Next Article in Journal
An Attempt to Develop a Model of Brain Waves Using Quantitative Electroencephalography with Closed Eyes in K1 Kickboxing Athletes—Initial Concept
Previous Article in Journal
Person-Specific Gaze Estimation from Low-Quality Webcam Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bidirectional Trust-Enhanced Collaborative Filtering for Point-of-Interest Recommendation

College of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
Submission received: 8 March 2023 / Revised: 16 April 2023 / Accepted: 19 April 2023 / Published: 20 April 2023
(This article belongs to the Section Physical Sensors)

Abstract

:
A personalized point-of-interest (POI) recommender system is of great significance to facilitate the daily life of users. However, it suffers from some challenges, such as trustworthiness and data sparsity problems. Existing models only consider the trust user influence and ignore the role of the trust location. Furthermore, they fail to refine the influence of context factors and fusion between the user preference and context models. To address the trustworthiness problem, we propose a novel bidirectional trust-enhanced collaborative filtering model, which investigates the trust filtering from the views of users and locations. To tackle the data sparsity problem, we introduce temporal factor into the trust filtering of users as well as geographical and textual content factors into the trust filtering of locations. To further alleviate the sparsity of user-POI rating matrices, we employ a weighted matrix factorization fused with the POI category factor to learn the user preference. To integrate the trust filtering models and the user preference model, we develop a fused framework with two kinds of integrating methods in relation to the different impacts of factors on the POIs that users have visited and the POIs that users have not visited. Finally, we conduct extensive experiments on Gowalla and Foursquare datasets to evaluate our proposed POI recommendation model, and the results show that our proposed model improves by 13.87% at precision@5 and 10.36% at recall@5 over the state-of-the-art model, which demonstrates that our proposed model outperforms the state-of-the-art method.

1. Introduction

Currently, the rapid development of the social internet of things is promoting the realization of a smart city [1]. With the growing popularization of modern mobile communication technologies (i.e., mobile devices, wireless networks, and 5G communication), more and more location-based social networks (LBSNs) have emerged, such as Gowalla, Foursquare, and Weibo, etc., where users are able to instantaneously share locations visited by them. In relation to this, if we can obtain and make full use of the collected information, including user check-in records and contexts from LBSNs, the accuracy of personalized POIs recommended to users would then greatly improve. Furthermore, with a user’s POI information, it is possible to know when the user is at which location and how often he/she appears at the location. This will not only help us to explore potential customers but also design advertisements to attract customers.
In LBSNs, a personalized POI recommendation aims to recommend unvisited POIs to targeted users in terms of users’ historical check-ins [2,3], which is of great significance in the realization of a smart city. This is because the received recommendation results are beneficial for users’ personalized demands, users’ behavior trends or trajectory predictions, as well as certain traffic fields related to users’ behavior trends. However, to accurately predict whether a personalized user will visit a specific location at a specific time based on historical check-ins, it is a critical challenge to cope with the issue of data sparsity and trustworthiness. For example, in real-world Gowalla and Foursquare datasets, the user-POI checking-in density is 0.291% and 0.385%, respectively, and the user-POI rating matrix contains some noise [4,5], i.e., fake ratings and malicious feedbacks.
For this study, we have divided existing works into two categories:
(1)
Fused multiple factors models [6,7,8,9,10,11]: These works consider the roles of various context factors in order to determine and match user preferences, i.e., geographical, social, temporal, POI category, and textual content factors. The authors employ different advanced techniques to integrate these factors for POI recommendations, i.e., matrix factorization, convolution neural network, graph neural network, recurrent neural network, and deep neural network. However, all of them assume the user-POI rating is reliable and ignore the unreliable rating involved in check-ins. There is no doubt that if unreliable noise data are not excluded, the accuracy of recommendation is limited regardless of the model’s optimization.
(2)
Trust-enhanced models [12,13,14,15]: These works [12,13,14] propose a user–user trust matrix modeled by calculating the trust relationship between users. Combining the user trust matrix and the user rating, they achieve the trust-enhanced similarity between users. The work [15] proposes a DeepWalk-based trust similarity measurement running over a co-visited network. Nevertheless, all of them ignore the temporal factor influence on the user similarity, leading to biased similarities. For example, the user u k visits POI l 1 and l 2 at time t 1 and t 2 , respectively, while u i checks in l 2 and l 1 at time t 1 and t 2 , respectively. When not considering time, the similarity between the two users is 1. However, if taking time into account, the similarity between them is 0, since the time of their check-ins on the two POIs is different. Existing methods fail to distinguish the difference. Furthermore, these authors only consider the trust filtering from the view of users, resulting in insufficient trustworthiness evaluations. For example, given a location l j and the check-in set L i ( l j L i ) visited by u i , l j could be recommended to u i due to their stronger correlations on geographical or textual content factors. However, l j may not be a good choice for u i when it is rated by other unreliable users. Existing methods fail to consider the trust filtering from the view of locations.
To summarize, existing works suffer from two shortcomings:
  • These works fail to refine the influence of context factors and fusion between the user preference and context models;
  • These works ignore the role of the trust filtering from the view of locations.
To make up the shortcomings of existing works, we are the first to propose a novel bidirectional trust-enhanced collaborative filtering model for both trustworthiness and data sparsity problems. We have developed a trustworthy community combining the direct trust and the indirect trust between users, where the collaborative filtering is performed from the views of users and locations via leveraging temporal, geographical, and textual content factors. Secondly, to further alleviate the sparsity of user-POI rating matrices, we integrate a POI category factor into a weighted matrix factorization to learn the user preference. Thirdly, we develop a fused framework with two kinds of integrating methods for the trust filtering and the user preference models, which considers the different impacts of factors on the POIs that users have visited and the POIs that users have not visited. Finally, we conduct extensive experiments on two real-world datasets to evaluate our proposed POI recommendation model and baseline methods.
To sum up, our main contributions are as follows:
  • We propose a novel bidirectional trust-enhanced collaborative filtering model, which performs the trust filtering from the views of users and locations via leveraging temporal, geographical, and textual content factors. To our knowledge, we are the first to focus on trust filtering from the views of users and locations.
  • We refine the influence of context factors against the data sparsity problem.
  • We develop a fused framework for the trust filtering and the user preference models, which considers the different impacts of factors on the POIs that users have visited and the POIs that users have not visited.
The remainder of the paper is organized as follows. In Section 2, we review some state-of-the-art-related works. We present the overview and technical details of our proposed recommendation model in Section 3. In Section 4, we present our experimental setup and results. In Section 5, we conclude our work.

2. Related Works

In this paper, our proposed model aims to address the data sparsity and trustworthiness problems in POI recommender systems, and thus we review the related literature, including fused multiple context factors POI recommendations against data sparsity problem and trust-enhanced POI recommendations filtering out noise information.

2.1. Fused Multiple Factors POI Recommendations

To alleviate data sparsity, more and more work focus on exploring the roles of different context factors, i.e., geographical, social, temporal, POI category, and textual content factors. Gao et al. [16] model four types of friendships based on the geographical location and social relationship. Li et al. [17] propose three types of friendships, including social friends, location friends, and neighboring friends, which are fused into a unified matrix factorization framework with two loss functions for POI recommendation. Since user check-in behaviors vary with time, capturing user check-in temporal features is essential. Yuan et al. [18] propose a temporal factor-enhanced collaborative filtering model to recommend POIs at a specific time. Gao et al. [19] propose a spatiotemporal recommender network model to recommend unvisited POIs to a given user at a specific time in a day. However, these methods only consider a few context factors such as geographical, social, and temporal factors, causing a limited alleviation of data sparsity. Compared with them, our proposed model considers more context factors in predicting user POIs.
Furthermore, to utilize more context factors, some hybrid models have been proposed. Zhang et al. [6] propose a fused matrix factorization with multi-tag, social, and geographical factors for POI recommendation, where the multi-tag factor is extracted from the user-POI rating matrix. Xing et al. [7] propose a content-aware POI recommendation based on the convolutional neural network, which introduces three types of content information, including POI properties, user interests, and sentiment indications. Davtalab et al. [8] propose a probabilistic matrix factorization model integrating social spatiotemporal information, which develops a multivariable inference approach using the latent social space, geographical space, and POI category space similarities for POI recommendation. Liu et al. [9] argue that spatial and temporal effects should be analyzed simultaneously in POI recommendation, and they design a four-way neural interaction model over a spatiotemporal heterogeneous information network to mine user preferences. In addition, some works integrate various contexts to capture the user’s next POIs in terms of his/her current check-in trajectory. Li et al. [10] propose an attention-based spatiotemporal gated graph neural network model for sequential POI recommendations. Dai et al. [20] propose a unified spatiotemporal neural network framework via leveraging users’ check-in records and social ties, and the framework recommends POIs to users by joint embedding and sequential modeling. Chakraborty et al. [21] propose an unsupervised, generic framework involving a factored relevance model, which balances this trade-off between user historical preferences and current preferences. Yu et al. [22] propose a top-K initial POI recommendation model by considering the influence of similarity, popularity, and location of POIs, which is then used to further achieve subsequent recommendations through transfer probability. Wu et al. [11] present a personalized next POI recommendation framework, where they employ a long- and short-term method to learn the specific preference for each user by fusing the POI category and check-in time information. Xu et al. [23] develop a multi-modal collaborative filtering which focuses on addressing efficient cold-start recommendation. They map multi-modal auxiliary features of users and items into binary hash codes and leverage a novel discrete optimization strategy to learn the user and item codes, reducing the storage cost in the hash optimization process. Considering that existing recommender systems fail to explain recommendations to users, Zhu et al. [24] propose an explainable discrete collaborative filtering, which is a multi-task learning framework fully exploiting the correlations between the preference prediction task and the explanation generation task based on hash codes for users and items. Margaris et al. [25] propose a novel collaborative filtering with the experiencing period criterion, aiming to keep recommendations close to users’ patterns of practice. It can delay recommending a newly released item to users that prefer to delay the experience of new items in a particular category, while recommending these new items to other users who intend to experience trendy items in time. Wang et al. [26] develop a novel spatial-temporal and text representation learning framework which can learn long-term dependencies among visits in check-in sequences, users’ perspectives, and POIs’ reputations from textual reviews. Fang et al. [27] construct the user–POI interaction graph, the user social graph, and the POI geographical vector, which are fused via a graph neural network for POI recommendations. Nevertheless, these methods ignore the unreliable rating involved in check-ins, which lead to limited accuracy, although they employ different techniques to optimize the recommendation model. In contrast, our proposed model considers trust filtering from the views of users and locations.

2.2. Trust-Enhanced POI Recommendations

To filter out noise information in user rating matrices and achieve trust-enhanced recommendations, some works take the trust relationship between users in LBSNs into account. Deng et al. [28] propose a relevant trust walker to generate personalized POI recommendations, which enhances the trust relationship between similar users. Logesh et al. [12] propose a social pertinent trust walker model, which utilizes a modified random walk based on trust pertinence calculated by matrix factorization for POI recommendation. Liu et al. [29] propose a trust-aware recommendation model, where the trust relationship is measured by combining explicit and implicit trust between users. Ahmadian et al. [30] propose an effective neighbor selection mechanism for removing unreliable users from the nearest neighbor set, which enhance the accuracy of recommendations. Guo et al. [31] leverage implicit feedbacks of users to measure trust relationships between users. The trust relationship is used to model three factored similarities. Guo et al. [32] propose three heterogeneous graphs, including user–item interaction graph, user–user trust relation graph, and item–item knowledge graph. They present recommendations to users by fusing these heterogeneous graphs. Ahmed et al. [33] and Ma et al. [34] integrate the user trust relationship into deep neural networks for cross-domain recommendations, respectively. Zhao et al. [35] propose a fused user trust relationships tensor factorization model to address trustworthiness and data sparsity problems, where the trust relationships are divided into unilateral trust and mutual trust for an improved use of social information. Wang et al. [15] propose a trust-enhanced collaborative filtering model which fuses the geographical influence, temporal influence, and trust relationship learned by DeepWalk model running over the user co-visiting network. Ahmadian et al. [13,14] develop a trust matrix from user trust networks that are modeled by combining the similarities of user implicit ratings and the trust relationship between users. Additionally, the authors input trust matrices, user-item rating matrices, and user-tag matrices into a deep neural network to learn user preferences. These methods employ different techniques such as random walk, deep walk, and trust matrix to enhance trustworthiness. However, they only consider trust filtering from the view of users, resulting in insufficient trustworthiness evaluations. In contrast, our proposed model performs trust enhancement from the views of users and locations.

3. Proposed Recommendation Model

3.1. Problem Formulation

We focus on the research of a novel POI recommendation model with bidirectional trust filtering, which recommends unknown or unvisited POIs to targeted users in LBSNs on the premise of reliable users and locations, as illustrated in Figure 1. Firstly, to establish the trust weighted matrix, we propose a trustworthy community modeled by the combination of direct and indirect trusts, where reliable users and their corresponding visited POIs are included. We perform the collaborative filtering from the views of these users and locations in the trustworthy community. From the point of view of users, we propose a time-aware similarity measurement between users for modeling the user similarity matrix. We fuse the trust-weighted matrix and the user-similarity matrix to perform the trust user-based collaborative filtering and capture the trust user influence matrix. From the point of view of locations, we develop a location correlation measurement by leveraging geographical and content factors for modeling the POI geographical correlation matrix. We fuse the trust-weighted matrix and the geographical correlation matrix to achieve the trust location-based collaborative filtering and obtain the trust location influence matrix. Secondly, we integrate the POI category factor into a weighted matrix factorization to learn the user preference matrix to address sparse user-POI rating matrices. Thirdly, we present two kinds of integrating methods for the trust filtering and the user preference models, and the first fusion is to integrate the non-zero entities in the user preference matrix into the trust filtering models, and the second fusion is to take zero entities in the user preference matrix into the first fusion. Afterward, we can achieve top-k POIs that the target user would be interested in. The descriptions of some key notions are presented in Table 1.
Definition 1.
(point-of-interest, POI l j ). Let  l j = ( l j . l o c ,   l j . d o c ) , where  l j . l o c represents the geographical location of  l j , and  l j . d o c  indicates the textual content of  l j . Let a POI set be  L = { l 1 , l 2 , , l j } .
Definition 2.
(trustworthy community, TC). Let  T C = ( U , N i c ) ,  U = { u 1 , u 2 , , u k }  is a trust user set of  u i , where there are the trust relationships between  u k  and  u i . N i c = { N i c h e 1 , N i c h e 2 , ,   N i c h e k } , where  N i c h e k  is a set of locations that are visited by  u k .
Definition 3.
(trust relationship, TR). TR consists of direct trust (DTR) and indirect trust (IDTR). DTR: if  u k  and  u i  covisit POIs  L , then there is DTR between  u k  and  u i . IDTR:  u k  and  u i  do not covisit POIs  L , but if there is DTR between  u k  and  u p  as well as  u p  and  u i , then there is IDTR between  u k  and  u i .

3.2. Modeling Trustworthy Community from LBSNs

We believe that it is an effective method to obtain DTR whereby both recommended users and the target user directly participate in the interactions of check-in POIs, where the trust is measured according to their ratings. Due to the applicability of the beta trust model [36] in building trust relationships based on a large number of ratings, we employ it to measure DTR between users. Moreover, compared with other clustering- and graph-learning methods, the beta model is simpler, more practical, and has lower time complexity. Let both u k and u i check in at l j , and the ratings of u k and u i on l j are r k , j and r i , j , respectively. When | r k , j r i , j | is less than a fixed value, the recommendation to u i leveraging u k ’s preference is positive, when otherwise negative. n k , i and n ¯ k , i are, respectively, the frequency of positive and negative recommendations. We use the beta probability density function to calculate the posterior probabilities ( ρ ,   1 ρ ) of positive and negative recommendations. D T R k , i can be calculated as follows:
D T R k i = Γ ( n ¯ k , i + n k , i + 2 ) Γ ( n ¯ k , i + 1 ) Γ ( n k , i + 1 ) ρ n k , i ( 1 ρ ) n ¯ k , i
where Γ is the gamma function, 0 ρ 1 . In recommender systems, the sparse phenomenon of the user interaction is common, thus a DTR between two users may not exist. We believe that IDTR mining is very essential to enhance the completeness of the trust relationship. As Definition 3 illustrated, IDTR can be measured through the transfer of DTR. When D is a set consisting of the users that have DTR with the target user, the proposed I D T R k i can then be calculated by combining D T R k p , as follows:
I D T R k i = u p D D T R p i · D T R k p u p D D T R p i
Based on D T R k i and I D T R k i , we can gain the trust relationship between u k and u i by:
T R k i = α D T R k i + ( 1 α ) I D T R k i
where α is a weighted parameter which denotes the relative importance of DTR to TR, and 0 α 1 . We adopt a threshold θ to eliminate unreliable users and reserve trustworthy ones. When T R k i θ , u k and corresponding N i c h e k are reserved, or otherwise eliminated.

3.3. Trust User-Based Collaborative Filtering

We measure the similarities between u k and u i from two aspects. One is the geographical similarity. According to Tobler’s First Law of Geography [37], everything is related to everything else, but near objects are more related with each other than distant objects. Thus, we believe that closer users are more similar. We employ the kernel function triangular method with nonparametric to estimate the user similarity on geography. Triangular can filter out users with low geographical correlations in contrast to other kernel functions (i.e., Gaussian). Specifically, the geographical similarity g s k i can be calculated as follows:
g s k i = ( 1 d ( u k , u i ) b ) I b
where d ( u k , u i ) returns the geographical distance between their residences. b is a width of the kernel function. I b is an indicator function (if d ( u k , u i ) b , then I b = 1 , otherwise I b = 0 ). Thus, when d ( u k , u i ) b , the smaller d ( u k , u i ) is, and the larger g s k i is.
Another similarity is checking-in behavior similarity. We argue that the checking-in similarity between users should be considered by the same POIs and the similar POIs visited by them. For instance, u k and u i have visited l j , which could show that they have a similar preference. Additionally, u k has visited l j and u i has checked in l p , and l j and l p belong to the same category, which could show that they have a similar preference to some extent. Simultaneously, we observe that the checking-in frequency and time are important for the similarity measurement. The higher the frequency of both u k and u i visiting l j , the higher the similarity between u k and u i . The more consistent the time of both u k and u i checking-in l j is, the higher the similarity between u k and u i is. Therefore, we present a novel similarity measurement by taking these mentioned factors into account. We utilize CBOW model [38] to learn user checking-in behavior patterns and calculate the similarity with Earth Mover’s Distance [39] E M D ( u k , u i ) .
Let the behavior patterns of u i and u k at time t be W i t and W k t , respectively.   W i t = { ( w p 1 ,   c p 1 ) , ( w p 2 ,   c p 2 )   , ( w p m ,   c p m   ) } and W k t = { ( w q 1 ,   c q 1 ) , ( w q 2 ,   c q 2 ) ,   ,   ( w q n ,   c q n   ) } , where w i is a word indicating l j , and c i is the normalized frequency of w i . T is a piece of a set of time slots, T = { 1 , 2 , , 24 } ,   t   T . Note that we integrate temporal factor into user checking-in behavior patterns to distinguish the check-ins at different times, leading to magnifying data sparsity. To address this challenge, we adopt a smoothing check-in method. Let the check-in vector corresponding to W i t be i , t = { C i , 1 , t   , C i , 2 , t , , C i , j , t } , where C i , j , t = 1 if u i has visited l j at time t , and C i , j , t = 0 , or otherwise. We propose to utilize the similarity η t , t between the vectors at t and t measured by Cosine similarity to smooth i , t as follows:
C ^ i , j , t = t = 1 T η t , t t = 1 T η t , t C i , j , t  
and we add C ^ i , j , t to i , t for updating W i t . Similarly, we update W k t via smoothing k , t . Such improved E M D ( u k , u i ) can be calculated as follows:
E M D ( u k , u i ) = min f k i t = 1 T i = 1 m k = 1 n f k i d k i t = 1 T i = 1 m k = 1 n f k i  
S . t .   f k i 0
i = 1 m f k i c q k ,   1 k n
k = 1 n f k i c p i   , 1 i m
k = 1 n i = 1 m f k i = m i n ( i = 1 m c p i   ,   k = 1 n c q k   )
where f k i is the consumption of conversion from w q k to w p i and d k i indicates the distance between w q k and w p i , as calculated by:
d k i = v ( w q k ) v ( w p i ) 2  
and then the checking-in behavior similarity c s k , i can be calculated as follows:
c s k , i = ( 1 E M D ( u k , u i ) )  
Accordingly, we can gain the similarity between u k and u i by:
s k , i = g s k , i c s k , i  
and further, the preference of the targeted user u i influenced by trust users can be estimated as follows:
U i , j = u k T C T R k , i s k , i C k , j u k T C T R k , i s k , i  

3.4. Trust Location-Based Collaborative Filtering

We measure the correlation between locations from two aspects. One is the geographical correlation. Considering that the POIs in N i c h e i is personalized, we develop an adaptive bandwidth-based kernel density estimation for the personalized geographical correlation. u i has visited POI set N i c h e i = { l 1 , l 2 , , l q ,   , l n } . r i , q is the frequency of u i checking in at l q , which is the weight of l q . The larger r i , q is, the more u i prefers l q . Based on N i c h e i , the geographical correlation can be calculated as follows:
P g ( l j | N i c h e i ) = 1 N ( q = 1 n r i , q K H h i ( l j l q ) )  
and
N = q = 1 n r i , q    
where l j is visited by u k T C ,   l j N i c h e k , thereby enhancing the trust of l j . K H h i ( l j l q ) is a kernel function with respect to the adaptive bandwidth h i based on the fixed bandwidth H , including two global bandwidths ( H 1 , H 2 ) which are calculated according to ( 4 σ 5 / 3 n ) 1 / 5 = 1.06 σ n 1 / 5 [40], where σ is the standard deviation of the geographical coordinates of l q and l p ( l q , l p N i c h e i ):
H 1 = 1.06 n 1 5 1 N ( q = 1 n r i , q x q 1 N p = 1 n r i , p x p ) 2  
and
H 2 = 1.06 n 1 5 1 N ( q = 1 n r i , q y q 1 N p = 1 n r i , p y p ) 2  
We further propose to obtain h i for N i c h e i by utilizing the fixed bandwidth H , as follows:
h i = ( P ^ ( l q |   L i ) Z 1 ) β  
P ^ ( l q |   L i ) = 1 N ( p = 1 n r i , p K H ( l q l p ) )  
and
K H ( l q l p ) = 1 2 π H 1 H 2 exp ( ( x q x p ) 2 H 1 2 ( y q y p ) 2 H 2 2 )  
where K H ( l q l p ) is a standard kernel function of H consisting of ( H 1 H 2 ) . β is a sensitive parameter, 0 β 1 , and the larger β is, the more sensitive h i is to P ^ ( l q |   L i ) . Z represents the geometric mean of P ^ ( l q |   L i ) , calculated as follows:
Z = q = 1 n P ^ ( l q | L i ) n
Then, K H h i ( l j l q ) can be calculated as follows:
K H h i ( l j l q ) = 1 2 π H 1 H 2 h i 2 e x p ( ( x j x q ) 2 H 1 h i 2 ( y j y q ) 2 H 2 h i 2 )
where ( x q , y q ) and ( x q , y q ) correspond to the geographical coordinates of l q and l j , respectively.
Next is the textual content correlation. The textual content of a POI illustrates the profile and equipment which shows what the user prefers. Through exploring the correlations between visited POIs and non-visited POIs, we can capture the potential POIs for users. We employ a topic model to capture contents and measure the correlation between them. Currently, latent Dirichlet allocation (LDA) is one of the most popular techniques for drawing topics. However, it fails to consider the temporal influence on the topic. We employ a beta distribution model to normalize the time from 0 to 1 in a day based upon the consideration that time is intrinsically continuous rather than discrete [18,19,41]. Essentially, we draw POIs’ contents by topics and place textual contents of the same POIs together; thus, we can obtain a larger document set for each POI, which is represented as a random mixture of potential topics. Afterward, we will draw the topic features from documents using the word distribution with timestamps. The detailed steps are as follows:
Draw a multinomial Φ z from a Dirichlet prior β for each topic z: Φ z | β Dirichlet ( β ) .
Draw a multinomial θ d from a Dirichlet prior α for each document d for the location l j : θ d | α Dirichlet ( α ) .
Draw a topic z d i from multinomial θ d for each word w d i in document d for the location l j : z d i | θ d Multinomial ( θ d ) .
Draw a word w d i from multinomial Φ z d i for each word w d i in document d for the location l j : w d i | Φ z d i Multinomial ( Φ z d i ) .
Draw a timestamp Γ d i from Beta Ψ z d i for each word w d i in document d for the location l j : 𝒯 d i | Ψ z d i B e t a ( Ψ z d i ) .
We propose to employ Gibbs sampling to achieve the topic draw and obtain the conditional distribution based on the chain rule:
P ( Z d i | w , 𝒯 , Z d i , α , β , Ψ ) = ( m d z d i + α z d i 1 × n z d i w d i + β w d i 1 v = 1 V ( n z d i v + β v ) 1 × ( 1 𝒯 d i ) Ψ z d i 1 1 𝒯 d i Ψ z d i 2 1 B e t a ( Ψ z d i 1 , Ψ z d i 2
where z d i indicates the topic assignments for all tokens w d i in document d for location l q . 𝒯 B e t a ( Ψ z d i 1 , Ψ z d i 2 ) is updated as follows:
Ψ z d i 1 𝒯 z ( 𝒯 z ( 1 𝒯 z ) s z 2 1 )
and
Ψ z d i 2 ( 1 𝒯 z ) ( 𝒯 z ( 1 𝒯 z ) s z 2 1 )
where 𝒯 z and s z 2 indicate the timestamp sampling mean and covariance to topic z in profiles, respectively.
To summarize, the textual content correlation can be calculated as follows:
P c ( l j | N i c h e i ) = l q N i c h e i , i d P ( Z d i | w , Γ , Z d i , α , β , Ψ )
Accordingly, we can gain the correlation between l j and N i c h e i , and the preference of the targeted user u i influenced by trust locations can be estimated as follows:
i , j = T R k , i P g ( l j N i c h e k | N i c h e i ) P c ( l j N i c h e k | N i c h e i )

3.5. Fused Model

We integrate U i , j and i , j with the product rule, which has been widely applied to the fusing of different context factors, showing high robustness [42,43,44]:
i , j = U i , j i , j
Indeed, the context factor plays an important role in predicting users’ POIs, especially in data sparsity and cold-start problems. Meanwhile, user preference is much more important. In general, matrix factorization-based user preference modeling is common. Let p i be K-dimensional potential vector for u i , p i P ,and q j be K-dimensional potential vector for l j , q j Q . Then, user preference can be denoted as I i , j = p i T q j . Accordingly, fused user preference models can be simply divided into two kinds. One is the Gaussian-distribution-based probability model, which weights non-zero entities as 1 and missing entities (zero entities) as 0. Another is the weighted matrix factorization model (WMF) [45], which weighs all entities as non-zero values in terms of check-in frequency. The details are as follows:
W i , j = 1 + log ( 1 + 10 ε r i , j )  
where W i , j is the user preference weight, and ε is an adjustable parameter used to control the growth rate of W i , j with increasing r i , j . Taking the significance of missing entities into account, we adopt WMF as the basic fused framework for POI recommendation, as follows:
min U , L G = i = 1 | U | j = 1 | L | W i , j ( C i , j ( I i , j + i , j ) ) 2 + λ p i = 1 | U | | | p i | | 2 + λ q j = 1 | L | | | q i | | 2  
where λ p and λ q are the regularization coefficients. Note that I i , j is still quite sparse in Equation (27). Therefore, we introduce the POI category factor into it. For example, if u i repeatedly visits l j that is a wetland park, u i may prefer this kind of POI. Consequently, the POI category factor can help model user preference and alleviate data sparsity. Let v c j be the K-dimensional potential vector that represents the category c for l j , c C , and v c V . We can thus improve user preference I i , j as:
I i , j = p i T ( q j + γ v c j )  
where γ is a trade-off parameter used to balance POI category influence to I i , j . Accordingly, we rewrite G as follows:
min U , L G = i = 1 | U | j = 1 | L | W i , j ( C i , j ( I i , j + i , j ) ) 2 + λ p i = 1 | U | | | p i | | 2 + λ q j = 1 | L | | | q j | | 2 + λ v c = 1 | C | | | v c | | 2  
where we introduce a regularization term c = 1 | C | | | v c | | 2 for the POI category, and λ v is the corresponding regularization coefficient. Furthermore, we observe that if u i has visited l j ( C i , j = 1 ), then I i , j + i , j will fit to C i , j = 1 . When i , j is smaller, I i , j may be larger to make up for I i , j + i , j 1 . For instance, l j is more distant from u i , but u i may prefer l j . Conversely, when I i , j is smaller, i , j may be larger to make up for I i , j + i , j 1 . For instance, u i has a weak interest in l j , but l j is more nearby to u i . Therefore, the context factor is essential when predicting POIs. While if C i , j = 0 , I i , j + i , j will fit to C i , j = 0 , thus I i , j < 0 due to i , j > 0 , which is unreasonable. The reason is that C i , j = 0 does not mean that u i is not interested in l j , and maybe u i does not know it exists. Surely, we can not conclude that u i is interested in l j , so that we believe that the better method is only I i , j is used to fit the user check-in. Finally, we present the refined objective function G as follows:
min U , L G = i = 1 | U | j = 1 ( u i , l j R ) | L | W i , j ( C i , j ( I i , j + i , j ) ) 2 + i = 1 | U | j = 1 ( u i , l j R ) | L | I i , j 2 + λ p i = 1 | U | | | p i | | 2 + λ q j = 1 | L | | | q j | | 2 + λ v c = 1 | C | | | v c | | 2  
To optimize G , we need to update matrix P , Q , and V . Considering that the user-POI rating matrix R is sparse where most missing entities exist, we will mainly deal with missing entities in the update process, such as u i , l j R I i , j 2 . Notably, there is no context factor in u i , l j R I i , j 2 , thus we can preprocess it offline to reduce time consumption. We develop an optimization method similar to eALS [46], which updates an element at a time instead of a vector. The advantage of the optimization is that it can avoid a large amount of time consumption caused by matrix transpose. Let x i , f , y j , f , and z c , f be the elements for P , Q , and V , respectively, and the following is achieved:
x i , f = j R i 𝒲 i , j h j , f ( C i , j ( I i , j x + i , j ) ) j R i h j , f I i , j x j R i 𝒲 i , j h j , f 2 + j R i h j , f 2 + λ p = j R i h j , f ( 𝒲 i , j ( C i , j i , j ) I i , j x ( 𝒲 i , j 1 ) ) j R i ( 𝒲 i , j 1 ) h j , f 2 + ψ f , f h + λ p e f x i , e ψ f , e h j R i ( 𝒲 i , j 1 ) h j , f 2 + ψ f , f h + λ p      
where h j , f and I i , j x are indicated as follows:
h j , f = y j , f + γ v c j , f  
and
I i , j x = I i , j x i , f h j , f  
and ψ f , e h is an element for the defined cache matrix Φ h :
Φ h = j = 1 | L | ( q j + γ v c j ) ( q j + γ v c j ) T  
Similarly,
y j , f = i R j x i , f ( W i , j ( C i , j i , j ) I i , j y ( W i , j 1 ) ) i R j ( W i , j 1 ) x i , f 2 + ψ f , f p + λ q e f y j , e ϕ f , e p + γ e = 1 K v c j , f ψ f , e p i R j ( W i , j 1 ) x i , f 2 + ψ f , f p + λ q  
and
z c , f = j 𝒞 c ( i R j γ x i , f ( W i , j ( C i , j i , j ) I i , j z ( W i , j 1 ) ) ) j 𝒞 c ( j R i γ 2 ( 𝒲 i , j 1 ) x i , f 2 + γ 2 ψ f , f p ) + λ v j 𝒞 c ( γ 2 e f z c j , f ψ f , e p + γ e = 1 K y j , e ψ f , e p ) j 𝒞 c ( j R i γ 2 ( W i , j 1 ) x i , f 2 + γ 2 ψ f , f p ) + λ v  
where ψ f , e p is an element for the defined cache matrix Φ p = P T P . I i , j y and I i , j z indicate:
I i , j y = I i , j x i , f y j , f  
and
I i , j z = I i , j γ x i , f z c j , f  

3.6. Time Complexity Analysis

The main time consumption of BiTCF is in the process of updating x i , f , y j , f , and z c , f . We take Equation (31) as an example, where most of the time consumption comes from missing items j R i h j , f I i , j x and j R i h j , f 2 , and thus we are the first to deal with the missing items. According to j R i h j , f I i , j x =   k f x i , k j = 1 h j , f h j , k j R i h j , f I i , j x , we can obtain the item that is not related to users of j = 1 h j , f h j , k (similarly,   j R i h j , f 2 ). Therefore, Φ h (Equation (34)) can be updated offline. Except for the offline part, the online time complexity of calculating P is O ( | U | K 2 + | R | K ) . Correspondingly, the time complexity of calculating both Q and V is O ( | L | K 2 + | R | K ) in Equations (35) and (36), respectively. Therefore, the time complexity of our proposed model is O ( ( | U | + | L | ) K 2 + | R | K ) , which is the optimal time complexity among state-of-the-art models based on matrix factorization frameworks, to the best of our knowledge.

4. Experiments

4.1. Datasets

We adopt Gowalla and Foursquare datasets, which are widely used LBSN datasets. Following the preprocessing performed by a previous work [47], we remove the users who have less than 10 check-in records or have checked in less than 5 POIs and POIs that have been visited by less than 10 users. Afterward, we gain the datasets as shown in Table 2. The Gowalla dataset contains 301,191 check-in records where there are 4159 users, 24,919 POIs, 225 categories, and a 0.291% density. The Foursquare dataset contains 289,467 check-in records, where there are 3475 users, 21,657 POIs, 157 categories, and a 0.385% density. To evaluate the performance of our proposed model, we randomly select 80% check-in records from each user as the training set and the remaining 20% as the testing set. In the training and test processing, our proposed model takes about 200 epochs and 250 epochs to converge steadily on Gowalla and Foursquare for each run, which is analyzed in Section 4.5.

4.2. Baselines

  • Context-influence-enhanced models
    (1)
    ASMF [17]: ASMF is a fused weighted matrix factorization with social factor which defines three types of friendships, including social friends, location friends, and neighboring friends, for POI recommendation.
    (2)
    TA [18]: TA is a temporal factor-enhanced collaborative filtering model that recommends POIs to a given user at a specific time.
    (3)
    ST-RNet [19]: ST-RNet is a spatiotemporal recommender network model which learns the cross-features and the combined features of users, POIs, and time together based on neural network.
    (4)
    SSTPMF [8]: SSTPMF is a POI recommendation model integrating social spatiotemporal information into probabilistic matrix factorization, which develops a multivariable inference approach using the latent social space, geographical space, and POI category space similarities for POI recommendation.
  • Trust-enhanced models
    (1)
    SPTW [12]: SPTW is a social pertinent trust walker model for POI recommendation, which is modeled by calculating the level of trust between users in social networks. Combining high probability location category algorithm, SPTW can generate POI recommendation lists.
    (2)
    TECF [15]: TECF is a trust-enhanced collaborative filtering model, which fuses the geographic factor, temporal factor, and trust relationship learned by DeepWalk model running over the user covisiting network, for POI recommendation.
BiTCF: Our proposed model.

4.3. Parameter Settings

We tune the parameters by employing the grid search used in [6,8,17] and set different parameter values for the baselines on two datasets to achieve their best performance. In BiTCF, we set the required parameters as θ , b ,   α , β , ε , γ ,   λ p ,   λ q , and λ v . We tune the parameters by employing grid search to confirm the optimal settings on two datasets, including θ in { 0 ,   0.1 ,   0.2 ,   0.3 ,   0.4 ,   0.45 ,   0.5 ,   0.55 ,   0.6 ,   0.7 ,   0.8 ,   0.9 ,   1 } ,   b in { 10 ,   15 ,   20 ,   25 ,   30 ,   35 ,   40 ,   45 ,   50 ,   55 , 60 } ,   α in { 0.1 ,   0.2 ,   0.3 ,   0.4 ,   0.5 ,   0.6 ,   0.7 ,   0.8 ,   0.9 } ,   β in { 0.1 ,   0.2 ,   0.3 ,   0.4 ,   0.5 ,   0.6 ,   0.7 ,   0.8 ,   0.9 ,   1 } ,   ε in { 1 ,   2 ,   3 ,   4 ,   5 } ,   γ in { 0 ,   0.2 ,   0.4 ,   0.6 ,   0.8 ,   1 } , as well as λ p ,   λ q , and λ v in { 0.001 ,   0.01 ,   0.1 ,   1 ,   10 ,   100 ,   1000 } . Finally, on Gowalla, the optimal settings are θ = 0.6 , b = 45 , α = 0.7 , β = 0.5 , ε = 3 , γ = 0.4 , λ p = λ q = 0.01 , and λ v = 200 . On Foursquare, the optimal settings are θ = 0.55 , b = 30 , α = 0.8 , β = 0.5 , ε = 2 , γ = 0.6 , λ p = λ q = 0.01 , and λ v = 100 .

4.4. Evaluation Metrics

We adopt two widely used metrics to evaluate the performance of BiTCF and the other baseline models, such as p r e c i s i o n @ k and r e c a l l @ k with k = { 5 ,   10 ,   20 ,   40 } , as follows:
p r e c i s i o n @ k = 1 | U | i = 1 | U | | S i ( k )   T e s t i | k  
and
r e c a l l @ k = 1 | U | i = 1 | U | | S i ( k )   T e s t i | | T e s t i |  
where S i ( k ) indicates the top-k POI list recommended to u i , and T e s t i is a POI set consisting of the POIs in the testing set visited by u i . All of the baseline models run over the test data 10 times, and each metric is also calculated 10 times and averaged to decrease errors.

4.5. Experimental Results

Firstly, we evaluate the performance of all models with top-5 recommendation results in different dimensions, K = { 5 ,   10 ,   20 ,   40 } . The results are shown in Table 3. When K < 10 , the fused collaborative filtering models with context factors, i.e., TA and TECF, and the deep-learning-based model ST-RNet have more advantages over the other models based on matrix factorization. In particular, TECF is the most outstanding because it considers the trust relationship between users. When K 10 , the matrix factorization-based recommendation models, i.e., ASMF, SSTPMF, SPTW, and our proposed BiTCF, show excellent performance, among which SSTPMF and BiTCF performs best. When K = 20 , BiTCF outperforms the other 6 models. Compared with SSTPMF, without considering the trust factor and TECF with the trust relationship between users, BiTCF considers the trust filtering from the views of users and locations. On the Gowalla dataset, the improvements over SSTPMF and TECF are 12.9% and 11.8%, respectively, as well as 14.5% and 13.4%, respectively, on the Foursquare dataset. Let K = 20 in other experiments we implement.
Furthermore, we evaluate the performance of all models with top-k recommendation results in the dimension K = 20 , k = { 5 ,   10 ,   20 ,   40 } . The experimental results are shown in Table 4. Evidently, with the increase in k, each model shows a trend of decreasing p r e c i s i o n @ k and increasing r e c a l l @ k . The reason is that more POIs recommended to users contain more user preferences, while the POIs which may be visited will reduce. Specifically, the models integrating fewer context factors, i.e., ASMF and TA, are inferior to the models fusing more context factors, i.e., ST-RNet, SSTPMF, and BiTCF. Among the trust-enhanced models, TECF outperforms SPTW, and both are inferior to BiTCF. This is because BiTCF performs more sufficient trust filtering from the views of users and locations using various factors.
In addition, considering that the cold-start problem (given-n) is a serious challenge for recommender systems, we evaluate the performance of all models when each user only has visited the given n POIs, where n = { 3 ,   5 ,   10 } . The experimental results are shown in Table 5. As we can see, with the increase in n , each model shows a trend of increasing p r e c i s i o n @ 5 and r e c a l l @ 5 because users visited more POIs, thus helping the models learn user preferences. Furthermore, the context factor plays an important role in predicting user preferences. The models integrating fewer context factors, i.e., ASMF, TA, and SPTW, are inferior to the models fusing more context factors, i.e., ST-RNet, SSTPMF, TECF, and BiTCF. Because BiTCF integrates user similarity, geographical factor, temporal factor, textual content factor, POI category factor, and trust factor, which can effectively and efficiently work in the cold-start problem, it is the best-performing model.
We propose BiTCF for personalized POI recommendation via fusing 6 kinds of context factors, including user similarity, geographical factor, temporal factor, textual content factor, POI category factor, and trust factor. We evaluate the contributions of different factors to explore their roles. We name the model eliminating user similarity as BiTCF-U, the model eliminating geographical factor as BiTCF-G, the model eliminating temporal factor as BiTCF-T, the model eliminating textual content factor as BiTCF-C, the model eliminating POI category factor as BiTCF-Ca, and the model eliminating trust factor as BiTCF-BiT. The experimental results are shown in Figure 2. BiTCF has the best performance over all models, demonstrating the effectiveness of fusing these factors. The effectiveness of these factors is different: trust factor > user similarity > geographical factor > textual content > POI category > temporal factor.
To explore the parameter sensitivity, we implement the experiments to understand the roles of different parameters in BiTCF. Here, there are 6 important parameters, i.e., θ , b ,     α ,     β ,     ε ,     γ . We still employ the same test set mentioned in Section 4.1 and select p r e c i s i o n @ 5 and r e c a l l @ 5 as the metrics. Furthermore, we adapt the control variates for parameters to implement the experiments, namely we vary a parameter value while keeping the others constant. Figure 3 shows the sensitivity analysis of θ . On Gowalla, θ = 0.6 , resulting in an optimal performance of BiTCF, and on Foursquare, θ = 0.55 . When θ < 0.6 and 0.55 on Gowalla and Foursquare, respectively, the noise data are not adequately filtered, leading to limited efficiency. While θ > 0.6 and 0.55, the trust filtering is excessive, which seriously influences the number of available trustworthy users, resulting in the limited fitting of context factors. Figure 4 shows the sensitivity analysis of b . With the increase in b , BiTCF has a better performance, and the performance achieves an approximate optimal near b = 45 (Gowalla) and b = 30 (Foursquare). The larger b causes more neighbor users to participate in calculation, among which include more users who are distant from the target user ( b > 45 and 30 ), causing a vainly increased calculation consumption. Figure 5 illustrates the sensitivity analysis of α . α balances the importance between DTR and IDTR. On Gowalla, when α = 0.7 , BiTCF achieves the optimal performance, and α = 0.8 on Foursquare. Figure 6 shows the sensitivity analysis of β . When β = 0 , the kernel density estimation method with adaptive bandwidth is reduced to the method with fixed bandwidth. BiTCF performs best when β = 0.5 . If β < 0.5 , P g ( l j | N i c h e i ) has low sensitivity to user check-in records, and if β > 0.5 , P g ( l j | N i c h e i ) has a much higher sensitivity to user check-in records, causing fitting over. Figure 7 shows the sensitivity analysis of ε . Near ε = 3 and ε = 2 on Gowalla and Foursquare, respectively, BiTCF achieves the best performance. The reason is that our proposed model is based on a WMF framework, which assigns a non-zero weight to each missing entity and a weight calculated by using ε to the non-zero entities. If ε is smaller, there is little difference between the non-zero entities and missing entities, which impacts the role of non-zero entities. While if ε is bigger, the role of the missing entities is impacted. Figure 8 illustrates the sensitivity analysis of γ . γ trades off the impact of the POI category factor on BiTCF. As we can see, different γ values have a great impact on the performance of the model, and the model achieves the optimal performance when γ = 0.6 on Gowalla and γ = 0.4 on Foursquare.
BiTCF is combined with trust-user-based collaborative filtering (TUCF), trust-location-based collaborative filtering (TLCF), and POI category-enhanced historical preference (CaP) modules. To evaluate the effectiveness of the above three modules, we implement the ablation experiment and the results are shown Figure 9. TUCF achieves a better performance compared with TLCF and CaP, and TLCF is superior to CaP.
To evaluate the practical computing time complexity in training and test processing, we provide the converge speed of BiTCF on Gowalla and Foursquare datasets, as shown in Figure 10. BiTCF takes about 200 epochs and 250 epochs to converge steadily on Gowalla and Foursquare, which indicates the low computing time complexity of both training and test processing.

5. Conclusions

To address the trustworthiness and data sparsity problems in POI recommender systems, we propose a novel POI recommendation model with bidirectional trust-enhanced collaborative filtering. Firstly, we model a trustworthy community based on trust relationships. Secondly, we perform the trust filtering from the views of users and locations. From the views of users, taking the influence of temporal factors on user similarity into account, we propose a time-aware similarity measurement fusing trust factor. From the view of locations, considering the roles of geographical and textual content factors, we propose a location correlation measurement with geographical, textual content, and trust factors. Thirdly, we integrate the POI category factor into a weighted matrix factorization to learn user preference. To summarize, we have developed a fusion with two kinds of integrating methods for the trust-enhanced collaborative filtering and the user preference models.
Compared with the state-of-the-art models, the proposed model further considers the location trust alongside the user trust, and it refines context influence models for fitting the user preference more precisely. In addition, the model develops a novel fusion strategy to perform fusion between the user preference model and the trust-enhanced context models. Consequently, the model could even better facilitate user life, e.g., the user u i visits a series of POIs in a period of time, and the model then recommends some unvisited POIs to him/her based on historical records after comprehensively considering spatiotemporal factors, which can help users to accelerate retrieval and filter information from massive data.
We implement experiments on two widely used LBSN datasets to evaluate our proposed model. The model is deployed on a server with configuration (CPU: AMD Ryzen9 5950X 16-Core Processor 3.40 GHz; RAM: 128 G (32 GB DDR4-3600 DDR4 × 4); GPU: NVIDIA GeForce RTX3090 (24 GB) × 2; ROM: 1T SSD + 4T HDD) and run by Python + MongoDB. The experimental results demonstrate that our proposed model is effective and efficient and outperforms the state-of-the-art trust-enhanced POI recommendation models. In the future, we will focus on ensuing POI recommendations, with an emphasis on the check-in sequence and the corresponding dependence relations between different POIs in the sequence of user real-time demands.

Author Contributions

Conceptualization, J.A.; methodology, J.A.; software, J.A.; validation, J.A., W.J.; formal analysis, J.A.; investigation, J.A. and W.J.; resources, J.A. and G.L.; data curation, W.J.; writing—original draft preparation, J.A.; writing—review and editing, J.A. and G.L.; visualization, W.J.; supervision, G.L.; project administration, G.L.; funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant 61976032.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support this study are available from the corresponding author upon request.

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant 61976032.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Sengers, F.; Späth, P.; Raven, R. Smart city construction: Towards an analytical framework for smart urban living labs. In Urban Living Labs; Routledge: Evanston, IL, USA, 2018; pp. 74–88. [Google Scholar]
  2. Bao, J.; Zheng, Y.; Wilkie, D.; Mokbel, M. Recommendations in location-based social networks: A survey. Geoinformatica 2015, 19, 525–565. [Google Scholar] [CrossRef]
  3. Huang, L.; Ma, Y.; Liu, Y. Point-of-interest recommendation in location-based social networks with personalized geo-social influence. China Commun. 2015, 12, 21–31. [Google Scholar] [CrossRef]
  4. Jin, J.; Chen, Q. A trust-based Top-K recommender system using social tagging network. In Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, China, 29–31 May 2012; pp. 1270–1274. [Google Scholar] [CrossRef]
  5. Wang, S.; Lo, D.; Vasilescu, B.; Serebrenik, A. EnTagRec: An Enhanced Tag Recommendation System for Software Information Sites. In Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, 29 September–3 October 2014; pp. 291–300. [Google Scholar] [CrossRef]
  6. Zhang, Z.Y.; Liu, Y.; Zhang, Z.J.; Shen, B. Fused matrix factorization with multi-tag, social and geographical influences for POI recommendation. World Wide Web 2019, 22, 1135–1150. [Google Scholar] [CrossRef]
  7. Xing, S.; Liu, F.; Wang, Q.; Zhao, X.; Li, T. Content-aware point-of-interest recommendation based on convolutional neural network. Appl. Intell. 2019, 49, 858–871. [Google Scholar] [CrossRef]
  8. Davtalab, M.; Alesheikh, A.A. A POI recommendation approach integrating social spatio-temporal information into probabilistic matrix factorization. Knowl. Inf. Syst. 2021, 63, 65–85. [Google Scholar] [CrossRef]
  9. Liu, Y.; Yang, Z.; Li, T.; Wu, D. A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 2022, 52, 5310–5324. [Google Scholar] [CrossRef]
  10. Li, Q.; Xu, X.; Liu, X.; Chen, Q. An Attention-Based Spatiotemporal GGNN for Next POI Recommendation. IEEE Access 2022, 10, 26471–26480. [Google Scholar] [CrossRef]
  11. Wu, Y.; Li, K.; Zhao, G.; Qian, X. Personalized Long- and Short-term Preference Learning for Next POI Recommendation. IEEE Trans. Knowl. Data Eng. 2022, 34, 1944–1957. [Google Scholar] [CrossRef]
  12. Logesh, R.; Subramaniyaswamy, V. A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wirel. Pers. Commun. 2017, 97, 2751–2780. [Google Scholar] [CrossRef]
  13. Ahmadian, S.; Ahmadian, M.; Jalili, M. A deep learning based trust- and tag-aware recommender system. Neurocomputing 2022, 488, 557–571. [Google Scholar] [CrossRef]
  14. Ahmadian, M.; Ahmadi, M.; Ahmadian, S. A reliable deep representation learning to improve trust-aware recommendation systems. Expert Syst. Appl. 2022, 197, 116697. [Google Scholar] [CrossRef]
  15. Wang, W.; Chen, J.Y.; Wang, J.Z.; Chen, J.X.; Liu, J.Q.; Gong, Z.G. Trust-Enhanced Collaborative Filtering for Personalized Point of Interests Recommendation. IEEE Trans. Ind. Inform. 2020, 16, 6124–6132. [Google Scholar] [CrossRef]
  16. Gao, H.; Tang, J.; Liu, H. gSCorr: Modeling Geo-Social Correlations for New Check-ins on Location-Based Social Networks. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI, USA, 29 October–2 November 2012; pp. 1582–1586. [Google Scholar]
  17. Li, H.Y.; Ge, Y.; Hong, R.C.; Zhu, H.S. Point-of-Interest Recommendations: Learning Potential Check-ins from Friends. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 975–984. [Google Scholar]
  18. Yuan, Q.; Cong, G.; Ma, Z.; Sun, A.; Thalmann, N.M. Time-aware point-of-interest recommendation. In Proceedings of the Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval—SIGIR ’13, Dublin, Ireland, 28 July–1 August 2013; pp. 363–372. [Google Scholar]
  19. Gao, L.; Li, Y.; Li, R.; Zhu, Z.; Gu, X.; Habimana, O. ST-RNet: A Time-aware Point-of-interest Recommendation Method based on Neural Network. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14–19 July 2019; pp. 1–8. [Google Scholar] [CrossRef]
  20. Dai, S.; Yu, Y.; Fan, H.; Dong, J. Spatio-Temporal Representation Learning with Social Tie for Personalized POI Recommendation. Data Sci. Eng. 2022, 7, 44–56. [Google Scholar] [CrossRef]
  21. Chakraborty, A.; Ganguly, D.; Caputo, A.; Jones, G.J.F. Kernel density estimation based factored relevance model for multi-contextual point-of-interest recommendation. Inf. Retr. 2022, 25, 44–90. [Google Scholar] [CrossRef]
  22. Yu, D.; Yu, T.; Wu, Y.; Liu, C. Personalized recommendation of collective points-of-interest with preference and context awareness. Pattern Recognit. Lett. 2022, 153, 16–23. [Google Scholar] [CrossRef]
  23. Xu, Y.; Zhu, L.; Cheng, Z.; Li, J.; Zhang, Z.; Zhang, H. Multi-modal Discrete Collaborative Filtering for Efficient Cold-start Recommendation. IEEE Trans. Knowl. Data Eng. 2023, 35, 741–7551. [Google Scholar] [CrossRef]
  24. Zhu, L.; Xu, Y.; Li, J.; Guan, W.; Cheng, Z. Explainable discrete Collaborative Filtering. IEEE Trans. Knowl. Data Eng. 2022, 1–14. [Google Scholar] [CrossRef]
  25. Margaris, D.; Spiliotopoulos, D.; Vassilakis, C.; Vasilopoulos, D. Improving collaborative filtering’s rating prediction accuracy by introducing the experiencing period criterion. Neural Comput. Appl. 2023, 35, 193–210. [Google Scholar] [CrossRef]
  26. Wang, X.; Fukumoto, F.; Li, J.; Yu, D.; Sun, X. STaTRL: Spatial-temporal and text representation learning for POI recommendation. Appl. Intell. 2023, 53, 8286–8301. [Google Scholar] [CrossRef]
  27. Fang, J.; Meng, X.; Qi, X. A top-k POI recommendation approach based on LBSN and multi-graph fusion. Neurocomputing 2023, 518, 219–230. [Google Scholar] [CrossRef]
  28. Deng, S.G.; Huang, L.T.; Tan, W.; Wu, Z.H. Top-k automatic service composition: A parallel framework for large-scale service sets. IEEE Trans Autom. Sci. Eng. 2014, 11, 891–905. [Google Scholar] [CrossRef]
  29. Liu, Y.; Han, L.; Gou, Z.; Yang, Y. Personalized Recommendation via Trust-Based Diffusion. IEEE Access 2019, 7, 94195–94204. [Google Scholar] [CrossRef]
  30. Ahmadian, S.; Meghdadi, M.; Afsharchi, M. A social recommendation method based on an adaptive neighbor selection mechanism. Inf. Process. Manag. 2018, 54, 707–725. [Google Scholar] [CrossRef]
  31. Guo, G.; Zhang, J.; Zhu, F.; Wang, X. Factored similarity models with social trust for top-N item recommendation. Knowl. Based Syst. 2017, 122, 17–25. [Google Scholar] [CrossRef]
  32. Guo, G.; Zhang, J.; Yorke-Smith, N. A Novel Recommendation Model Regularized with User Trust and Item Ratings. IEEE Trans. Knowl. Data Eng. 2016, 28, 1607–1620. [Google Scholar] [CrossRef]
  33. Ahmed, A.; Saleem, K.; Khalid, O.; Rashid, U. On deep neural network for trust aware cross domain recommendations in E-commerce. Expert Syst. Appl. 2021, 174, 114757. [Google Scholar] [CrossRef]
  34. Ma, G.; Wang, Y.; Zheng, X.; Miao, X.; Liang, Q. A trust-aware latent space mapping approach for cross-domain recommendation. Neurocomputing 2021, 431, 100–110. [Google Scholar] [CrossRef]
  35. Zhao, J.; Wang, W.; Zhang, Z.; Sun, Q.; Huo, H.; Qu, L.; Zheng, S. TrustTF: A tensor factorization model using user trust and implicit feedback for context-aware recommender systems. Knowl. Based Syst. 2020, 209, 106434. [Google Scholar] [CrossRef]
  36. Josang, A.; Ismail, R. The Beta Reputation System. In Proceedings of the 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia, 17–19 June 2002; Volume 41. [Google Scholar]
  37. Tobler, W.R. A Computer Movie Simulating Urban Growth in the Detroit Region. Econ. Geogr. 1970, 46, 234–240. [Google Scholar] [CrossRef]
  38. Mikolov, T.; Sutskever, I.; Chen, K. Distributed representations of words and phrases and their compositionality. In Proceedings of the 26th International Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA, 5–10 November 2013; pp. 3111–3119. [Google Scholar]
  39. Rubner, Y.; Tomasi, C.; Guibas, L.J. The Earth Mover’s Distance as a Metric for Image Retrieval. Int. J. Comput. Vis. 2000, 40, 99–121. [Google Scholar] [CrossRef]
  40. Silverman, B.W. Density Estimation for Statistics and Data Analysis; Chapman and Hall: London, UK, 1986; Volume 26, pp. 1–158. [Google Scholar]
  41. Gao, H.; Tang, J.; Hu, X.; Liu, H. Exploring temporal effects for location recommendation on location-based social networks. In Proceedings of the 7th ACM Conference on Recommender Systems, Hong Kong, China, 12–16 October 2013; pp. 93–100. [Google Scholar] [CrossRef]
  42. Cheng, C.; Yang, H.; King, I.; Lyu, M. Fused Matrix Factorization with Geographical and Social Influence in Location-Based Social Networks. Proc. Conf. AAAI Artif. Intell. 2012, 26, 17–23. [Google Scholar] [CrossRef]
  43. Liu, B.; Fu, Y.; Yao, Z.; Xiong, H. Learning geographical preferences for point-of-interest recommendation. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA, 11–14 August 2013; pp. 1043–1051. [Google Scholar] [CrossRef]
  44. Zhang, J.D.; Chow, C.Y. IGSLR: Personalized geo-social location recommendation: A kernel density estimation approach. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Orlando, FL, USA, 5–8 November 2013; pp. 334–343. [Google Scholar]
  45. Hu, Y.; Koren, Y.; Volinsky, C. Collaborative Filtering for Implicit Feedback Datasets. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; pp. 263–272. [Google Scholar] [CrossRef]
  46. He, X.; Zhang, H.; Kan, M.-Y.; Chua, T.-S. Fast Matrix Factorization for Online Recommendation with Implicit Feedback. In Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval, Pisa, Italy, 17–21 July 2016; pp. 549–558. [Google Scholar]
  47. Ye, M.; Yin, P.; Lee, W.-C.; Lee, D.-L. Exploiting geographical influence for collaborative point-of-interest recommendation. In Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information—SIGIR’11, Beijing, China, 25–29 July 2011; pp. 325–334. [Google Scholar]
Figure 1. The overview of the proposed model. Green-filled area represents the proposed trust community framework, and the blue one denotes the methodology based on the trust community framework, including the trust-enhanced collaborative filtering from the views of users and locations and the two-step data fusion.
Figure 1. The overview of the proposed model. Green-filled area represents the proposed trust community framework, and the blue one denotes the methodology based on the trust community framework, including the trust-enhanced collaborative filtering from the views of users and locations and the two-step data fusion.
Sensors 23 04140 g001
Figure 2. Comparison of different factor contributions: (a,c) on Gowalla; (b,d) on Foursquare.
Figure 2. Comparison of different factor contributions: (a,c) on Gowalla; (b,d) on Foursquare.
Sensors 23 04140 g002
Figure 3. The sensitivity analysis of θ . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 3. The sensitivity analysis of θ . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g003
Figure 4. The sensitivity analysis of b . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 4. The sensitivity analysis of b . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g004
Figure 5. The sensitivity analysis of α . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 5. The sensitivity analysis of α . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g005
Figure 6. The sensitivity analysis of β . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 6. The sensitivity analysis of β . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g006
Figure 7. The sensitivity analysis of ε . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 7. The sensitivity analysis of ε . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g007
Figure 8. The sensitivity analysis of γ . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Figure 8. The sensitivity analysis of γ . (a) p r e c i s i o n @ 5 ; (b)   r e c a l l @ 5 .
Sensors 23 04140 g008
Figure 9. Comparison of the effectiveness of four modules: (a,b) on Gowalla; (c,d) on Foursquare.
Figure 9. Comparison of the effectiveness of four modules: (a,b) on Gowalla; (c,d) on Foursquare.
Sensors 23 04140 g009
Figure 10. Training and test loss of BiTCF@: (a,b) on Gowalla; (c,d) on Foursquare.
Figure 10. Training and test loss of BiTCF@: (a,b) on Gowalla; (c,d) on Foursquare.
Sensors 23 04140 g010
Table 1. The descriptions of key notions.
Table 1. The descriptions of key notions.
NotionsDescriptions
U, L,   C The user set, POI set, POI category set
RThe user-POI rating matrix
r i , j The frequency or rating of u i on l j , r i , j R
[ T R k , i ] The trust weighted matrix
D T R k , i The direct trust relationship between u i and u k
I D T R k , i The indirect trust relationship between u i and u k
[ s k , i ] The user similarity matrix
g s k , i The geographical similarity between u i and u k
c s k , i The check-in behavior similarity between u i and u k
[ U i , j ] The trust user influence matrix
[ i , j ] The trust location influence matrix
P g ( l j | N i c h e i ) The geographical correlation between l j and N i c h e i
P c ( l j | N i c h e i ) The textual content correlation between l j and N i c h e i
[ i , j ] The trust-enhanced context factor fused matrix
[ I i , j ] The user preference matrix
P The K-dimensional potential matrix for users
Q The K-dimensional potential matrix for POIs
V The K-dimensional potential matrix for POI categories
Table 2. Statistics of the dataset.
Table 2. Statistics of the dataset.
Dataset|Users||POIs||Categories||Check-Ins|Density%
Gowalla4159249192253011910.291
Foursquare3475216571572894670.385
Table 3. Comparisons on the performance of the models with top-5 POIs in different dimensions.
Table 3. Comparisons on the performance of the models with top-5 POIs in different dimensions.
DatasetKMetricsASMFTAST-RNetSSTPMFSPTWTECFBiTCF
Gowalla5precision@50.05120.05710.06200.05220.05080.06490.0566
recall@50.03410.03530.03820.03430.03360.04440.0347
10precision@50.05740.05710.06200.06240.05650.06490.0644
recall@50.03590.03530.03820.04010.03480.04440.0419
20precision@50.06170.05710.06200.06570.06050.06490.0739
recall@50.03620.03530.03820.04330.03490.04440.0490
40precision@50.06130.05710.06200.06510.06070.06490.0731
recall@50.03710.03530.03820.04370.03600.04440.0475
Foursquare5precision@50.05530.06090.06350.05680.05500.06730.0598
recall@50.03610.03550.03990.03660.03560.04720.0389
10precision@50.05970.06090.06350.06450.05890.06730.0684
recall@50.03740.03550.03990.04290.03660.04720.0468
20precision@50.06210.06090.06350.06820.06130.06730.0783
recall@50.03710.03550.03990.04600.03620.04720.0526
40precision@50.06070.06090.06350.06840.06030.06730.0755
recall@50.03640.03550.03990.04550.03550.04720.0492
Table 4. Comparisons on the performance of the models with top- k POIs in dimension K=20.
Table 4. Comparisons on the performance of the models with top- k POIs in dimension K=20.
DatasetMetricsASMFTAST-RNetSSTPMFSPTWTECFBiTCF
Gowallaprecision@50.06170.05710.06200.06570.06050.06490.0739
recall@50.03620.03530.03820.04330.03490.04440.0490
precision@100.05360.05030.05550.05880.05330.05680.0649
recall@100.04230.04110.04470.04890.04050.05050.0586
precision@200.04750.04520.05020.05370.04760.05200.0574
recall@200.05000.04930.05190.05620.04710.05770.0641
precision@400.04460.04170.04680.05010.04320.04920.0545
recall@400.05280.05170.05400.05830.04950.06000.0660
Foursquareprecision@50.06210.06090.06350.06820.06130.06730.0783
recall@50.03710.03550.03990.04600.03620.04720.0526
precision@100.05520.05350.05660.06090.05410.06020.0729
recall@100.04270.04190.04620.05240.04200.05310.0600
precision@200.04920.04720.05100.05620.04830.05430.0643
recall@200.05010.04900.05230.05900.04720.06080.0697
precision@400.04610.04410.04730.05350.04400.05220.0616
recall@400.05240.05090.05410.06220.04860.06350.0725
Table 5. Comparisons on the performance of the models in the cold-start problem.
Table 5. Comparisons on the performance of the models in the cold-start problem.
DatasetnMetricsASMFTAST-RNetSSTPMFSPTWTECFBiTCF
Gowalla3precision@50.01660.01500.01840.02010.01580.01990.0227
recall@50.01450.01410.01590.01760.01380.01790.0208
5precision@50.01790.01570.01970.02180.01680.02140.0263
recall@50.01620.01450.01810.02000.01420.01500.0227
10precision@50.01920.01690.02100.02380.01790.02250.0300
recall@50.01760.01520.01950.02130.01500.02180.0251
Foursquare3precision@50.01740.01550.01880.02070.01620.02020.0234
recall@50.01490.01420.01650.01840.01410.01890.0210
5precision@50.01890.01720.02050.02290.01820.02260.0274
recall@50.01560.01550.01800.02100.01500.02160.0233
10precision@50.02070.01880.02200.02430.02000.02390.0311
recall@50.01850.01760.02030.02250.01740.02320.0260
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

An, J.; Jiang, W.; Li, G. Bidirectional Trust-Enhanced Collaborative Filtering for Point-of-Interest Recommendation. Sensors 2023, 23, 4140. https://0-doi-org.brum.beds.ac.uk/10.3390/s23084140

AMA Style

An J, Jiang W, Li G. Bidirectional Trust-Enhanced Collaborative Filtering for Point-of-Interest Recommendation. Sensors. 2023; 23(8):4140. https://0-doi-org.brum.beds.ac.uk/10.3390/s23084140

Chicago/Turabian Style

An, Jingmin, Wei Jiang, and Guanyu Li. 2023. "Bidirectional Trust-Enhanced Collaborative Filtering for Point-of-Interest Recommendation" Sensors 23, no. 8: 4140. https://0-doi-org.brum.beds.ac.uk/10.3390/s23084140

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop