Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &Amp; Data Mining 2019
DOI: 10.1145/3292500.3330895
|View full text |Cite
|
Sign up to set email alerts
|

Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks

Abstract: Modeling sequential interactions between users and items/products is crucial in domains such as e-commerce, social networking, and education. Representation learning presents an attractive opportunity to model the dynamic evolution of users and items, where each user/item can be embedded in a Euclidean space and its evolution can be modeled by an embedding trajectory in this space. However, existing dynamic embedding methods generate embeddings only when users take actions and do not explicitly model the futur… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
424
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 419 publications
(428 citation statements)
references
References 43 publications
1
424
0
Order By: Relevance
“…In DyRep [22], both association and communication interactions are modeled by a two time-scale TPPs. A recent method JODIE [11] also employs the coupled RNNs to generate dynamic embeddings but trained by predicting the next embedding directly instead of modeling the intensity. In this work, unlike previous methods that use the coupled vanilla RNNs and have limited model capacity, our dynamic message passing neural network(TDIG-MPNN) can generate more expressive and informative embedding representations.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In DyRep [22], both association and communication interactions are modeled by a two time-scale TPPs. A recent method JODIE [11] also employs the coupled RNNs to generate dynamic embeddings but trained by predicting the next embedding directly instead of modeling the intensity. In this work, unlike previous methods that use the coupled vanilla RNNs and have limited model capacity, our dynamic message passing neural network(TDIG-MPNN) can generate more expressive and informative embedding representations.…”
Section: Related Workmentioning
confidence: 99%
“…Relation to previous work. The graph construction in the Deep-Coevolveve and JODIE [2,11] differs from our in that the nodes ( ) and ( ) associated with the , , are only connected by these two nodes themselves before the time (i.e., they use a different way to construct the temporal graph edges and they don't provide a formal definition about their graph), which means when updating the states, only previous states of these two nodes themselves are considered, not including the states of the other parties is observed at time 6 , the corresponding TDIG is updated with one newly-added two-way interaction edge and the four newly-added directed dependency edges, i.e., 0 , 1 , 2 and 3 . The red dotted square denotes the 3-depth TDIG sub-graph G 6 ( , = 3) for the node at 6 and the Δ ( , 6 ) represents the time interval(as the edge feature for the edge 3 and 4 ) between , , 6 and the last interaction "Lucy saw the Skull movie at 5 " where the node was involved.…”
Section: Temporal Dependency Interaction Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly in [8], authors discuss how to enrich trajectories with semantic information based on stop points in moving objects. Kumar et al [16] proposed a model that learns dynamic trajectory embeddings of users and items from a sequence of temporal interactions. We look at trajectories and geographical areas in terms of developing and enriching semantic understanding of regions.…”
Section: Trajectory Data Miningmentioning
confidence: 99%
“…Graph SSL finds applications in a number of settings: in a social network, we can infer a particular characteristic (e.g. political leaning) of a user based on the information of her friends to produce tailored recommendations; in a user-product bipartite rating network, based on a few manually identified fraudulent user accounts, SSL is useful to spot other fraudulent accounts [4,10,18,19]; SSL can identify protein functions from networks of their physical interaction using just a few labels [32].…”
Section: Introductionmentioning
confidence: 99%