Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings

被引:12
|
作者
Chen, Charles [1 ]
Kim, Sungchul [2 ]
Bui, Hung [3 ]
Rossi, Ryan [2 ]
Koh, Eunyee [2 ]
Kveton, Branislav [4 ]
Bunescu, Razvan [1 ]
机构
[1] Ohio Univ, Athens, OH 45701 USA
[2] Adobe Res, San Jose, CA USA
[3] DeepMind, London, England
[4] Google Res, Mountain View, CA USA
关键词
Recurrent Neural Networks; user behavior modeling; representation learning;
D O I
10.1145/3269206.3272032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of mobile devices has resulted in the generation of a large number of user behavior logs that contain latent intentions and user interests. However, exploiting such data in real-world applications is still difficult for service providers due to the complexities of user behavior over a sheer number of possible actions that can vary according to time. In this work, a time-aware RNN model, TRNN, is proposed for predictive analysis from user behavior data. First, our approach predicts next user action more accurately than the baselines including the n-gram models as well as two recently introduced time-aware RNN approaches. Second, we use TRNN to learn user embeddings from sequences of user actions and show that overall the TRNN embeddings outperform conventional RNN embeddings. Similar to how word embeddings benefit a wide range of task in natural language processing, the learned user embeddings are general and could be used in a variety of tasks in the digital marketing area. This claim is supported empirically by evaluating their utility in user conversion prediction, and preferred application prediction. According to the evaluation results, TRNN embeddings perform better than the baselines including Bag of Words (BoW), TF.IDF and Doc2Vec. We believe that TRNN embeddings provide an effective representation for solving practical tasks such as recommendation, user segmentation and predictive analysis of business metrics.
引用
收藏
页码:2175 / 2182
页数:8
相关论文
共 50 条
  • [21] Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks
    Al-Qurishi, Muhammad
    Hossain, M. Shamim
    Alrubaian, Majed
    Rahman, Sk Md Mizanur
    Alamri, Atif
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) : 799 - 813
  • [22] Dynamic Embeddings for User Profiling in Twitter
    Liang, Shangsong
    Zhang, Xiangliang
    Ren, Zhaochun
    Kanoulas, Evangelos
    KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, : 1764 - 1773
  • [23] LEVERAGING PHILANTHROPIC BEHAVIOR FOR CUSTOMER SUPPORT: THE CASE OF USER SUPPORT FORUMS
    Jabr, Wael
    Mookerjee, Radha
    Tan, Yong
    Mookerjee, Vijay S.
    MIS QUARTERLY, 2014, 38 (01) : 187 - +
  • [24] Analyzing Spatial and Temporal User Behavior in Participatory Sensing
    Ngo Manh Khoi
    Casteleyn, Sven
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2018, 7 (09)
  • [25] Learning temporal regularities of user behavior for anomaly detection
    Seleznyov, A
    Mazhelis, O
    Puuronen, S
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 143 - 152
  • [26] A User Identification Algorithm Based on User Behavior Analysis in Social Networks
    Deng, Kaikai
    Xing, Ling
    Zheng, Longshui
    Wu, Honghai
    Xie, Ping
    Gao, Feifei
    IEEE ACCESS, 2019, 7 : 47114 - 47123
  • [27] User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper
    Jurisic, M.
    Tomicic, I.
    Grd, P.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2023, 23 (03) : 102 - 113
  • [28] ICEBOAT: An Interactive User Behavior Analysis Tool for Automotive User Interfaces
    Ebel, Patrick
    Lingenfelder, Christoph
    Guelle, Kim Julian
    Vogelsang, Andreas
    ADJUNCT PROCEEDINGS OF THE 35TH ACM SYMPOSIUM ON USER INTERFACE SOFTWARE & TECHNOLOGY, UIST 2022, 2022,
  • [29] Research on User Requirement Knowledge Acquisition By User Access Behavior Analysis
    Xiu, HeZhong
    Shuang, Wang
    Jun, DuYa
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 263 - +
  • [30] User Behavior Analysis Based on User Interest by Web Log Mining
    Luo, Xipei
    Wang, Jing
    Shen, Qiwei
    Wang, Jingyu
    Qi, Qi
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 486 - 490