• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zeng Xianyu, Liu Qi, Zhao Hongke, Xu Tong, Wang Yijun, Chen Enhong. Online Consumptions Prediction via Modeling User Behaviors and Choices[J]. Journal of Computer Research and Development, 2016, 53(8): 1673-1683. DOI: 10.7544/issn1000-1239.2016.20160103
Citation: Zeng Xianyu, Liu Qi, Zhao Hongke, Xu Tong, Wang Yijun, Chen Enhong. Online Consumptions Prediction via Modeling User Behaviors and Choices[J]. Journal of Computer Research and Development, 2016, 53(8): 1673-1683. DOI: 10.7544/issn1000-1239.2016.20160103

Online Consumptions Prediction via Modeling User Behaviors and Choices

More Information
  • Published Date: July 31, 2016
  • The rise of electronic e-commerce sites and the formation of the user’s online shopping habits, have brought a huge amount of online consumer behavioral data. Mining users’ preferences from these behavioral logs (e.g. clicking data) and then predicting their final consumption choices are of great importance for improving the conversion rate of e-commerce. Along this line, this paper proposes a way of combining users’ behavioral data and choice model to predict which item each user will finally consume. Specifically, we first estimate the optimum substitute in each consumption session by a utility function of users’ behavioral sequences, and then we build a latent factor based choice model (LF-CM) for the consumed items and the substitutes. In this way, the preference of users can be computed and the future consumptions can be predicted. One step further, to make full use of users’ information of choosing and improve the precision of consumption prediction, we also propose a learning-to-rank model (latent factor and sequence based choice model, LFS-CM), which considers all the items in one session. By integrating latent factors and utility function of users’ behavioral sequences, LFS-CM can improve the prediction precision. Finally, we use the real-world dataset of Tmall and evaluate the performance of our methods on a distributed environment. The experimental results show that both LF-CM and LFS-CM perform well in predicting online consumption behaviors.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [4]Guo Lifeng, Li Zhihao, Hu Lei. Efficient Public Encryption Scheme with Keyword Search for Cloud Storage[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414. DOI: 10.7544/issn1000-1239.2020.20190671
    [5]Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng. Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206. DOI: 10.7544/issn1000-1239.2019.20190378
    [6]Li Yuxi, Zhou Fucai, Xu Jian, Xu Zifeng. Multiple-Keyword Encrypted Search with Relevance Ranking on Dual-Server Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2149-2163. DOI: 10.7544/issn1000-1239.2018.20180433
    [7]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [8]Han Jun, Fan Ju, Zhou Lizhu. Semantic-Enhanced Spatial Keyword Search[J]. Journal of Computer Research and Development, 2015, 52(9): 1954-1964. DOI: 10.7544/issn1000-1239.2015.20140686
    [9]Guo Lifeng and Lu Bo. Efficient Proxy Re-encryption with Keyword Search Scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
    [10]Tang Mingzhu, Yang Yan, Guo Xuequan, Shen Zhonghui, Zhong Yingli. KWSDS: A Top-k Keyword Search System in Relational Databases[J]. Journal of Computer Research and Development, 2012, 49(10): 2251-2259.

Catalog

    Article views (1888) PDF downloads (1250) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return