15,850 research outputs found

    Neural Collaborative Ranking

    Full text link
    Recommender systems are aimed at generating a personalized ranked list of items that an end user might be interested in. With the unprecedented success of deep learning in computer vision and speech recognition, recently it has been a hot topic to bridge the gap between recommender systems and deep neural network. And deep learning methods have been shown to achieve state-of-the-art on many recommendation tasks. For example, a recent model, NeuMF, first projects users and items into some shared low-dimensional latent feature space, and then employs neural nets to model the interaction between the user and item latent features to obtain state-of-the-art performance on the recommendation tasks. NeuMF assumes that the non-interacted items are inherent negative and uses negative sampling to relax this assumption. In this paper, we examine an alternative approach which does not assume that the non-interacted items are necessarily negative, just that they are less preferred than interacted items. Specifically, we develop a new classification strategy based on the widely used pairwise ranking assumption. We combine our classification strategy with the recently proposed neural collaborative filtering framework, and propose a general collaborative ranking framework called Neural Network based Collaborative Ranking (NCR). We resort to a neural network architecture to model a user's pairwise preference between items, with the belief that neural network will effectively capture the latent structure of latent factors. The experimental results on two real-world datasets show the superior performance of our models in comparison with several state-of-the-art approaches.Comment: Proceedings of the 2018 ACM on Conference on Information and Knowledge Managemen

    Transit of asteroids across the 7/3 Kirkwood gap under the Yarkovsky effect

    Full text link
    Many asteroids in the main belt are continuously pushed by Yarkovsky effect into regions of different mean motion resonances (MMRs) and then ejected out. They are considered as the principal source of near-Earth objects. We investigate in this paper the effects of the 7/3 MMR with Jupiter (J7/3 MMR) on the transportation of asteroids from Koronis and Eos families that reside respectively on the inner and outer side of the resonance. The fraction of asteroids that make successful crossing through the resonance and the escaping rate from the resonance are found to depend on the Yarkovsky drifting rate, the initial inclination and the migrating direction. The excitation of eccentricity and inclination due to the combined influence from both the resonance and Yarkovsky effect is discussed. Only the eccentricity can be pumped up considerably, and it is attributed mainly to the resonance. In the observational data, family members are also found in the resonance and on the opposite side of the resonance with respect to the corresponding family centre. The existence of these family members is explained using our results of numerical simulations. Finally, the replenishment of asteroids in the J7/3 MMR and the transportation of asteroids by it are discussed.Comment: 10 pages, 10 figures. Accepted by A&

    QEBA: Query-Efficient Boundary-Based Blackbox Attack

    Full text link
    Machine learning (ML), especially deep neural networks (DNNs) have been widely used in various applications, including several safety-critical ones (e.g. autonomous driving). As a result, recent research about adversarial examples has raised great concerns. Such adversarial attacks can be achieved by adding a small magnitude of perturbation to the input to mislead model prediction. While several whitebox attacks have demonstrated their effectiveness, which assume that the attackers have full access to the machine learning models; blackbox attacks are more realistic in practice. In this paper, we propose a Query-Efficient Boundary-based blackbox Attack (QEBA) based only on model's final prediction labels. We theoretically show why previous boundary-based attack with gradient estimation on the whole gradient space is not efficient in terms of query numbers, and provide optimality analysis for our dimension reduction-based gradient estimation. On the other hand, we conducted extensive experiments on ImageNet and CelebA datasets to evaluate QEBA. We show that compared with the state-of-the-art blackbox attacks, QEBA is able to use a smaller number of queries to achieve a lower magnitude of perturbation with 100% attack success rate. We also show case studies of attacks on real-world APIs including MEGVII Face++ and Microsoft Azure.Comment: Accepted by CVPR 202
    • …
    corecore