1 code implementation • 2 Sep 2023 • Min-Jeong Kim, Yeon-Chang Lee, David Y. Kang, Sang-Wook Kim
The proposed approach consists of three modules: (M1) generation of each node's extended ego-network; (M2) measurement of trustworthiness on edge signs; and (M3) trustworthiness-aware propagation of embeddings.