【摘 要】
:
Online advertising click-through rate (CTR) prediction is aimed at predicting the probability of a user clicking an ad,and it has undergone considerable development in recent years.One of the hot topics in this area is the construction of feature interact
【机 构】
:
Nanjing University of Posts and Telecommunications (NJUPT),Nanjing,210003,China;Digital Media Depart
论文部分内容阅读
Online advertising click-through rate (CTR) prediction is aimed at predicting the probability of a user clicking an ad,and it has undergone considerable development in recent years.One of the hot topics in this area is the construction of feature interactions to facilitate accurate prediction.Factorization machine provides second-order feature interactions by linearly multiplying hidden feature factors.However,real-world data present a complex and nonlinear structure.Hence,second-order feature interactions are unable to represent cross information adequately.This drawback has been addressed using deep neural networks (DNNs),which enable high-order nonlinear feature interactions.However,DNN-based feature interactions cannot easily optimize deep structures because of the absence of cross information in the original features.In this study,we propose an effective CTR prediction algorithm called CAN,which explicitly exploits the benefits of attention mechanisms and DNN models.The attention mechanism is used to provide rich and expressive low-order feature interactions and facilitate the optimization of DNN-based predictors that implicitly incorporate high-order nonlinear feature interactions.The experiments using two real datasets demonstrate that our proposed CAN model performs better than other cross feature-and DNN-based predictors.
其他文献
When the input signal has been interfered and glitches occur,the power consumption of Double-Edge Triggered Flip-Flops (DETFFs) will significantly increase.To effectively reduce the power consumption,this paper presents an anti-interference low-power DETF
This research discussed a deep learning method based on an improved generative adversarial network to segment the hippocampus.Different convolutional configurations were proposed to capture information obtained by a segmentation network.In addition,a gene
Event temporal relation extraction is an important part of natural language processing.Many models are being used in this task with the development of deep learning.However,most of the existing methods cannot accurately obtain the degree of association be
Road pricing is an urban traffic management mechanism to reduce traffic congestion.Currently,most of the road pricing systems based on predefined charging tolls fail to consider the dynamics of urban traffic flows and travelers\' demands on the arrival
Integer overflow is a common vulnerability in Ethereum Smart Contracts (ESCs) and often causes huge economic losses.Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing.Mutation testing is a fault-based t
Lesion detection in Computed Tomography (CT) images is a challenging task in the field of computer-aided diagnosis.An important issue is to locate the area of lesion accurately.As a branch of Convolutional Neural Networks (CNNs),3D Context-Enhanced (3DCE)
In distributed training,increasing batch size can improve parallelism,but it can also bring many difficulties to the training process and cause training errors.In this work,we investigate the occurrence of training errors in theory and train ResNet-50 on
Identifying the association between metabolites and diseases will help us understand the pathogenesis of diseases,which has great significance in diagnosing and treating diseases.However,traditional biometric methods are time consuming and expensive.Accor
N400 is an objective electrophysiological index in semantic processing for brain.This study focuses on the sensitivity of N400 effect during speech comprehension under the uni-and bi-modality conditions.Varying the Signal-to-Noise Ratio (SNR) of speech si
The prevalence of missing values in the data streams collected in real environments makes them impossible to ignore in the privacy preservation of data streams.However,the development of most privacy preservation methods does not consider missing values.A