Skip to content
/ Intro Public
forked from CQU-CSE/Intro

新生必读 A collection of classical literatures for newbies (students of Prof. Gao)

Notifications You must be signed in to change notification settings

mingaoo/Intro

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 

Repository files navigation

Intro 入门经典文献

A collection of classical literatures for newbies (students of Prof. Gao) Updating...
注:文献排序不分先后,建议同一主题先阅读综述,然后按序(年份)阅读。有的不支持外链的出版社可能无法通过贴的PDF地址下载,请自行检索下载地址

主题 Topics

推荐系统 Recommender System

综述 Survey

[1]. Bobadilla, Jesus, et al. "Recommender systems survey." Knowledge Based Systems (2013): 109-132.
[2]. Lu, Jie, et al. "Recommender system application developments." decision support systems (2015): 12-32.

矩阵分解 Matrix Factorization

[1]. Mnih, Andriy, and Ruslan Salakhutdinov. "Probabilistic Matrix Factorization." neural information processing systems (2008): 1257-1264. [PDF]
[2]. Koren, Yehuda, R. Bell, and C. Volinsky. "Matrix Factorization Techniques for Recommender Systems." Computer 42.8(2009):30-37.  [PDF]
[3]. Koren, Yehuda. "Collaborative filtering with temporal dynamics." Communications of The ACM 53.4 (2010): 89-97. [PDF]

贝叶斯排序 Bayes Ranking

[1]. Rendle, Steffen, et al. "BPR: Bayesian personalized ranking from implicit feedback." uncertainty in artificial intelligence (2009): 452-461. [PDF]
[2]. Zhao, Tong, Julian Mcauley, and Irwin King. "Leveraging Social Connections to Improve Personalized Ranking for Collaborative Filtering." conference on information and knowledge management (2014): 261-270. [PDF]

因子分解机 Factorization Machine

[1]. Rendle, Steffen. "Factorization Machines." international conference on data mining (2010). [PDF]
[2]. Rendle, Steffen, et al. "Fast context-aware recommendations with factorization machines." international acm sigir conference on research and development in information retrieval (2011): 635-644. [PDF]


异常检测 Anomaly Detection

托攻击 Shilling Detection

[1]. 伍之昂, 王有权, and 曹杰. "推荐系统托攻击模型与检测技术." (2014).   [PDF] (综述)
[2]. Lam, Shyong K., and John Riedl. "Shilling recommender systems for fun and profit." international world wide web conferences (2004): 393-402.  [PDF] (选读)
[3]. Mehta, Bhaskar, and Wolfgang Nejdl. "Unsupervised strategies for shilling detection and robust collaborative filtering." User Modeling and User-adapted Interaction (2009): 65-97. [PDF]
[4]. Wu, Zhiang, et al. "HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation." knowledge discovery and data mining (2012): 985-993. [PDF]

垃圾评论检测 Opinion Spam Detection


图/网络挖掘 Graph/Network Mining

网络嵌入 Network Embedding

[1]. Perozzi, Bryan, Rami Alrfou, and Steven Skiena. "DeepWalk: online learning of social representations." knowledge discovery and data mining (2014): 701-710. [PDF]
[2]. Tang, Jian, et al. "LINE: Large-scale Information Network Embedding." international world wide web conferences (2015): 1067-1077. [PDF]
[3]. Grover, Aditya, and Jure Leskovec. "node2vec: Scalable Feature Learning for Networks." knowledge discovery and data mining (2016): 855-864. [PDF]

About

新生必读 A collection of classical literatures for newbies (students of Prof. Gao)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published