2012
DOI: 10.1109/tkde.2011.129
|View full text |Cite
|
Sign up to set email alerts
|

Coupled Behavior Analysis with Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
155
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 142 publications
(155 citation statements)
references
References 28 publications
0
155
0
Order By: Relevance
“…Generally, content-based methods are able to cope with the sparsity problem, however, they often assume an item's attributes are "iid" which does not always hold in reality. Actually, several research outcomes (Cao, Ou, and Yu 2012) ) (Wang, She, and Cao 2013a) (Wang, She, and Cao 2013b) have been proposed to handle these challenging issues. To the best of our knowledge, in relation to RS, there is only one paper (Yu et al 2013) which applies a coupled clustering method to group the items, then exploits CF to make recommendations.…”
Section: Content-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, content-based methods are able to cope with the sparsity problem, however, they often assume an item's attributes are "iid" which does not always hold in reality. Actually, several research outcomes (Cao, Ou, and Yu 2012) ) (Wang, She, and Cao 2013a) (Wang, She, and Cao 2013b) have been proposed to handle these challenging issues. To the best of our knowledge, in relation to RS, there is only one paper (Yu et al 2013) which applies a coupled clustering method to group the items, then exploits CF to make recommendations.…”
Section: Content-based Methodsmentioning
confidence: 99%
“…Collaborative filtering (CF) (Su and Khoshgoftaar 2009) (Sarwar et al 2001) (Deshpande and Karypis 2004) is one of the most successful approaches, taking advantage of user rating history to predict users' interests. User-based CF and item-based CF are mainly involved in the CF method.…”
Section: Collaborative Filteringmentioning
confidence: 99%
“…Cao et al [2] proposed a correlated Hidden Markov detection model to deal with the problem that abnormal data may raise the global sensitivity. They detected and removed the abnormal data by applying the one-step transition probability, which can decrease the noise level added to the original data.…”
Section: Related Workmentioning
confidence: 99%
“…Existing differential privacy preserving methods for correlated time series can be categorized into model-based methods and transform-based methods. The model-based methods rebuilt the sensitivity function by applying correlation models, such as Markov [2] and Bayesian [3] correlation models, or by applying coefficient matrix models [4]. The transform-based methods can be divided into two types.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, due to the interaction between multi-type objects guided by multi-type relations, besides objects as clustering target, it is often necessary to explicitly consider the contributions by those nontarget associated objects, and relations between target objects and non-target objects or even between non-target objects themselves. This involves the necessity of considering coupling relationships (Cao et al 2012) between heterogeneous objects and between relations and objects.…”
Section: Introductionmentioning
confidence: 99%