2009
DOI: 10.1155/2009/421425
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Collaborative Filtering Techniques

Abstract: As one of the most successful approaches to building recommender systems, collaborative filtering (CF) uses the known preferences of a group of users to make recommendations or predictions of the unknown preferences for other users. In this paper, we first introduce CF tasks and their main challenges, such as data sparsity, scalability, synonymy, gray sheep, shilling attacks, privacy protection, etc., and their possible solutions. We then present three main categories of CF techniques: memory-based, model-base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
1,765
0
58

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 2,892 publications
(1,826 citation statements)
references
References 68 publications
3
1,765
0
58
Order By: Relevance
“…The recommendation algorithms can be divided into three classes: content-based [26], collaborative filtering (CF) [22], [30] and hybrid recommendation algorithms [1]. The content-based approaches analyze the content feature of the items and the attributes of the users, and then measure similarity between the users and items for recommendation, regardless of the users's rating/selection history.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The recommendation algorithms can be divided into three classes: content-based [26], collaborative filtering (CF) [22], [30] and hybrid recommendation algorithms [1]. The content-based approaches analyze the content feature of the items and the attributes of the users, and then measure similarity between the users and items for recommendation, regardless of the users's rating/selection history.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, they suffer from the sparsity problem if rating/selection history is short. CF algorithms can be further divided into two categories: memory-based CF [23], Item-KNN [28] and model-based CF [30]. The hybrid approaches combine the content-based and CF methods to avoid their limitations.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the things with the most astounding anticipated appraisals are prescribed. Concerning the comparability of clients, [262] and [263] state that for the most part either a relationship based likeness (e.g., Pearson connection coefficient) or a cosinesimilitude measure in view of client profile vectors is connected. With respect to thing based sifting, the objective is to locate the most comparable things taking into account the client profiles of the clients who appraised these things [264].…”
Section: Memory-based Cfmentioning
confidence: 99%
“…This results are noteworthy, because traditional privacy attacks were based on aggregating information from multiple datasets. Such methods were based on collaborative filtering [46] and enabled an efficient and highly reliable characterization of a person from a few data. The underlying technology is quickly advancing [47], and it may give service providers, such as mobile phone, Internet television, or social gaming centers an unprecedented amount of personal information.…”
Section: Current and Future Threats To Privacymentioning
confidence: 99%