| Literature DB >> 33967732 |
Desheng Liu1, Linna Shan1, Lei Wang1, Shoulin Yin2, Hui Wang1, Chaoyang Wang1.
Abstract
With the rapid development of social network, intelligent terminal and automatic positioning technology, location-based social network (LBSN) service has become an important and valuable application. Point of interest (POI) recommendation is an important content in LBSN, which aims to recommend new locations of interest for users. It can not only alleviate the information overload problem faced by users in the era of big data, improve user experience, but also help merchants quickly find target users and achieve accurate marketing. Most of the works are based on users' check-in history and social network data to model users' personalized preferences for interest points, and recommend interest points through collaborative filtering and other recommendation technologies. However, in the check-in history, the multi-source heterogeneous information (including the position, category, popularity, social, reviews) describes user activity from different aspects which hides people's life style and personal preference. However, the above methods do not fully consider these factors' combined action. Considering the data privacy, it is difficult for individuals to share data with others with similar preferences. In this paper, we propose a privacy protection point of interest recommendation algorithm based on multi-exploring locality sensitive hashing (LSH). This algorithm studies the POI recommendation problem under distributed system. This paper introduces a multi-exploring method to improve the LSH algorithm. On the one hand, it reduces the number of hash tables to decrease the memory overhead; On the other hand, the retrieval range on each hash table is increased to reduce the time retrieval overhead. Meanwhile, the retrieval quality is similar to the original algorithm. The proposed method uses modified LSH and homomorphic encryption technology to assist POI recommendation which can ensure the accuracy, privacy and efficiency of the recommendation algorithm, and it verifies feasibility through experiments on real data sets. In terms of root mean square error (RMSE), mean absolute error (MAE) and running time, the proposed method has a competitive advantage.Entities:
Keywords: homomorphic encryption; location-based social network (LBSN); multi-exploring locality sensitive hashing; point of interest; privacy protection
Year: 2021 PMID: 33967732 PMCID: PMC8102779 DOI: 10.3389/fnbot.2021.660304
Source DB: PubMed Journal: Front Neurorobot ISSN: 1662-5218 Impact factor: 2.650
Figure 1LSH principle.
Figure 2Impact of k on RMSE (MovieLens).
Figure 3Impact of k on RMSE (Gowalla).
Figure 4Effect of users number on time.
Figure 5Effect of film number on time.
Running time comparison with different user number (unit/s).
| 1 × 103 | 210 | 190 | 115 | 30 |
| 2 × 103 | 360 | 320 | 216 | 45 |
| 3 × 103 | 510 | 450 | 317 | 60 |
| 4 × 103 | 660 | 580 | 418 | 75 |
| 5 × 103 | 810 | 710 | 519 | 90 |
| 6 × 103 | 960 | 840 | 620 | 105 |
Running time comparison with different film number (unit/s).
| 0.5 × 103 | 190 | 180 | 95 | 42 |
| 1 × 103 | 330 | 291 | 201 | 55 |
| 1.5 × 103 | 470 | 402 | 307 | 68 |
| 2 × 103 | 610 | 513 | 428 | 81 |
| 2.5 × 103 | 750 | 624 | 537 | 94 |
| 3 × 103 | 890 | 735 | 655 | 107 |
| 3.5 × 103 | 985 | 846 | 719 | 120 |
Figure 6Effect of user number on RMSE.
Figure 7Effect of film number on RMSE.
Figure 8MAE comparison with different methods.
MAE comparison with different methods.
| 10 | 0.92 | 0.87 | 0.84 | 0.81 |
| 20 | 0.90 | 0.86 | 0.81 | 0.79 |
| 30 | 0.86 | 0.83 | 0.76 | 0.71 |
| 40 | 0.82 | 0.79 | 0.72 | 0.68 |
| 50 | 0.78 | 0.71 | 0.69 | 0.62 |
| 60 | 0.77 | 0.68 | 0.67 | 0.60 |
| 70 | 0.73 | 0.62 | 0.61 | 0.57 |
| 80 | 0.66 | 0.57 | 0.53 | 0.51 |
| 90 | 0.61 | 0.52 | 0.49 | 0.46 |
| 100 | 0.55 | 0.48 | 0.42 | 0.31 |
Figure 9Running time comparison with different methods.
Running time comparison with different methods (unit/ms).
| 10 | 3.2 | 2.3 | 1.2 | 0.1 |
| 20 | 3.6 | 2.8 | 1.6 | 0.1 |
| 30 | 3.8 | 3.2 | 2.2 | 0.2 |
| 40 | 4.1 | 3.4 | 2.5 | 0.3 |
| 50 | 4.6 | 3.7 | 2.8 | 0.4 |
| 60 | 4.9 | 4.5 | 3.2 | 0.5 |
| 70 | 5.7 | 4.9 | 3.6 | 0.7 |
| 80 | 6.2 | 5.3 | 3.9 | 0.8 |
| 90 | 7.9 | 6.1 | 4.5 | 0.8 |
| 100 | 9.2 | 7.8 | 5.9 | 1.1 |
Figure 10The effect of hash tables number on the RMSE value.
Figure 11The effect of hash functions number on the RMSE value.
MELSH-based P3OI recommendation.
| user set |
| \\ Building offline user index |
| for t = 1 to T do // T hash tables |
| for i = 1 to k do // k distributed platforms |
| for j = 1 to m do |
| for p = 1 to r do |
| for q = 1 to n do |
| end for |
| if |
| then |
| else |
| end for |
| end for |
| end for |
| \\ Searching similar users |
| Initializing SIM = empty set |
| for t = 1 to T do |
| for p = 1 to r do |
| if |
| then |
| else |
| end for |
| end for |
| end for |
| \\ according to |
| end for |
| \\ Target user location recommendation |
| tmp = E(0) |
| for i = 1 to |SIM| do |
| end for |
| return α |