Abstract
The high socialization and ubiquity of emerging e-commerce brings together huge user groups and potential business opportunities. A large number of malicious users gain economic benefits by generating and spreading false opinions and junk information. The analysis and detection of malicious user behavior has become a hot field in the interdisciplinary field of e-commerce.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen G, Wang J, Guo X, Xu X, Hu L, Liao X (2013) Behavior of emerging E-commerce participants. Tsinghua University Press
Mo Q, Yang K (2014) Research on network spammers identification. J Softw 25(7):1505–1526
Zhang F, Xu S (2008) Survey on security issues and technology of recommender systems. Appl Res Comput 25(3):656–659
Lee K, Caverlee J, Webb S (2010) The social honeypot project: protecting online communities from spammers. In: Proceedings of the 19th international conference on world wide web (WWW 2010). ACM, pp 1139–1140
Hu X, Tang J, Liu H (2014) Online social spammer detection. In: Twenty-eighth AAAI conference on artificial intelligence (AAAI 2014). AAAI Press, pp 59–65
Hu X, Tang J, Zhang Y et al (2013) Social spammer detection in microblogging. In: Proceedings of the twenty-third international joint conference on artificial intelligence (IJCAI 2013). AAAI Press, pp 2633–2639
Benevenuto F, Magno G, Rodrigues T et al (2010) Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS 2010), pp 6–12
Lecun Y, Boser B, Denker J, Henderson D (2014) Backpropagation applied to handwritten zip code recognition. Neural Comput 1:541–551
Mukherjee A, Venkataraman V, Liu B (2013) What Yelp fake review filter might be doing. In: Proceedings of the 7th international AAAI conference on weblogs and social media (ICWSM 2013), Cambridge, MA, pp 409–418
Xie S, Wang G, Lin S et al (2012) Review spam detection via temporal pattern discovery. In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2012), Beijing, pp 823–831
Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the first ACM international conference on web search and data mining (WSDM 2008), Stanford, pp 219–230
Jindal N, Liu B, Lim EP (2010) Finding unusual review patterns using unexpected rules. In: Proceedings of the 19th ACM conference on information and knowledge management (CIKM 2010). ACM, pp 1549–1552
Shojaee S, Murad MAA, Bin Azman A et al (2013) Detecting deceptive reviews using lexical and syntactic features. In: Proceedings of the 13th IEEE international conference on intelligent systems design and applications (ISDA 2013), Selangor, pp 53–58
Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In: Autonomic and trusted computing. Springer Berlin Heidelberg, pp 175–186
Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: 14th Pacific-Asia conference on advances in knowledge discovery and data mining. Springer Berlin Heidelberg, pp 410–421
Muller E, Sánchez PI, Mulle Y et al (2013) Ranking outlier nodes in subspaces of attributed graphs. In: 2013 IEEE 29th international conference on data engineering workshops (ICDEW). IEEE, pp 216–222
Li N, Sun H, Chipman KC et al (2014) A probabilistic approach to uncovering attributed graph anomalies. In: Proceedings of the 2014 SIAM international conference on data mining (SDM 2014). SIAM, pp 82–90
Gao J, Liang F, Fan W et al (2010) On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 813–822
Jiang M, Cui P, Beutel A et al (2014) Inferring strange behavior from connectivity pattern in social networks. In: 18th Pacific-Asia conference on advances in knowledge discovery and data mining (PAKDD 2014). Springer International Publishing, pp 126–138
Prakash BA, Sridharan A, Seshadri M et al (2010) EigenSpokes: surprising patterns and scalable community chipping in large graphs. In: 14th Pacific-Asia conference on advances in knowledge discovery and data mining (PAKDD 2010). Springer Berlin Heidelberg, pp 435–448
Shah N, Beutel A, Gallagher B et al (2014) Spotting suspicious link behavior with fBox: an adversarial perspective. In: 2014 IEEE international conference on data mining (ICDM 2014). IEEE, pp 959–964
Cheng H, Tan PN, Potter C et al (2009) Detection and characterization of anomalies in multivariate time series. In: Proceedings of the SIAM international conference on data mining (SDM 2009). SIAM, pp 413–424
Li X, Han J (2007) Mining approximate top-k subspace anomalies in multi-dimensional time-series data. In: Proceedings of the 33rd international conference on very large data bases (VLDB 2007). VLDB Endowment, pp 447–458
Izakian H, Pedrycz W (2014) Anomaly detection and characterization in spatial time series data: a cluster-centric approach. IEEE Trans Fuzzy Syst 22(6):1612–1624
Beutel A, Xu W, Guruswami V et al (2013) CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In: Proceedings of the 22nd international conference on world wide web (WWW 2013). ACM, pp 119–130
Ferraz Costa A, Yamaguchi Y, Juci Machado Traina A et al (2015) RSC: mining and modeling temporal activity in social media. In: Proceedings of the 21st ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2015). ACM, pp 269–278
Lim EP, Nguyen VA, Jindal N et al (2010) Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM international conference on information and knowledge management (CIKM 2010). ACM, pp 939–948
Mukherjee A, Kumar A, Liu B et al (2013) Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2013). ACM, pp 632–640
Lin C, He J, Zhou Y et al (2013) Analysis and identification of spamming behaviors in sina weibo microblog. In: Proceedings of the 7th workshop on social network mining and analysis (SNAKDD 2013). ACM, Article No. 5
Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th international conference on world wide web (WWW 2004). ACM, New York, pp 393–402
Günnemann S, Günnemann N, Faloutsos C (2014) Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2014). ACM, pp 841–850
Zhou W, Koh YS, Wen J et al (2014) Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval (SIGIR 2014). ACM, pp 955–958
Zhang Y, Tan Y, Zhang M et al (2015) Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: Proceedings of the 24th international conference on artificial intelligence (IJCAI 2015). AAAI Press, pp 2408–2414
Gunes I, Kaleli C, Bilge A et al (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767–799
Koren Y (2008) Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2008). ACM, pp 426–434
Salakhutdinov R, Mnih A (2008) Bayesian probabilistic matrix factorization using Markov chain Monte Carlo. In: Proceedings of the 25th international conference on machine learning (ICML 2008). ACM, pp 880–887
Koren Y (2010) Collaborative filtering with temporal dynamics. Commun ACM 53(4):89–97
Beutel A, Murray K, Faloutsos C et al (2014) CoBaFi: collaborative Bayesian filtering. In: Proceedings of the 23rd international conference on world wide web (WWW 2014). ACM, pp 97–108
Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on web information and data management (WIDM 2005), Bremen, pp 67–74
Williams CA, Mobasher B (2006) Profile injection attack detection for securing collaborative recommender systems. Technical report, DePaul University
Burke R, Mobasher B, Williams C et al (2006) Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2006). ACM, pp 542–547
Bank Card Professional Committee of China Banking Association (2018) Blue book on the development of China’s bank card industry 2018. China Finance Press, Beijing
Breiman L (2001) Random forests. Mach Learn 45:5–32
Dong S, Huang Z (2013) Analysis of random forest theory. Ensemble Technol 2(1):1–7
Wang Y, Xia S (2018) Integrated study of a random forest algorithm review. J Inf Commun Technol 12(1):49–55
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297
Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55:119–139
Lecun Y, Bottou L, Bengio Y et al (1998) Gradient-based learning applied to document recognition. Proc IEEE 86:2278–2324
Lecun Y, Boser B, Denker J et al (2014) Backpropagation applied to handwritten zip code recognition. Neural Comput 1:541–551
Hsu TC, Liou S, Wang Y et al (2019) Enhanced recurrent neural network for combining static and dynamic features for credit card default prediction. In: ICASSP 2019–2019 IEEE international conference on acoustics, speech and signal processing (ICASSP), Hof, 12–17 May 2019, pp 1572–1576
Liu M, Zhang S, He Y (2017) Credit card customer default prediction based on improved fuzzy neural network. Fuzzy Syst Math 31(1):143–148
Wan M, Wang D, Goldman M et al (2017) Modeling consumer preferences and price sensitivities from large-scale grocery shopping transaction logs. In: Proceedings of the 26th international conference on world wide web, pp 1103–1112
Zhang J, Wedel M (2009) The effectiveness of customized promotions in online and offline stores. J Mark Res 46(2):190–206
Cheng AJ, Chen YY, Huang YT et al (2011) Personalized travel recommendation by mining people attributes from community-contributed photos. In: Proceedings of the 19th ACM international conference on multimedia, pp 83–92
Khan MUS, Khalid O, Huang Y et al (2015) MacroServ: a route recommendation service for large-scale evacuations. IEEE Trans Serv Comput 10(4):589–602
Wen YT, Yeo J, Peng WC et al (2017) Efficient keyword-aware representative travel route recommendation. IEEE Trans Knowl Data Eng 29(8):1639–1652
Liu Q, Chen E, Xiong H et al (2014) A cocktail approach for travel package recommendation. IEEE Trans Knowl Data Eng 26(2):278–293
Ge Y, Liu Q, Xiong H et al (2011) Cost-aware travel tour recommendation. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, pp 983–991
Ge Y, Xiong H, Tuzhilin A et al (2011) Collaborative filtering with collective training. In: Proceedings of the 5th ACM conference on recommender systems, pp 281–284
Pazzani MJ, Billsus D (2007) Content-based recommendation systems. Springer, Berlin, pp 325–341
Agarwal D, Chen BC (2009) Regression-based latent factor models. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 19–28
Koohi H, Kiani K (2016) User based collaborative filtering using fuzzy C-means. Measurement 91:134–139
Linden G, Smith B, York J (2003) Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Comput 7(1):76–80
Ge Y, Xiong H, Tuzhilin A et al (2014) Cost-aware collaborative filtering for travel tour recommendations. ACM Trans Inf Syst 32(1):Article 4
Gantner Z, Drumond L, Freudenthaler C et al (2010) Learning attribute-to-feature mappings for cold-start recommendations. In: Proceedings of the 10th IEEE international conference on data mining, pp 176–185
Ahn HJ (2008) A new similarity measure for collaborative filtering to alleviate the new user cold-starting problem. Inf Sci 178(1):37–51
Burke R (2007) Hybrid web recommender systems. Springer, Berlin, pp 377–408
Koren Y (2009) Collaborative filtering with temporal dynamics. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 447–456
Ma H, King I, Lyu MR (2011) Learning to recommend with explicit and implicit social relations. ACM Trans Intell Syst Technol 2(3):Article 29
Wang J, Zhang Y (2011) Utilizing marginal net utility for recommendation in ecommerce. In: Proceedings of the 34th international ACM SIGIR conference on research and development in information retrieval, pp 1003–1012
Salakhutdinov R, Mnih A, Hinton G (2007) Restricted Boltzmann machines for collaborative filtering. In: Proceedings of the 24th international conference on machine learning, pp 791–798
Wang H, Wang N, Yeung DY (2015) Collaborative deep learning for recommender systems. In: Proceedings of the 21st ACM SIGKDD international conference on knowledge discovery and data mining, pp 1235–1244
He X, Liao L, Zhang H et al (2017) Neural collaborative filtering. In: Proceedings of the 26th international conference on world wide web, pp 173–182
He X, He Z, Song J et al (2018) NAIS: neural attentive item similarity model for recommendation. IEEE Trans Knowl Data Eng 30(12):2354–2366
Chen J, Zhang H, He X et al (2017) Attentive collaborative filtering: multimedia recommendation with item- and component-level attention. In: Proceedings of the 40th international ACM SIGIR conference on research and development in information retrieval, pp 335–344
Devooght R, Bersini H (2017) Long and short-term recommendations with recurrent neural networks. In: Proceedings of the 25th conference on user modeling, adaptation and personalization, pp 13–21
Sedhain S, Menon AK, Sanner S et al (2015) AutoRec: autoencoders meet collaborative filtering. In: Proceedings of the 24th international conference on world wide web, pp 111–112
Xue HJ, Dai X, Zhang J et al (2017) Deep matrix factorization models for recommender systems. In: Proceedings of the 26th international joint conference on artificial intelligence, pp 3203–3209
Covington P, Adams J, Sargin E (2016) Deep neural networks for YouTube recommendations. In: Proceedings of the 10th ACM conference on recommender systems, pp 191–198
Guo H, Tang R, Ye Y et al (2017) DeepFM: a factorization-machine based neural network for CTR prediction. In: Proceedings of the 26th international joint conference on artificial intelligence, pp 1725–1731
Elkahky AM, Song Y, He X (2015) A multi-view deep learning approach for cross domain user modeling in recommendation systems. In: Proceedings of the 24th international conference on world wide web, pp 278–288
He W, Xu F (2013) Promotional goods inventory model with demand dependent on inventory and shortage partially delayed. J Comput Appl 33(10):2950–2959
Huang Y, Zhang Y (2021) Sales forecasting of E-commerce industry based on GM(1, N)-Prophet combination model. J Southwest Univ Natl (Nat Sci Ed) 47(3):317–325
Luo Y, Lv Y, Li B (2009) Hybrid cigarette sales forecasting model based on ARMA. Appl Res Comput 26(7):2664–2668
Chang B, Zhang H, Liao C et al (2018) Retail sales forecasting based on selective ensemble ARMA combination model. Comput Meas Control 26(5):132–135
Feng C, Chen Z (2019) Application of weighted combination model based on XGBoost and LSTM in sales forecasting. Appl Comput Syst 28(10):226–232
Ma C, Wang X (2018) Dish sales prediction based on LSTM network model. Mod Comput (Prof Ed) 23:26–30
Li Z, Wu Q (2019) Research on stock prediction algorithm based on LSTM neural network. Fujian Comput 35(7):41–43
Li Z, Zhang K (2020) Comparison research of car sales forecasting model based on BP algorithm and LSTM algorithm. Econ Res Guide 20:84–88+93
Wang Y (2018) Research on E-commerce demand forecasting based on LSTM neural network. Master’s thesis, Shandong University, Jinan
Jiang W (2019) Research on commodity sales forecasting based on WaveNet-LSTM network. Master’s thesis, Guangdong University of Technology, Guangzhou
Law M, Kwok R, Ng M (2016) An extended online purchase intention model for middle-aged online users. Electron Commer Res Appl 20:132–146
Li D, Zhao G, Wang Z et al (2015) A method of purchase prediction based on user behavior log. In: Proceedings of the 15th IEEE international conference on data mining workshop, pp 1031–1039
Zhang Y, Pennacchiotti M (2013) Predicting purchase behaviors from social media. In: Proceedings of the 22nd international conference on world wide web, pp 1521–1532
Young Kim E, Kim YK (2004) Predicting online purchase intentions for clothing products. Eur J Mark 38(7):883–897
Liu G, Nguyen TT, Zhao G et al (2016) Repeat buyer prediction for ecommerce. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 155–164
Guo S, Wang M, Leskovec J (2011) The role of social networks in online shopping: information passing, price of trust, and consumer choice. In: Proceedings of the 12th ACM conference on electronic commerce, pp 157–166
Yin H, Cui B, Zhou X et al (2016) Joint modeling of user check-in behaviors for real-time point-of-interest recommendation. ACM Trans Inf Syst 35(2):Article 11
Pálovics R, Szalai P, Kocsis L et al (2015) Solving RecSys challenge 2015 by linear models, gradient boosted trees and metric optimization. In: Proceedings of the 9th ACM conference on recommender systems challenge, pp 1–4
Lee J, Kim E, Lee S et al (2019) Frame-to-frame aggregation of active regions in web videos for weakly supervised semantic segmentation. In: Proceedings of the IEEE international conference on computer vision (ICCV 2019), pp 6808–6818
Dewan R, Jing B, Seidmann A (2003) Product customization and price competition on the Internet. Manage Sci 49(8):1055–1070
Bernhardt D, Liu Q, Serfes K (2007) Product customization. Eur Econ Rev 51(6):1396–1422
Basu A, Bhaskaran S (2018) An economic analysis of customer co-design. Inf Syst Res 29(4):786–787
Guo S, Choi TM, Shen B et al (2018) Inventory management in mass customization operations: a review. IEEE Trans Eng Manage 66(3):412–428
Lim KH (2016) Recommending and planning trip itineraries for individual travellers and groups of tourists. In: Proceedings of the 26th international conference on automated planning and scheduling (ICAPS 2016), pp 115–120
Lim KH, Chan J, Karunasekera S et al (2017) Personalized itinerary recommendation with queuing time awareness. In: Proceedings of the 40th international ACM SIGIR conference on research and development in information retrieval (SIGIR 2017), pp 325–334
Yu Q, Bouguettaya A (2011) Efficient service skyline computation for composite service selection. IEEE Trans Knowl Data Eng 25(4):776–789
Wagner F, Ishikawa F, Honiden S (2013) Robust service compositions with functional and location diversity. IEEE Trans Serv Comput 9(2):277–290
Zhang F, Hwang K, Khan SU et al (2015) Skyline discovery and composition of multi-cloud mashup services. IEEE Trans Serv Comput 9(1):72–83
Pine BJ, Victor B, Boynton AC (1993) Making mass customization work. Harv Bus Rev 71(5):108–111
Novemsky N, Ravi D, Norbert S et al (2007) The effect of preference fluency on consumer decision making. J Mark Res 44(8):347–357
Gilmore JH, Pine BJ (1997) The four faces of mass customization. Harv Bus Rev 75(1):91–102
Park CW, Jun SY, MacInnis DJ (2000) Choosing what I want versus rejecting what I do not want: an application of decision framing to product option choice decisions. J Mark Res 37(2):187–202
Wang Y, Han D (2012) How customers perceive mass customization: an empirical study based on customer self-efficacy, option presentation and customization satisfaction. J Soft Sci 26(4):140–144
Wu L (2014) Research on multi-objective distribution center location method based on customer satisfaction. J Logist Technol 6:95–97
Yang S, Yu L (2020) Research on express distribution route optimization problem based on genetic algorithm. Mod Inf Technol 4(9):99–103
Fan L, Lv P (2021) Campus takeaway distribution path planning based on improved genetic algorithm. Logist Sci Technol 1:14–19
Huang C, Huang G, Zhu X (2016) Research on the shortest path of delivery based on genetic algorithm. Sci Technol Commun 12(6):94–95
Zhai J, Tai Y (2018) Takeaway delivery route optimization based on time window constraint. Logist Sci Technol 3:15–18
Drops travel city traffic report: in the second quarter of 2018 (2018). https://sts.didistatic.com/official-website/reports/2018 in Q2 city run reports-finally.pdf
Cramer J, Krueger AB (2016) Disruptive change in the taxi business: the case of Uber. Am Econ Rev 106:177–182
Castiglione J, Chang T, Cooper D et al (2016) TNCs today: a profile of San Francisco transportation network company activity. San Francisco County Transportation Authority
Ban JX, Dessouky M, Pang J et al (2018) A general equilibrium model for transportation systems with e-hailing services and flow congestion. Working manuscript, University of Washington, Seattle, WA
Xu Z, Chen Z, Yin Y (2019) Equilibrium analysis of urban traffic networks with ride-sourcing services. SSRN 3422294. https://doi.org/10.2139/ssrn.3422294
Tang L, Zou T, Luo X et al (2017) Research on choice behavior of online car-hailing based on mixed logit model. Transp Syst Eng Inf Technol 18(1):108–114
Yuan L, Wu P (2018) Study on the choice intention and influencing factors of urban residents for online ride-hailing and taxi: logistic analysis based on survey data in Jiangsu Province. J Soft Sci 32(4):120–123
Lu K, Zhou J, Lin X (2019) Research on market pricing of ride-hailing platform considering cross-network externalities. Oper Res Manag 28(7):169–178
Li Y (2018) Research on pricing strategy of online ride-hailing platform based on two-sided market theory. Master’s thesis, Chang’an University, Xi’an
Xu Z, Yan H (2019) Research on parking choice behavior and management strategy of hub online car-hailing. Transp Technol 8(3):155–165
Zhao S, King I, Lyu MR (2016) A survey of point-of-interest recommendation in location-based social networks. arXiv:1607.00647
Cheng C, Yang H, Lyu MR et al (2013) Where you like to go next: successive point-of-interest recommendation. In: Proceedings of 23rd international joint conferences on artificial intelligence, Beijing‚ pp 2605–2611
Zhao S, Zhao T, Yang H et al (2016) STELLAR: spatial-temporal latent ranking for successive point-of-interest recommendation. In: Proceedings of 30th AAAI conferences on artificial intelligence. AAAI Press, Menlo Park, CA, pp 315–322
Liu Q, Wu S, Wang L et al (2016) Predicting the next location: a recurrent model with spatial and temporal contexts. In: Proceedings of 30th AAAI conferences on artificial intelligence. AAAI Press, Menlo Park, CA, pp 194–200
Johnson CC (2014) Logistic matrix factorization for implicit feedback data. In: Workshop of advances in neural information processing systems. Springer, Berlin
Ahmadian S, Afsharchi M, Meghdadi M (2019) A novel approach based on multi-view reliability measures to alleviate data sparsity in recommender systems. Multimed Tools Appl 1–36
Ahmadian S, Meghdadi M, Afsharchi M (2018) A social recommendation method based on an adaptive neighbor selection mechanism. Inf Process Manage 54:707–725
Ye M, Yin P, Lee WC et al (2009) Exploiting geo-graphical influence for collaborative point-of-interest recommendation. In: Proceedings of the 34th international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 325–334
Hang M, Pytlarz I, Neville J (2018) Exploring student check-in behavior for improved point-of-interest prediction. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, KDD’18-exploring student check-in behavior for improved point-of-interest prediction, pp 321–330
Xie M, Yin H, Wang H et al (2016) Learning graph-based POI embedding for location-based recommendation. In: Proceedings of the 25th ACM international on conference on information and knowledge management, Indianapolis, IN, pp 15–24
Liu Y, Pham T, Cong G et al (2017) An experimental evaluation of point-of-interest recommendation in location-based social networks. Proc VLDB Endow 10:1010–1021
Stepan T, Morawski JM, Dick S et al (2016) Incorporating spatial, temporal and social context in recommendations for location-based social networks. IEEE Trans Comput Soc Syst 3:164–175
Aliannejadi M, Rafailidis D, Crestani F (2018) A collaborative ranking model with multiple location-based similarities for venue suggestion. In: Proceedings of the 2018 ACM SIGIR international conference on theory of information retrieval. ACM, New York, pp 19–26
Cheng C, Yang H, King I et al (2016) Fused matrix factorization with geographical and social influence in location-based social networks. In: Twenty-sixth AAAI conference on artificial intelligence. Canada at the Sheraton Centre Toronto, Ontario, pp 17–23
Guo L, Wen Y, Liu F (2019) Location perspective-based neighborhood-aware POI recommendation in location-based social networks. Soft Comput 23:11935–11945
Guo L, Jiang H, Wang X (2018) Location regularization-based POI recommendation in location-based social networks. Information 9:85–95
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 Xi'an Jiaotong University Press
About this chapter
Cite this chapter
Cao, J. (2023). Application of Business Big Data Management and Decision Making. In: E-Commerce Big Data Mining and Analytics. Advanced Studies in E-Commerce. Springer, Singapore. https://doi.org/10.1007/978-981-99-3588-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-99-3588-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3587-1
Online ISBN: 978-981-99-3588-8
eBook Packages: Computer ScienceComputer Science (R0)