10,278 research outputs found

    Predicting human preferences using the block structure of complex social networks

    Get PDF
    With ever-increasing available data, predicting individuals' preferences and helping them locate the most relevant information has become a pressing need. Understanding and predicting preferences is also important from a fundamental point of view, as part of what has been called a "new" computational social science. Here, we propose a novel approach based on stochastic block models, which have been developed by sociologists as plausible models of complex networks of social interactions. Our model is in the spirit of predicting individuals' preferences based on the preferences of others but, rather than fitting a particular model, we rely on a Bayesian approach that samples over the ensemble of all possible models. We show that our approach is considerably more accurate than leading recommender algorithms, with major relative improvements between 38% and 99% over industry-level algorithms. Besides, our approach sheds light on decision-making processes by identifying groups of individuals that have consistently similar preferences, and enabling the analysis of the characteristics of those groups

    UTSP: User-Based Two-Step Recommendation with Popularity Normalization towards Diversity and Novelty

    Full text link
    © 2013 IEEE. Information technologies such as e-commerce and e-news bring overloaded information as well as convenience to users, cooperatives and companies. Recommender system is a significant technology in solving this information overload problem. Due to the outstanding accuracy performance in top-N recommendation tasks, two-step recommendation algorithms are suitable to generate recommendations. However, their recommendation lists are biased towards popular items. In this paper, we propose a user based two-step recommendation algorithm with popularity normalization to improve recommendation diversity and novelty, as well as two evaluation metrics to measure diverse and novel performance. Experimental results demonstrate that our proposed approach significantly improves the diversity and novelty performance while still inheriting the advantage of two-step recommendation approaches on accuracy metrics

    Privacy-Friendly Collaboration for Cyber Threat Mitigation

    Full text link
    Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat mitigation. However, collaborative security faces a number of important challenges, including privacy, trust, and liability concerns with the potential disclosure of sensitive data. In this paper, we focus on data sharing for predictive blacklisting, i.e., forecasting attack sources based on past attack information. We propose a novel privacy-enhanced data sharing approach in which organizations estimate collaboration benefits without disclosing their datasets, organize into coalitions of allied organizations, and securely share data within these coalitions. We study how different partner selection strategies affect prediction accuracy by experimenting on a real-world dataset of 2 billion IP addresses and observe up to a 105% prediction improvement.Comment: This paper has been withdrawn as it has been superseded by arXiv:1502.0533

    Enhanced CNN for image denoising

    Full text link
    Owing to flexible architectures of deep convolutional neural networks (CNNs), CNNs are successfully used for image denoising. However, they suffer from the following drawbacks: (i) deep network architecture is very difficult to train. (ii) Deeper networks face the challenge of performance saturation. In this study, the authors propose a novel method called enhanced convolutional neural denoising network (ECNDNet). Specifically, they use residual learning and batch normalisation techniques to address the problem of training difficulties and accelerate the convergence of the network. In addition, dilated convolutions are used in the proposed network to enlarge the context information and reduce the computational cost. Extensive experiments demonstrate that the ECNDNet outperforms the state-of-the-art methods for image denoising.Comment: CAAI Transactions on Intelligence Technology[J], 201

    Opening the Black Box: Explaining the Process of Basing a Health Recommender System on the I-Change Behavioral Change Model

    Get PDF
    Recommender systems are gaining traction in healthcare because they can tailor recommendations based on users' feedback concerning their appreciation of previous health-related messages. However, recommender systems are often not grounded in behavioral change theories, which may further increase the effectiveness of their recommendations. This paper's objective is to describe principles for designing and developing a health recommender system grounded in the I-Change behavioral change model that shall be implemented through a mobile app for a smoking cessation support clinical trial. We built upon an existing smoking cessation health recommender system that delivered motivational messages through a mobile app. A group of experts assessed how the system may be improved to address the behavioral change determinants of the I-Change behavioral change model. The resulting system features a hybrid recommender algorithm for computer tailoring smoking cessation messages. A total of 331 different motivational messages were designed using 10 health communication methods. The algorithm was designed to match 58 message characteristics to each user pro le by following the principles of the I-Change model and maintaining the bene ts of the recommender system algorithms. The mobile app resulted in a streamlined version that aimed to improve the user experience, and this system's design bridges the gap between health recommender systems and the use of behavioral change theories. This article presents a novel approach integrating recommender system technology, health behavior technology, and computer-tailored technology. Future researchers will be able to build upon the principles applied in this case study.European Union's Horizon 2020 Research and Innovation Programme under Grant 68112
    corecore