powers of the transition score matrix. The eigenvalue and eigenvector pairs of the T d p matrix are η 1 , y 1 , η 2 , y 2 , η 3 , y 3 , , η n , y n and are shown in (6).
T d p y 1 = η 1 y 1 T d p y 2 = η 2 y 2 T d p y n = η n y n
The degree of trust of entities with a distance of 2 to each other is shown in (7).
T d p 2 y i = η i 2 y i
In cases where entities are at a distance of 3 from each other, their degree of trust is calculated with the following Equation (8).
T d p 3 y i = η i 3 y i
When the distances of entities from each other are k, the relation in (9) finds the degree of trust.
T d p k y i = η i k y i
After all, to calculate the degrees of trust of entities in each other, it is necessary to sum the degrees of trust on all roads with distances of 1, 2, …, k. As a result, the maximum values of the degree of trust of entities to each other can be calculated with the following relation (10), and in this case, there will be no need to find all the paths between entities ( T d is the trust matrix). This operation requires the trust scores of all entities to a specific entity.
T d i = 1 k T d p i y r = i = 1 k η r i y r
Any power of the T d matrix is multiplied by a column vector; however, to compute the trust score, the power of T d matrix is required. To obtain the trust score of any length, the corresponding power of T d should be computed. There are two ways to compute these values:
1st way: Any power of T d should be computed by using matrix multiplication. This step requires many arithmetic operations.
2nd way: T d p k y r y r T y r y r T 1 = T d p k .
The working steps of the developed method are given as pseudocode in Algorithm 1:
Algorithm 1 Social Trusty Algorithm
1. Start
2. G = (V, E) //Convert social network to graph
3. P i j = G i j i = 1 n G i k 1 i , j n //Find transition scores matrix
4. P x = λ x // Find P’s eigenvalues and eigenvectors
5. S i = k = 1 n λ i t i = 1,2 , , n
6. T d = S . E v e c // E v e c eigenvector matrix
7. rowMax i = max T d i , rowMin i = min T d i   i = 1,2 , , n
8. c o l S u m j = i = 1 n T d ( i , j )
9. m o s t T r u s t w o r t h y = max c o l S u m j , l e a s t T r u s t w o r t h y = min ( c o l S u m j )
10. End
In step 7, trust between entity pairs is expressed by finding the max and min values on a row-by-row basis. The resulting Td matrix is summed on a column-by-column basis, and as seen in step 9, the most trusted and least trusted entities across the entire network are identified using the max and min values.
The steps of the method based on linear algebra can be briefly explained as follows:
Step 1: The adjacency matrix of the given social network is taken as input. The transition probability matrix is obtained.
Step 2: All powers of the transition probability matrix from 1 to the (n − 1) are calculated.
Step 3: All the resulting matrices are summed and the (i, j) element of the total matrix will give the trust of node i to node j. Since calculating the powers of the matrix is costly, the eigenvalues and eigenvectors of the matrix whose power will be calculated are calculated. After the powers of the eigenvalues are calculated, the product of the matrix whose main diagonal consists of these values and the eigenvectors matrix will give the power of the corresponding matrix.
Step 4: The resulting matrix gives the trust scores for all pair nodes.

5. Simulation Results

When all processes in the Social Trust Algorithm are applied to the graph in Figure 2, the matrix in Table 3 is obtained. As shown in this matrix, trust scores are clearly distinguishable. To illustrate this, consider node V 1 , which shows maximum trust in V 2 with a score of 3.716654. Conversely, node V 1 has the lowest level of trust in V 3 , with a score of 2.179268.
The results for each entity of the example graph in Figure 2 are shown in Figure 5.
It can be seen in Figure 5 that V 1 ’s most trusted entity in the network is V 2 , and its least trusted entity is V 3 . Similarly, it can be seen that V 2 ’s most trusted entity in the network is V 4 , and her least trusted entity is V 3 and vice versa.
When the algorithm is applied to the social network, a Td matrix is obtained. The trust score of each entity can be obtained by adding up the columns of the Td matrix. In addition, an inference can be made about the overall network. The entity with the lowest trust score is designated as the most distrusted, while the entity with the highest score is regarded as the most trusted. Table 4 illustrates the results obtained when the Social Trusty Algorithm is run on real networks. The datasets we used are Windsurfers, Zachary Karate Club, Dolphins, Les Misérables, etc., which are frequently used in social network analysis. For example, Lesmis is a weighted graph in which the characters in Victor Hugo’s novel. Les Misérables are represented as nodes, and the relationships of these characters with those in the same chapter of the book are represented as edges. The graph consists of 77 nodes and 254 edges. While the most trusted entity of the network is Bossuet, the most distrusted is Bahorel.
The graph in Figure 6 shows the runtimes of the algorithms while finding the trust scores on various datasets. The datasets used are 17-node Kangaroos, 34-node Zachary Karate Club [38], 43-node Windsurfers [38], 77-node Les Misérables [38], and 1000-node R1000.1 [39]. In this study, a comparison was made between the proposed method and the RN-Trust [15] and TidalTrust [14] algorithms. A comparative analysis was conducted on the three distinct methods in terms of their execution times on various datasets. The results indicated that the proposed method exhibited superior performance in all instances. It is evident that as the number of nodes in the dataset increases, the superiority of the proposed algorithm becomes more pronounced. This discrepancy is particularly pronounced in the “Les Misérables” dataset.

6. Conclusions

This paper emphasizes the importance of trust in social networks and can find the trust score and label users in the network as trustworthy or untrustworthy. Most solutions to the problem of finding a trust score work within a limited search range, such as the shortest path. Trust degradation and path dependency emerge as common issues in trust propagation. Considering these issues, a Markov process-like method has been developed to find the trust score without applying any constraints or without explicit path enumeration.
As the proposed algorithm is an approach method, soundness and completeness are not sought. Since the initial scores of other algorithms differ from ours, the resulting numerical trust scores are also different, making them unsuitable for direct comparison. Therefore, a comparative analysis was conducted with other algorithms in terms of runtime and data loss. The experimental results demonstrate that our algorithm achieves lower runtime complexity compared to RN-Trust and TidalTrust, particularly in larger networks. Moreover, by preserving all transition probabilities, it avoids the structural information loss inherent in pruning-based approaches. While eigendecomposition provides a computationally efficient way to compute matrix powers, it does not yield formal guarantees of soundness or completeness. As such, the Social Trusty Algorithm should be regarded as a computational shortcut that emphasizes efficiency and structural preservation, rather than a fully rigorous model.
Although the present method is able to conceptualize trust as a structural and probabilistic construct, it does not encompass the semantic, contextual, or temporal dynamics of trust that have been emphasized in the broader information systems literature. Despite these limitations, this study provides a valuable methodological contribution. The Social Trusty Algorithm can support a range of applications, from identifying malicious actors in social networks to enhancing recommender systems, improving information security, and informing governance in digital platforms. Once trust scores are obtained, users can establish relationships with trustworthy users, share information, and interact with them, while taking necessary precautions against untrustworthy users.
In this paper, a method for inferring trust in social networks has been designed and its applicability demonstrated. In the future, the dynamic structure of social networks will be taken into account to obtain dynamic trust inference. This method will be expanded to provide a multidimensional trust assessment by integrating online social networks and additional social factors.

Author Contributions

Conceptualization, E.K.K. and A.K.; software, E.K.K.; validation, E.K.K. and A.K.; formal analysis, E.K.K.; investigation, E.K.K.; resources, E.K.K.; data curation, E.K.K.; writing—original draft preparation, E.K.K.; writing—review and editing, A.K.; visualization, E.K.K.; supervision, A.K.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available within the article. Additional data will be provided by the authors upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liang, Z.; Liu, J.; Du, H.; Zhang, C. MECIM: Multi-entity evolutionary competitive influence maximization in social networks. Expert Syst. Appl. 2025, 270, 126436. [Google Scholar] [CrossRef]
  2. Golbeck, J. Trust and nuanced profile similarity in online social networks. ACM Trans. Web (TWEB) 2009, 3, 1–33. [Google Scholar] [CrossRef]
  3. Jethava, G.; Rao, U.P. Exploring security and trust mechanisms in online social networks: An extensive review. Comput. Secur. 2024, 140, 103790. [Google Scholar] [CrossRef]
  4. Mayer, R.C.; Davis, J.H.; Schoorman, F.D. An integrative model of organizational trust. Acad. Manag. Rev. 1995, 20, 709–734. [Google Scholar] [CrossRef]
  5. Gefen, D.; Karahanna, E.; Straub, D.W. Trust and TAM in online shopping: An integrated model. MIS Q. 2003, 27, 51–90. [Google Scholar] [CrossRef]
  6. McKnight, D.H.; Chervany, N.L. What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. Int. J. Electron. Commer. 2001, 6, 35–59. [Google Scholar] [CrossRef]
  7. Al-Oufi, S.; Kim, H.N.; El Saddik, A. A group trust metric for identifying people of trust in online social networks. Expert Syst. Appl. 2012, 39, 13173–13181. [Google Scholar] [CrossRef]
  8. Gong, Z.; Wang, H.; Guo, W.; Gong, Z.; Wei, G. Measuring trust in social networks based on linear uncertainty theory. Inf. Sci. 2020, 508, 154–172. [Google Scholar] [CrossRef]
  9. Ni, Y.; Xie, L.; Liu, Z.Q. Minimizing the expected complete influence time of a social network. Inf. Sci. 2010, 180, 2514–2527. [Google Scholar] [CrossRef]
  10. Ren, R.; Su, L.; Meng, X.; Wanget, J.; Zhao, M. A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating. CMES-Comput. Model. Eng. Sci. 2024, 138, 429–458. [Google Scholar] [CrossRef]
  11. Teng, F.; Liu, X.; Dong, X.; Liu, P. A novel consensus model considering individual and social behaviors under the social trust network. Inf. Sci. 2024, 670, 120587. [Google Scholar] [CrossRef]
  12. Wang, J.; Zhang, S.; Liu, X.; Jiang, Y.; Zhang, M. A novel collective matrix factorization model for recommendation with fine-grained social trust prediction. Concurr. Comput. Pract. Exp. 2017, 29, e4233. [Google Scholar] [CrossRef]
  13. Mao, C.; Xu, C.; He, Q. A cost-effective algorithm for inferring the trust between two individuals in social networks. Knowl.-Based Syst. 2019, 164, 122–138. [Google Scholar] [CrossRef]
  14. Golbeck, J.A. Computing and Applying Trust in Web-Based Social Networks. Ph.D. Thesis., University of Maryland, College Park, MD, USA, 2005. [Google Scholar]
  15. Taherian, M.; Amini, M.; Jalili, R. Trust inference in web-based social networks using resistive networks. In Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services, Washington, DC, USA, 8–13 June 2008; pp. 233–238. [Google Scholar]
  16. Liu, G.; Wang, Y.; Orgun, M. Trust inference in complex trust-oriented social networks. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, 29–31 August 2009; Volume 4, pp. 996–1001. [Google Scholar]
  17. Liu, Y.; Han, L.; Gou, Z.; Yang, Y. Personalized recommendation via trust-based diffusion. IEEE Access 2019, 7, 94195–94204. [Google Scholar] [CrossRef]
  18. Chen, X.; Yuan, Y.; Orgun, M.A.; Lu, L. A topic-sensitive trust evaluation approach for users in online communities. Knowl.-Based Syst. 2020, 194, 105546. [Google Scholar] [CrossRef]
  19. Liu, Y.; Liang, C.; Chiclana, F.; Wu, J. A knowledge coverage-based trust propagation for recommendation mechanism in social network group decision making. Appl. Soft Comput. 2021, 101, 107005. [Google Scholar] [CrossRef]
  20. Guo, J.; Zhou, Y.; Zhang, P.; Song, B.; Chen, C. Trust-aware recommendation based on heterogeneous multi-relational graphs fusion. Inf. Fus. 2021, 74, 87–95. [Google Scholar] [CrossRef]
  21. Ahmadian, S.; Ahmadian, M.; Jalili, M. A deep learning based trust-and tag-aware recommender system. Neurocomputing 2022, 488, 557–571. [Google Scholar] [CrossRef]
  22. Canturk, D.; Karagoz, P.; Kim, S.W.; Toroslu, I.H. Trust-aware location recommendation in location-based social networks: A graph-based approach. Expert Syst. Appl. 2023, 213, 119048. [Google Scholar] [CrossRef]
  23. Jiang, X.; Sun, H.; Chen, Y.; He, L. KTPGN: Novel event-based group recommendation method considering implicit social trust and knowledge propagation. Inf. Sci. 2023, 642, 119159. [Google Scholar] [CrossRef]
  24. Xing, Y.; Wang, S.; Dong, Y.; Liu, Y.; Wu, J. The trust incentive mechanism by trust propagation to optimize consensus in social network group decision making. Expert Syst. Appl. 2024, 257, 125111. [Google Scholar] [CrossRef]
  25. Cao, M.; Chiclana, F.; Liu, Y.; Wu, J.; Herrera-Viedma, E. A bilateral negotiation mechanism by dynamic harmony threshold for group consensus decision making. Eng. Appl. Artif. Intell. 2024, 133, 108225. [Google Scholar] [CrossRef]
  26. Ji, F.; Wu, J.; Chiclana, F.; Sun, Q.; Liang, C.; Herrera-Viedma, E. Decayed trust propagation method in multiple overlapping communities for improving consensus under social network group decision making. IEEE Trans. Fuzzy Syst. 2024, 32, 4401–4412. [Google Scholar] [CrossRef]
  27. Xing, Y.; Wu, J.; Chiclana, F.; Liang, C.; Yager, R.R. An incentive mechanism-based minimum adjustment consensus model under dynamic trust relationship. IEEE Trans. Cybern. 2024, 54, 3666–3678. [Google Scholar] [CrossRef]
  28. Jethava, G.; Rao, U.P. A novel trust prediction approach for online social networks based on multifaceted feature similarity. Clust. Comput. 2022, 25, 3829–3843. [Google Scholar] [CrossRef]
  29. Acharjee, S.; Panicker, A.T. Trust levels in social networks. Heliyon 2023, 9, e19850. [Google Scholar] [CrossRef]
  30. Huang, M.; Jiang, Q.; Qu, Q.; Rasool, A. An overlapping community detection approach in ego-splitting networks using symmetric nonnegative matrix factorization. Symmetry 2021, 13, 869. [Google Scholar] [CrossRef]
  31. Akbar, Z.; Ghani, M.U.; Umair, A. Boosting Viewer Experience with Emotion-Driven Video Analysis: A BERT-based Framework for Social Media Content. J. Artif. Intell. Bioinform. 2025, 1, 3–11. [Google Scholar] [CrossRef]
  32. Bondy, J.A.; Murty, U.S.R. Graph Theory; Springer Publishing Company, Incorporated: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  33. Newman, M. Networks: An Introduction; Oxford University Press: Oxford, UK, 2010. [Google Scholar]
  34. Kim, H.; Lee, B.S.; Shin, W.Y.; Lim, S. Graph anomaly detection with graph neural networks: Current status and challenges. IEEE Access 2022, 10, 111820–111829. [Google Scholar] [CrossRef]
  35. Larson, R.; Edwards, B.H.; Falvo, D.C. Elementary Linear Algebra; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  36. Singh, S.I.; Sinha, S.K. A new trust model based on time series prediction and Markov model. In Information and Communication Technologies: International Conference, ICT 2010, Kochi, Kerala, India, September 7–9, 2010, Proceedings; Springer: Berlin/Heidelberg, Germany, 2010; pp. 148–156. [Google Scholar]
  37. Norris, J.R. Markov Chains; No. 2; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
  38. Kunegis, J. Konect: The Koblenz Network Collection. In Proceedings of the 22nd International Conference on World Wide Web, Rio de Janeiro, Brazil, 13–17 May 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 1343–1350. Available online: http://konect.cc/networks/ (accessed on 5 May 2025).
  39. Johnson, D.S.; Trick, M.A. (Eds.) Cliques, Coloring, and Satisfiability: Second DIMACS Implementation Challenge, 11–13 October 1993; American Mathematical Society: Boston, MA, USA, 1996; Volume 26, Available online: https://cedric.cnam.fr/~porumbed/graphs/ (accessed on 23 April 2025).
Figure 1. An abstract for the proposed method.
Figure 1. An abstract for the proposed method.
Applsci 15 09744 g001
Figure 2. An example social network and its corresponding transition rates model.
Figure 2. An example social network and its corresponding transition rates model.
Applsci 15 09744 g002
Figure 4. Matrix, its powers, eigenvalues, and eigenvector relations.
Figure 4. Matrix, its powers, eigenvalues, and eigenvector relations.
Applsci 15 09744 g004
Figure 5. Entities’ trust in each other (The entity concerned is colored blue, the entity it trusts the most is colored green, and the entity it distrusts is colored red).
Figure 5. Entities’ trust in each other (The entity concerned is colored blue, the entity it trusts the most is colored green, and the entity it distrusts is colored red).
Applsci 15 09744 g005
Figure 6. Comparison of runtimes of three different methods in different datasets.
Figure 6. Comparison of runtimes of three different methods in different datasets.
Applsci 15 09744 g006
Table 1. Adjacency matrix of the example graph.
Table 1. Adjacency matrix of the example graph.
Actor/Actor V 1 V 2 V 3 V 4 V 5
V 1 02300
V 2 20454
V 3 34030
V 4 05306
V 5 04060
Table 2. Transition score matrix.
Table 2. Transition score matrix.
Actor/Actor V 1 V 2 V 3 V 4 V 5
V 1 00.40.600
V 2 0.1300.270.330.27
V 3 0.30.400.30
V 4 00.360.2100.43
V 5 00.400.60
Table 3. Trust scores of the graph given in Figure 2 (Td matrix).
Table 3. Trust scores of the graph given in Figure 2 (Td matrix).
Actor/Actor V 1 V 2 V 3 V 4 V 5
V 1 2.2360683.7166542.1792683.3069843.164772
V 2 0.2395290.0076450.0484730.3380740.135764
V 3 0.6623830.6281170.7564190.0102450.784918
V 4 0.281050.1681860.3131890.1188710.230325
V 5 0.2315220.2290730.2800510.1854440.179303
Table 4. Algorithm results with datasets based on real networks.
Table 4. Algorithm results with datasets based on real networks.
DatasetNumber of Nodes (n)Number of Edges (m)Node
Meaning
Edge MeaningMost Trusted Node LabelMost Distrusted Node Label
Kangaroos 11791KangarooInteraction312
Zachary Karate
Club 1
3478MemberTie831, 32
Windsurfers 143336PersonContact3320
Dolphins 162159DolphinAssociationTR77DN21
Train bombing 164243TerroristContact4864
Les Misérables 177254CharacterCo-occurenceBossuetThenardier
Political books 1105441BookCo-purchase414
David Copperfield 1112425WordAdjacencytimeworld, year
American football 1115613TeamGame912
PDZBase 1212244ProteinInteraction87211
Residence hall 12172672PersonFriendship14614
Similarities
(DBpedia) 1
430565ConceptSimilarity330228
R1000.5 21000238,267 821845
R1000.1 2100014,378 465989
flat1000_50_0 21000245,000 290902
DSJC1000.9 21000449,449 403665
Euroroads 111741417CityRoad461152
1 Taken from the Konect project implemented by Kunegis [28]. This study is a project that compiles real-world networks used in network analysis. 2 Graphs taken from DIMACS benchmark [29].
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Karadeniz Köse, E.; Karcı, A. Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra. Appl. Sci. 2025, 15, 9744. https://doi.org/10.3390/app15179744

AMA Style

Karadeniz Köse E, Karcı A. Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra. Applied Sciences. 2025; 15(17):9744. https://doi.org/10.3390/app15179744

Chicago/Turabian Style

Karadeniz Köse, Esra, and Ali Karcı. 2025. "Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra" Applied Sciences 15, no. 17: 9744. https://doi.org/10.3390/app15179744

APA Style

Karadeniz Köse, E., & Karcı, A. (2025). Social Trusty Algorithm: A New Algorithm for Computing the Trust Score Between All Entities in Social Networks Based on Linear Algebra. Applied Sciences, 15(17), 9744. https://doi.org/10.3390/app15179744

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop