458 research outputs found
On content-based recommendation and user privacy in social-tagging systems
Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively has been named social tagging, and it is one of the most popular in which users engage online, and although it has opened new possibilities for application interoperability on the semantic web, it is also posing new privacy threats. It, in fact, consists of describing online or offline resources by using free-text labels (i.e. tags), therefore exposing the user profile and activity to privacy attacks. Users, as a result, may wish to adopt a privacy-enhancing strategy in order not to reveal their interests completely. Tag forgery is a privacy enhancing technology consisting of generating tags for categories or resources that do not reflect the user's actual preferences. By modifying their profile, tag forgery may have a negative impact on the quality of the recommendation system, thus protecting user privacy to a certain extent but at the expenses of utility loss. The impact of tag forgery on content-based recommendation is, therefore, investigated in a real-world application scenario where different forgery strategies are evaluated, and the consequent loss in utility is measured and compared.Peer ReviewedPostprint (author’s final draft
Discovering the Impact of Knowledge in Recommender Systems: A Comparative Study
Recommender systems engage user profiles and appropriate filtering techniques
to assist users in finding more relevant information over the large volume of
information. User profiles play an important role in the success of
recommendation process since they model and represent the actual user needs.
However, a comprehensive literature review of recommender systems has
demonstrated no concrete study on the role and impact of knowledge in user
profiling and filtering approache. In this paper, we review the most prominent
recommender systems in the literature and examine the impression of knowledge
extracted from different sources. We then come up with this finding that
semantic information from the user context has substantial impact on the
performance of knowledge based recommender systems. Finally, some new clues for
improvement the knowledge-based profiles have been proposed.Comment: 14 pages, 3 tables; International Journal of Computer Science &
Engineering Survey (IJCSES) Vol.2, No.3, August 201
Toward a Robust Diversity-Based Model to Detect Changes of Context
Being able to automatically and quickly understand the user context during a
session is a main issue for recommender systems. As a first step toward
achieving that goal, we propose a model that observes in real time the
diversity brought by each item relatively to a short sequence of consultations,
corresponding to the recent user history. Our model has a complexity in
constant time, and is generic since it can apply to any type of items within an
online service (e.g. profiles, products, music tracks) and any application
domain (e-commerce, social network, music streaming), as long as we have
partial item descriptions. The observation of the diversity level over time
allows us to detect implicit changes. In the long term, we plan to characterize
the context, i.e. to find common features among a contiguous sub-sequence of
items between two changes of context determined by our model. This will allow
us to make context-aware and privacy-preserving recommendations, to explain
them to users. As this is an ongoing research, the first step consists here in
studying the robustness of our model while detecting changes of context. In
order to do so, we use a music corpus of 100 users and more than 210,000
consultations (number of songs played in the global history). We validate the
relevancy of our detections by finding connections between changes of context
and events, such as ends of session. Of course, these events are a subset of
the possible changes of context, since there might be several contexts within a
session. We altered the quality of our corpus in several manners, so as to test
the performances of our model when confronted with sparsity and different types
of items. The results show that our model is robust and constitutes a promising
approach.Comment: 27th IEEE International Conference on Tools with Artificial
Intelligence (ICTAI 2015), Nov 2015, Vietri sul Mare, Ital
Client-server multi-task learning from distributed datasets
A client-server architecture to simultaneously solve multiple learning tasks
from distributed datasets is described. In such architecture, each client is
associated with an individual learning task and the associated dataset of
examples. The goal of the architecture is to perform information fusion from
multiple datasets while preserving privacy of individual data. The role of the
server is to collect data in real-time from the clients and codify the
information in a common database. The information coded in this database can be
used by all the clients to solve their individual learning task, so that each
client can exploit the informative content of all the datasets without actually
having access to private data of others. The proposed algorithmic framework,
based on regularization theory and kernel methods, uses a suitable class of
mixed effect kernels. The new method is illustrated through a simulated music
recommendation system
- …