Computer Science ›› 2019, Vol. 46 ›› Issue (8): 111-115.doi: 10.11896/j.issn.1002-137X.2019.08.018

• HPC China 2018 • Previous Articles     Next Articles

Deep Neural Network Recommendation Model Based on User Vectorization Representation and Attention Mechanism

GUO Xu1, ZHU Jing-hua1,2   

  1. (School of Computer Science and Technology,Heilongjiang University,Harbin 150080,China)1
    (Key Laboratory of Database and Parallel Computing of Heilongjiang Province,Harbin 150080,China)2
  • Received:2018-10-21 Online:2019-08-15 Published:2019-08-15

Abstract: With the rapid development of Internet application,recommendation system,as an effective measure to solve information overloading,has become a research hot topic in industry and academia.Traditional recommendation algorithms for users’ implicit feedback are mainly based on collaborative filtering and learning-to-rank method,which do not make full use of the implicit feedback features in users’ behaviors.In this paper,a users’ vectorization representation model based on neural network was proposed,which can make full use of heterogeneous implicit feedback features of users’ behaviors.At the same time,referring to the self-attention mechanism in machine translation,this paper designed a neural attentive recommendation model which integrates the dynamic temporal features of user-item interaction and user vectorization representation,to improve the performance of the recommendation system.The comparison experiment is conducted on two public datasets,and the recommendation performance is evaluated by recall,precision and NDCG.Compared with other recommendation models for implicit feedback,the proposed recommendation model has better recommendation performance and better generalization ability

Key words: Recommendation system, Neural networks, Attention mechanism, Implicit feedback, Deep learning

CLC Number: 

  • TP391
[1] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[M]∥Advances in Neural Information Processing Systems.Bertin:Springer,2017:5998-6008.
[2] SARWAR B,KARYPIS G,KONSTAN J,et al.Item-based collaborative filtering recommendation algorithms[C]∥Procee-dings of the 10th International Conference on World Wide Web.ACM,2001:285-295.
[3] OSTUNI V C,DI NOIA T,DI SCIASCIO E,et al.Top-n recommendations from implicit feedback leveraging linked open data[C]∥Proceedings of the 7th ACM Conference on Recommender Systems.ACM,2013:85-92.
[4] ZIMDARS A,CHICKERING D M,MEEK C.Using temporal data for making recommendations[C]∥Proceedings of the Se-venteenth Conference on Uncertainty in artificial intelligence.Morgan Kaufmann Publishers Inc.,2001:580-588.
[5] RENDLE S,FREUDENTHALER C,GANTNER Z,et al.BPR:Bayesian personalized ranking from implicit feedback[C]∥Proceedings of the Twenty-fifth Conference on Uncertainty in Artificial Intelligence.AUAI Press,2009:452-461.
[6] SEDHAIN S,MENON A K,SANNER S,et al.Autorec:Autoencoders meet collaborative filtering[C]∥Proceedings of the 24th International Conference on World Wide Web.ACM,2015:111-112.
[7] ELKAHKY A M,SONG Y,HE X.A multi-view deep learning approach for cross domain user modeling in recommendation systems[C]∥Proceedings of the 24th International Conference on World Wide Web.International World Wide Web Confe-rences Steering Committee,2015:278-288.
[8] HE X,LIAO L,ZHANG H,et al.Neural collaborative filtering[C]∥Proceedings of the 26th International Conference on World Wide Web.International World Wide Web Conferences Steering Committee,2017:173-182.
[9] HIDASI B,KARATZOGLOU A,BALTRUNAS L,et al.Session-based recommendations with recurrent neural networks[J].arXiv:1511.06939,2015.
[10] GONG Y,ZHANG Q.Hashtag Recommendation Using Attention-Based Convolutional Neural Network[C]∥Proceedings of International Joint Conference on Artificial Intelligence.AAAI Press,2016:2782-2788.
[11] LI Y,LIU T,JIANG J,et al.Hashtag recommendation with topical attention-based LSTM[C]∥Proceedings of the 26th International Conference on Computational Linguistics.ACL,2016:3019-3029.
[12] XIAO J,YE H,HE X,et al.Attentional factorization machines:Learning the weight of feature interactions via attention networks[J].arXiv:1708.04617,2017.
[1] ZHAO Jia-qi, WANG Han-zheng, ZHOU Yong, ZHANG Di, ZHOU Zi-yuan. Remote Sensing Image Description Generation Method Based on Attention and Multi-scale Feature Enhancement [J]. Computer Science, 2021, 48(1): 190-196.
[2] LIU Yang, JIN Zhong. Fine-grained Image Recognition Method Combining with Non-local and Multi-region Attention Mechanism [J]. Computer Science, 2021, 48(1): 197-203.
[3] WANG Rui-ping, JIA Zhen, LIU Chang, CHEN Ze-wei, LI Tian-rui. Deep Interest Factorization Machine Network Based on DeepFM [J]. Computer Science, 2021, 48(1): 226-232.
[4] YU Wen-jia, DING Shi-fei. Conditional Generative Adversarial Network Based on Self-attention Mechanism [J]. Computer Science, 2021, 48(1): 241-246.
[5] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[6] WANG Run-zheng, GAO Jian, HUANG Shu-hua, TONG Xin. Malicious Code Family Detection Method Based on Knowledge Distillation [J]. Computer Science, 2021, 48(1): 280-286.
[7] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[8] ZHUANG Shi-jie, YU Zhi-yong, GUO Wen-zhong, HUANG Fang-wan. Short Term Load Forecasting via Zoneout-based Multi-time Scale Recurrent Neural Network [J]. Computer Science, 2020, 47(9): 105-109.
[9] HE Xin, XU Juan, JIN Ying-ying. Action-related Network:Towards Modeling Complete Changeable Action [J]. Computer Science, 2020, 47(9): 123-128.
[10] YE Ya-nan, CHI Jing, YU Zhi-ping, ZHAN Yu-liand ZHANG Cai-ming. Expression Animation Synthesis Based on Improved CycleGan Model and Region Segmentation [J]. Computer Science, 2020, 47(9): 142-149.
[11] ZHAO Qin-yan, LI Zong-min, LIU Yu-jie, LI Hua. Cascaded Siamese Network Visual Tracking Based on Information Entropy [J]. Computer Science, 2020, 47(9): 157-162.
[12] DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168.
[13] PAN Zu-jiang, LIU Ning, ZHANG Wei, WANG Jian-yong. MTHAM:Multitask Disease Progression Modeling Based on Hierarchical Attention Mechanism [J]. Computer Science, 2020, 47(9): 185-189.
[14] BAO Yu-xuan, LU Tian-liang, DU Yan-hui. Overview of Deepfake Video Detection Technology [J]. Computer Science, 2020, 47(9): 283-292.
[15] ZHAO Wei, LIN Yu-ming, WANG Chao-qiang, CAI Guo-yong. Opinion Word-pairs Collaborative Extraction Based on Dependency Relation Analysis [J]. Computer Science, 2020, 47(8): 164-170.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .