{"id":"https://openalex.org/W4367046803","doi":"https://doi.org/10.1145/3543507.3583549","title":"KGTrust: Evaluating Trustworthiness of SIoT via Knowledge Enhanced Graph Neural Networks","display_name":"KGTrust: Evaluating Trustworthiness of SIoT via Knowledge Enhanced Graph Neural Networks","publication_year":2023,"publication_date":"2023-04-26","ids":{"openalex":"https://openalex.org/W4367046803","doi":"https://doi.org/10.1145/3543507.3583549"},"language":"en","primary_location":{"id":"doi:10.1145/3543507.3583549","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3543507.3583549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2023","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065948939","display_name":"Zhizhi Yu","orcid":"https://orcid.org/0000-0001-5954-3593"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhizhi Yu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0001-5954-3593","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012455357","display_name":"Di Jin","orcid":"https://orcid.org/0000-0002-7445-9936"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Di Jin","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0002-7445-9936","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089719727","display_name":"Cuiying Huo","orcid":"https://orcid.org/0000-0003-4914-4577"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cuiying Huo","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0003-4914-4577","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058630933","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-7036-1552"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0002-7036-1552","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005719375","display_name":"Xiulong Liu","orcid":"https://orcid.org/0000-0001-8414-1668"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiulong Liu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0000-0001-8414-1668","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087744818","display_name":"Heng Qi","orcid":"https://orcid.org/0000-0002-8770-3934"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Qi","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, China"],"raw_orcid":"https://orcid.org/0000-0002-8770-3934","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007475662","display_name":"Jia Wu","orcid":"https://orcid.org/0000-0002-1371-5801"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jia Wu","raw_affiliation_strings":["School of Computing, Macquarie University, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1371-5801","affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011825081","display_name":"Lingfei Wu","orcid":"https://orcid.org/0000-0002-3660-651X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lingfei Wu","raw_affiliation_strings":["Content and Knowledge Graph, Pinterest, USA"],"raw_orcid":"https://orcid.org/0000-0002-3660-651X","affiliations":[{"raw_affiliation_string":"Content and Knowledge Graph, Pinterest, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5065948939"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":3.749,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.94457204,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"727","last_page":"736"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.8188750147819519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7252594232559204},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49228301644325256},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4907149076461792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47224968671798706},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.42980772256851196},{"id":"https://openalex.org/keywords/knowledge-graph","display_name":"Knowledge graph","score":0.42121490836143494},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36947327852249146},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35346439480781555},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2630190849304199},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1681467890739441},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09235838055610657},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.05229023098945618}],"concepts":[{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.8188750147819519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7252594232559204},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49228301644325256},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4907149076461792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47224968671798706},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.42980772256851196},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.42121490836143494},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36947327852249146},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35346439480781555},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2630190849304199},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1681467890739441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09235838055610657},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.05229023098945618}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3543507.3583549","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3543507.3583549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2023","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1974456473","https://openalex.org/W2009205701","https://openalex.org/W2019512103","https://openalex.org/W2036852015","https://openalex.org/W2096994246","https://openalex.org/W2110753472","https://openalex.org/W2133299088","https://openalex.org/W2265587106","https://openalex.org/W2558476738","https://openalex.org/W2762353177","https://openalex.org/W2919717192","https://openalex.org/W2945623882","https://openalex.org/W2951533109","https://openalex.org/W2997638284","https://openalex.org/W3003714129","https://openalex.org/W3004372885","https://openalex.org/W3036106327","https://openalex.org/W3039500550","https://openalex.org/W3047456059","https://openalex.org/W3090516735","https://openalex.org/W3101543043","https://openalex.org/W3119532779","https://openalex.org/W3127584905","https://openalex.org/W3151929433","https://openalex.org/W3155224787","https://openalex.org/W3155886566","https://openalex.org/W3157022402","https://openalex.org/W3173955760","https://openalex.org/W3194841521","https://openalex.org/W3200571251","https://openalex.org/W4206445139","https://openalex.org/W4207040171","https://openalex.org/W4211248866","https://openalex.org/W4285122420","https://openalex.org/W4302769930"],"related_works":["https://openalex.org/W2076536433","https://openalex.org/W90316445","https://openalex.org/W4327743613","https://openalex.org/W2965447900","https://openalex.org/W3199750033","https://openalex.org/W2374509987","https://openalex.org/W3163373470","https://openalex.org/W3005856188","https://openalex.org/W1898221464","https://openalex.org/W4289783037"],"abstract_inverted_index":{"Social":[0],"Internet":[1,30],"of":[2,14,29,31,91,113,167,196,209,240],"Things":[3],"(SIoT),":[4],"a":[5,40,66,126,161,174,197,200,203,216],"promising":[6],"and":[7,38,42,102,149,169,185],"emerging":[8],"paradigm":[9],"that":[10,54,178],"injects":[11],"the":[12,23,26,36,80,88,98,111,165,194,224,237],"notion":[13],"social":[15],"networking":[16],"into":[17,164],"smart":[18],"objects":[19],"(i.e.,":[20],"things),":[21],"paving":[22],"way":[24,68],"for":[25,61,133],"next":[27],"generation":[28],"Things.":[32],"However,":[33],"due":[34],"to":[35,45,74,85,109,154,159,189,222],"risks":[37],"uncertainty,":[39],"crucial":[41],"urgent":[43],"problem":[44],"be":[46],"settled":[47],"is":[48,93,220],"establishing":[49],"reliable":[50],"relationships":[51,188,226],"within":[52],"SIoT,":[53],"is,":[55],"trust":[56,62,104,115,135,187,211,217,225],"evaluation.":[57],"Graph":[58],"neural":[59,130],"networks":[60],"evaluation":[63,136],"typically":[64],"adopt":[65],"straightforward":[67],"such":[69],"as":[70,199],"one-hot":[71],"or":[72,202],"node2vec":[73],"comprehend":[75],"node":[76,183,191],"characteristics,":[77],"which":[78,106],"ignores":[79],"valuable":[81],"semantic":[82],"knowledge":[83,144],"attached":[84],"nodes.":[86,229],"Moreover,":[87],"underlying":[89],"structure":[90,101],"SIoT":[92,114,210],"usually":[94],"complex,":[95],"including":[96],"both":[97],"heterogeneous":[99,180],"graph":[100,129,181],"pairwise":[103,228],"relationships,":[105],"renders":[107],"hard":[108],"preserve":[110],"properties":[112,208],"during":[116,212],"information":[117,213],"propagation.":[118,214],"To":[119],"address":[120],"these":[121],"aforementioned":[122],"problems,":[123],"we":[124,140,172],"propose":[125],"novel":[127],"knowledge-enhanced":[128],"network":[131],"(KGTrust)":[132],"better":[134],"in":[137,157],"SIoT.":[138],"Specifically,":[139],"first":[141],"extract":[142],"useful":[143],"from":[145,193],"users\u2019":[146],"comment":[147],"behaviors":[148],"external":[150],"structured":[151],"triples":[152],"related":[153],"object":[155],"descriptions,":[156],"order":[158],"gain":[160],"deeper":[162],"insight":[163],"semantics":[166],"users":[168],"objects.":[170],"Furthermore,":[171],"introduce":[173],"discriminative":[175],"convolutional":[176],"layer":[177,219],"utilizes":[179],"structure,":[182],"semantics,":[184],"augmented":[186],"learn":[190],"embeddings":[192],"perspective":[195],"user":[198],"trustor":[201],"trustee,":[204],"effectively":[205],"capturing":[206],"multi-aspect":[207],"Finally,":[215],"prediction":[218],"developed":[221],"estimate":[223],"between":[227],"Extensive":[230],"experiments":[231],"on":[232],"three":[233],"public":[234],"datasets":[235],"illustrate":[236],"superior":[238],"performance":[239],"KGTrust":[241],"over":[242],"state-of-the-art":[243],"methods.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
