Computer Science ›› 2019, Vol. 46 ›› Issue (5): 185-190.doi: 10.11896/j.issn.1002-137X.2019.05.028

Previous Articles     Next Articles

Study on Check-in Prediction Based on Deep Learning and Factorization Machine

SU Chang, PENG Shao-wen, XIE Xian-zhong, LIU Ning-ning   

  1. (College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
  • Received:2018-04-24 Revised:2018-06-30 Published:2019-05-15

Abstract: Location-Based Social Networks (LBSN) provides users with location-based services,allowing mobile users to share their location and location-related information in social networks.The research of check-in prediction has become an important and very challenging task in LBSN.Most of the current prediction techniques mainly focus on user-centered check-in studies,while few researches are based on POI-centered.This paper focused on the check-in prediction of POI-centered.Due to the extreme sparseness of data,it is difficult to use the traditional model to dig out users’ potential check-in pattern from data.To solve the problem of prediction based on POI-centered,this paper proposed a novel network model(TSWNN) combining factorization machine and deep learning.This model fuses temporal features,spatial features and weather features,takes advantage of the idea of factorization machine to deal with high dimensional sparse vectors and applies fully-connected hidden layer to the model to dig out users’ potential check-in pattern and predict users’ check-in behavior on specific point of interest.The experimental results on two classical LBSN datasets(Gowalla and Brightkite) show the superior performance of the proposed model.

Key words: Check-in prediction, Deep learning, Factorization machine, Point of interest

CLC Number: 

  • TP183
[1]SONG C,QU Z,BlUMM N,et al.Limits of Predictability inHuman Mobility[C]∥American Association for the Advancement of Science.2010:1018-1021.
[2]TANG L A,ZHENG Y,YUAN J,et al.A framework of traveling companion discovery on trajectory data streams.ACM Transactions on Intelligent Systems and Technology,2013,5(1):1-34.
[3]NOULAS A,SCELLATO S,LATHIA N,et al.Mining User Mobility Features for Next Place Prediction in Location-Based Services[C]∥2012 IEEE 12th International Conference on Data Mining.IEEE,2013:1038-1043.
[4]WEI L Y,ZHENG Y,PENG W C.Constructing popular routes from uncertain trajectories[C]∥ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2012:195-203.
[5]HE J,LI X,LIAO L,et al.Inferring a Personalized Next Point-of-Interest Recommendation Model with Latent Behavior Patterns[C]∥Thirtieth AAAI Conference on Artificial Intelligence.AAAI Press,2016:137-143.
[6]FENG S,LI X,ZENG Y,et al.Personalized ranking metric embedding for next new POI recommendation[C]∥International Conference on Artificial Intelligence.AAAI Press,2015:2069-2075.
[7]LI Y,ZHENG Y,ZHANG H,et al.Traffic prediction in a bike-sharing system[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2015.
[8]ZHENG Y,LIU F,HSIEH H P.U-Air:When urban air quality inference meets big data[C]∥ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2013:1436-1444.
[9]CAO J,XU S,ZHU X,et al.Effective fine-grained location prediction based on user check-in pattern in LBSNs.Journal of Network and Computer Applications,2018,108:64-75.
[10]CHANG J,SUN E.Location3:How Users Share and Respondto Location-Based Data on Social[C]∥International Conference on Weblogs and Social Media.Barcelona,Catalonia,2011:74-80.
[11]GAO H J,TANG J L,LIU H.Exploring social-historical ties on location-based social networks[C]∥Proceedings of the sixth International AAAI Conference on Weblogs and Social Media.Spain,2012:114-121.
[12]GAO H,TANG J,HU X,et al.Exploring temporal effects for location recommendation on location-based social networks∥Proceedings of the 7th ACM Conference on Recommender Systems.ACM,2013:93-100.
[13]GUO H,TANG R,YE Y,et al.DeepFM:A Factorization-Machine based Neural Network for CTR Prediction ∥Procee-dings of the Twenty-Sixth International Joint Conference on Artificial Intelligence.IJCAI,2017:1725-1731.
[14]RENDLE S.Factorization Machines[C]∥IEEE InternationalConference on Data Mining.IEEE,2011:995-1000.
[15]ZHANG W,DU T,WANG J.Deep Learning over Multi-field Categorical Data:A Case Study on User Response Prediction∥Advances in Information Retrieval-38th European Conference on IR Research.ECIR,2016:45-57.
[16]QU Y,CAI H,REN K,et al.Product-Based Neural Networks for User Response Prediction[C]∥2016 IEEE 16th Internatio-nal Conference on Data Mining (ICDM).IEEE,2016:1149-1154.
[17]BENGIO Y,YAO L,ALAIN G,et al.Generalized DenoisingAuto-Encoders as Generative Models ∥27th Annual Conference on Neural Information Processing Systems.2013:899-907.
[18]GRAEPEL T,BORCHERT T,HERBRICH R.Web-scale Bayes-ian click-through rate prediction for sponsored search advertising in Microsoft’s bing search engine[C]∥International Conference on on Machine Learning.Omnipress,2010.
[19]HE X,BOWERS S,CANDELA J Q,et al.Practical Lessonsfrom Predicting Clicks on Ads at Facebook ∥Proceedings of 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining.2014:1-9.
[20]MATTHEW R,EWA D,ROBERT R.Predicting Clicks:Estimating the Click-Through Rate for New Ads[C]∥Proceedings of the 16th International Conference on World Wide Web.WWW,2007:521-530.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[3] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[4] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[5] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[6] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[7] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[8] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[9] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[10] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[11] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[12] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[13] WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324.
[14] CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344.
[15] ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!