Computer Science ›› 2019, Vol. 46 ›› Issue (8): 111-115.doi: 10.11896/j.issn.1002-137X.2019.08.018

• HPC China 2018 • Previous Articles     Next Articles

Deep Neural Network Recommendation Model Based on User Vectorization Representation and Attention Mechanism

GUO Xu1, ZHU Jing-hua1,2   

  1. (School of Computer Science and Technology,Heilongjiang University,Harbin 150080,China)1
    (Key Laboratory of Database and Parallel Computing of Heilongjiang Province,Harbin 150080,China)2
  • Received:2018-10-21 Online:2019-08-15 Published:2019-08-15

Abstract: With the rapid development of Internet application,recommendation system,as an effective measure to solve information overloading,has become a research hot topic in industry and academia.Traditional recommendation algorithms for users’ implicit feedback are mainly based on collaborative filtering and learning-to-rank method,which do not make full use of the implicit feedback features in users’ behaviors.In this paper,a users’ vectorization representation model based on neural network was proposed,which can make full use of heterogeneous implicit feedback features of users’ behaviors.At the same time,referring to the self-attention mechanism in machine translation,this paper designed a neural attentive recommendation model which integrates the dynamic temporal features of user-item interaction and user vectorization representation,to improve the performance of the recommendation system.The comparison experiment is conducted on two public datasets,and the recommendation performance is evaluated by recall,precision and NDCG.Compared with other recommendation models for implicit feedback,the proposed recommendation model has better recommendation performance and better generalization ability

Key words: Recommendation system, Neural networks, Attention mechanism, Implicit feedback, Deep learning

CLC Number: 

  • TP391
[1] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[M]∥Advances in Neural Information Processing Systems.Bertin:Springer,2017:5998-6008.
[2] SARWAR B,KARYPIS G,KONSTAN J,et al.Item-based collaborative filtering recommendation algorithms[C]∥Procee-dings of the 10th International Conference on World Wide Web.ACM,2001:285-295.
[3] OSTUNI V C,DI NOIA T,DI SCIASCIO E,et al.Top-n recommendations from implicit feedback leveraging linked open data[C]∥Proceedings of the 7th ACM Conference on Recommender Systems.ACM,2013:85-92.
[4] ZIMDARS A,CHICKERING D M,MEEK C.Using temporal data for making recommendations[C]∥Proceedings of the Se-venteenth Conference on Uncertainty in artificial intelligence.Morgan Kaufmann Publishers Inc.,2001:580-588.
[5] RENDLE S,FREUDENTHALER C,GANTNER Z,et al.BPR:Bayesian personalized ranking from implicit feedback[C]∥Proceedings of the Twenty-fifth Conference on Uncertainty in Artificial Intelligence.AUAI Press,2009:452-461.
[6] SEDHAIN S,MENON A K,SANNER S,et al.Autorec:Autoencoders meet collaborative filtering[C]∥Proceedings of the 24th International Conference on World Wide Web.ACM,2015:111-112.
[7] ELKAHKY A M,SONG Y,HE X.A multi-view deep learning approach for cross domain user modeling in recommendation systems[C]∥Proceedings of the 24th International Conference on World Wide Web.International World Wide Web Confe-rences Steering Committee,2015:278-288.
[8] HE X,LIAO L,ZHANG H,et al.Neural collaborative filtering[C]∥Proceedings of the 26th International Conference on World Wide Web.International World Wide Web Conferences Steering Committee,2017:173-182.
[9] HIDASI B,KARATZOGLOU A,BALTRUNAS L,et al.Session-based recommendations with recurrent neural networks[J].arXiv:1511.06939,2015.
[10] GONG Y,ZHANG Q.Hashtag Recommendation Using Attention-Based Convolutional Neural Network[C]∥Proceedings of International Joint Conference on Artificial Intelligence.AAAI Press,2016:2782-2788.
[11] LI Y,LIU T,JIANG J,et al.Hashtag recommendation with topical attention-based LSTM[C]∥Proceedings of the 26th International Conference on Computational Linguistics.ACL,2016:3019-3029.
[12] XIAO J,YE H,HE X,et al.Attentional factorization machines:Learning the weight of feature interactions via attention networks[J].arXiv:1708.04617,2017.
[1] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[2] ZHUANG Shi-jie, YU Zhi-yong, GUO Wen-zhong, HUANG Fang-wan. Short Term Load Forecasting via Zoneout-based Multi-time Scale Recurrent Neural Network [J]. Computer Science, 2020, 47(9): 105-109.
[3] HE Xin, XU Juan, JIN Ying-ying. Action-related Network:Towards Modeling Complete Changeable Action [J]. Computer Science, 2020, 47(9): 123-128.
[4] YE Ya-nan, CHI Jing, YU Zhi-ping, ZHAN Yu-liand ZHANG Cai-ming. Expression Animation Synthesis Based on Improved CycleGan Model and Region Segmentation [J]. Computer Science, 2020, 47(9): 142-149.
[5] ZHAO Qin-yan, LI Zong-min, LIU Yu-jie, LI Hua. Cascaded Siamese Network Visual Tracking Based on Information Entropy [J]. Computer Science, 2020, 47(9): 157-162.
[6] DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168.
[7] PAN Zu-jiang, LIU Ning, ZHANG Wei, WANG Jian-yong. MTHAM:Multitask Disease Progression Modeling Based on Hierarchical Attention Mechanism [J]. Computer Science, 2020, 47(9): 185-189.
[8] BAO Yu-xuan, LU Tian-liang, DU Yan-hui. Overview of Deepfake Video Detection Technology [J]. Computer Science, 2020, 47(9): 283-292.
[9] ZHAO Wei, LIN Yu-ming, WANG Chao-qiang, CAI Guo-yong. Opinion Word-pairs Collaborative Extraction Based on Dependency Relation Analysis [J]. Computer Science, 2020, 47(8): 164-170.
[10] SUN Yan-li, YE Jiong-yao. Convolutional Neural Networks Compression Based on Pruning and Quantization [J]. Computer Science, 2020, 47(8): 261-266.
[11] YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91.
[12] WANG Wen-dao, WANG Run-ze, WEI Xin-lei, QI Yun-liang, MA Yi-de. Automatic Recognition of ECG Based on Stacked Bidirectional LSTM [J]. Computer Science, 2020, 47(7): 118-124.
[13] LIU Yan, WEN Jing. Complex Scene Text Detection Based on Attention Mechanism [J]. Computer Science, 2020, 47(7): 135-140.
[14] ZHANG Zhi-yang, ZHANG Feng-li, TAN Qi, WANG Rui-jin. Review of Information Cascade Prediction Methods Based on Deep Learning [J]. Computer Science, 2020, 47(7): 141-153.
[15] JIANG Wen-bin, FU Zhi, PENG Jing, ZHU Jian. 4Bit-based Gradient Compression Method for Distributed Deep Learning System [J]. Computer Science, 2020, 47(7): 220-226.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111, 142 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .