10,278 research outputs found
Predicting human preferences using the block structure of complex social networks
With ever-increasing available data, predicting individuals' preferences and
helping them locate the most relevant information has become a pressing need.
Understanding and predicting preferences is also important from a fundamental
point of view, as part of what has been called a "new" computational social
science. Here, we propose a novel approach based on stochastic block models,
which have been developed by sociologists as plausible models of complex
networks of social interactions. Our model is in the spirit of predicting
individuals' preferences based on the preferences of others but, rather than
fitting a particular model, we rely on a Bayesian approach that samples over
the ensemble of all possible models. We show that our approach is considerably
more accurate than leading recommender algorithms, with major relative
improvements between 38% and 99% over industry-level algorithms. Besides, our
approach sheds light on decision-making processes by identifying groups of
individuals that have consistently similar preferences, and enabling the
analysis of the characteristics of those groups
UTSP: User-Based Two-Step Recommendation with Popularity Normalization towards Diversity and Novelty
© 2013 IEEE. Information technologies such as e-commerce and e-news bring overloaded information as well as convenience to users, cooperatives and companies. Recommender system is a significant technology in solving this information overload problem. Due to the outstanding accuracy performance in top-N recommendation tasks, two-step recommendation algorithms are suitable to generate recommendations. However, their recommendation lists are biased towards popular items. In this paper, we propose a user based two-step recommendation algorithm with popularity normalization to improve recommendation diversity and novelty, as well as two evaluation metrics to measure diverse and novel performance. Experimental results demonstrate that our proposed approach significantly improves the diversity and novelty performance while still inheriting the advantage of two-step recommendation approaches on accuracy metrics
Privacy-Friendly Collaboration for Cyber Threat Mitigation
Sharing of security data across organizational boundaries has often been
advocated as a promising way to enhance cyber threat mitigation. However,
collaborative security faces a number of important challenges, including
privacy, trust, and liability concerns with the potential disclosure of
sensitive data. In this paper, we focus on data sharing for predictive
blacklisting, i.e., forecasting attack sources based on past attack
information. We propose a novel privacy-enhanced data sharing approach in which
organizations estimate collaboration benefits without disclosing their
datasets, organize into coalitions of allied organizations, and securely share
data within these coalitions. We study how different partner selection
strategies affect prediction accuracy by experimenting on a real-world dataset
of 2 billion IP addresses and observe up to a 105% prediction improvement.Comment: This paper has been withdrawn as it has been superseded by
arXiv:1502.0533
Enhanced CNN for image denoising
Owing to flexible architectures of deep convolutional neural networks (CNNs),
CNNs are successfully used for image denoising. However, they suffer from the
following drawbacks: (i) deep network architecture is very difficult to train.
(ii) Deeper networks face the challenge of performance saturation. In this
study, the authors propose a novel method called enhanced convolutional neural
denoising network (ECNDNet). Specifically, they use residual learning and batch
normalisation techniques to address the problem of training difficulties and
accelerate the convergence of the network. In addition, dilated convolutions
are used in the proposed network to enlarge the context information and reduce
the computational cost. Extensive experiments demonstrate that the ECNDNet
outperforms the state-of-the-art methods for image denoising.Comment: CAAI Transactions on Intelligence Technology[J], 201
Opening the Black Box: Explaining the Process of Basing a Health Recommender System on the I-Change Behavioral Change Model
Recommender systems are gaining traction in healthcare because they can tailor recommendations
based on users' feedback concerning their appreciation of previous health-related messages. However,
recommender systems are often not grounded in behavioral change theories, which may further increase
the effectiveness of their recommendations. This paper's objective is to describe principles for designing
and developing a health recommender system grounded in the I-Change behavioral change model that
shall be implemented through a mobile app for a smoking cessation support clinical trial. We built upon
an existing smoking cessation health recommender system that delivered motivational messages through a
mobile app. A group of experts assessed how the system may be improved to address the behavioral change
determinants of the I-Change behavioral change model. The resulting system features a hybrid recommender
algorithm for computer tailoring smoking cessation messages. A total of 331 different motivational messages
were designed using 10 health communication methods. The algorithm was designed to match 58 message
characteristics to each user pro le by following the principles of the I-Change model and maintaining the
bene ts of the recommender system algorithms. The mobile app resulted in a streamlined version that aimed
to improve the user experience, and this system's design bridges the gap between health recommender
systems and the use of behavioral change theories. This article presents a novel approach integrating
recommender system technology, health behavior technology, and computer-tailored technology. Future
researchers will be able to build upon the principles applied in this case study.European Union's Horizon 2020 Research and Innovation Programme under Grant 68112
- …