{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T21:34:49Z","timestamp":1778016889952,"version":"3.51.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T00:00:00Z","timestamp":1656115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T00:00:00Z","timestamp":1656115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10844-022-00708-6","type":"journal-article","created":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T00:02:33Z","timestamp":1656115353000},"page":"705-731","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A contextual-bandit approach for multifaceted reciprocal recommendations in online dating"],"prefix":"10.1007","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8250-5122","authenticated-orcid":false,"given":"Tulika","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Ravish","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Punam","family":"Bedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,25]]},"reference":[{"key":"708_CR1","first-page":"2312","volume":"24","author":"Y Abbasi-Yadkori","year":"2011","unstructured":"Abbasi-Yadkori, Y., P\u00e1l, D., & Szepesv\u00e1ri, C. (2011). Improved algorithms for linear stochastic bandits. Advances in Neural Information Processing Systems, 24, 2312\u20132320.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"708_CR2","unstructured":"Akehurst, J., Koprinska, I., Yacef, K., Pizzato, L., Kay, J., & Rej, T. (2011). Ccr\u2014a content-collaborative reciprocal recommender for online dating. In Twenty-second international joint conference on artificial intelligence."},{"key":"708_CR3","unstructured":"Alanazi, A., & Bain, M. (2016). A scalable people-to-people hybrid reciprocal recommender using hidden markov models. 2nd Int. Work. Mach. Learn. Methods Recomm Syst."},{"key":"708_CR4","doi-asserted-by":"crossref","unstructured":"Altulyan, M.S., Huang, C., Yao, L., Wang, X., & Kanhere, S.S. (2021). Contextual bandit learning for activity-aware things-of-interest recommendation in an assisted living environment. In ADC (pp. 37\u201349).","DOI":"10.1007\/978-3-030-69377-0_4"},{"issue":"2","key":"708_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., & Fischer, P. (2002). Finite-time analysis of the multiarmed bandit problem. Machine Learning, 47(2), 235\u2013256.","journal-title":"Machine Learning"},{"issue":"1","key":"708_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., & Schapire, R.E. (2002). The nonstochastic multiarmed bandit problem. SIAM Journal on Computing, 32(1), 48\u201377.","journal-title":"SIAM Journal on Computing"},{"key":"708_CR7","doi-asserted-by":"crossref","unstructured":"Balakrishnan, A., Bouneffouf, D., Mattei, N., & Rossi, F. (2018). Using contextual bandits with behavioral constraints for constrained online movie recommendation. In IJCAI (pp. 5802\u20135804).","DOI":"10.24963\/ijcai.2018\/843"},{"key":"708_CR8","doi-asserted-by":"crossref","unstructured":"Barto, A.G., & Anandan, P. (1985). Pattern-recognizing stochastic learning automata. IEEE Transactions on Systems, Man, and Cybernetics (3), 360\u2013375.","DOI":"10.1109\/TSMC.1985.6313371"},{"key":"708_CR9","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., & Rish, I. (2019). A survey on practical applications of multi-armed and contextual bandits. arXiv preprint arXiv:1904.10040.","DOI":"10.1109\/CEC48606.2020.9185782"},{"issue":"04","key":"708_CR10","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1142\/S0218001493000339","volume":"7","author":"J Bromley","year":"1993","unstructured":"Bromley, J., Bentz, J.W., Bottou, L., Guyon, I., LeCun, Y., Moore, C., S\u00e4ckinger, E., & Shah, R. (1993). Signature verification using a \u201csiamese\u201d time delay neural network. International Journal of Pattern Recognition and Artificial Intelligence, 7(04), 669\u2013688.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"2","key":"708_CR11","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1162\/qjec.2006.121.2.673","volume":"121","author":"R Fisman","year":"2006","unstructured":"Fisman, R., Iyengar, S.S., Kamenica, E., & Simonson, I. (2006). Gender differences in mate selection: Evidence from a speed dating experiment. The Quarterly Journal of Economics, 121(2), 673\u2013697.","journal-title":"The Quarterly Journal of Economics"},{"key":"708_CR12","doi-asserted-by":"crossref","unstructured":"Guo, H., Tang, R., Ye, Y., Li, Z., & He, X. (2017). Deepfm: A factorization-machine based neural network for ctr prediction. arXiv preprint arXiv:1703.04247.","DOI":"10.24963\/ijcai.2017\/239"},{"key":"708_CR13","doi-asserted-by":"crossref","unstructured":"He, X., An, B., Li, Y., Chen, H., Guo, Q., Li, X., & Wang, Z. (2020). Contextual user browsing bandits for large-scale online mobile recommendation. In Fourteenth ACM conference on recommender systems (pp. 63\u201372).","DOI":"10.1145\/3383313.3412234"},{"key":"708_CR14","doi-asserted-by":"crossref","unstructured":"Intayoad, W., Kamyod, C., & Temdee, P. (2020). Reinforcement learning based on contextual bandits for personalized online learning recommendation systems. Wireless Personal Communications, 1\u201316.","DOI":"10.1007\/s11277-020-07199-0"},{"issue":"1","key":"708_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0192-5","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson, J.M., & Khoshgoftaar, T.M. (2019). Survey on deep learning with class imbalance. Journal of Big Data, 6(1), 1\u201354.","journal-title":"Journal of Big Data"},{"key":"708_CR16","unstructured":"Kingma, D.P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"708_CR17","doi-asserted-by":"crossref","unstructured":"Kumari, T., Sharma, R., & Bedi, P. (2021). Multifaceted reciprocal recommendations for online dating. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICRITO51393.2021.9596224"},{"issue":"1","key":"708_CR18","first-page":"96","volume":"20","author":"J Langford","year":"2007","unstructured":"Langford, J., & Zhang, T. (2007). The epoch-greedy algorithm for contextual multi-armed bandits. Advances in Neural Information Processing Systems, 20(1), 96\u20131.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"708_CR19","doi-asserted-by":"crossref","unstructured":"Lattimore, T., & Szepesvari, C. (2020). Bandit algorithms. Cambridge University Press.","DOI":"10.1017\/9781108571401"},{"issue":"2","key":"708_CR20","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s10115-018-1298-3","volume":"61","author":"C-T Li","year":"2019","unstructured":"Li, C. -T. (2019). Mentor-spotting: Recommending expert mentors to mentees for live trouble-shooting in codementor. Knowledge and Information Systems, 61(2), 799\u2013820.","journal-title":"Knowledge and Information Systems"},{"key":"708_CR21","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., & Schapire, R.E. (2010). A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th International Conference on World Wide Web (pp. 661\u2013670).","DOI":"10.1145\/1772690.1772758"},{"key":"708_CR22","doi-asserted-by":"crossref","unstructured":"Li, L., & Li, T. (2012). Meet: A generalized framework for reciprocal recommender systems. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (pp. 35\u201344).","DOI":"10.1145\/2396761.2396770"},{"key":"708_CR23","doi-asserted-by":"crossref","unstructured":"Liu, W., Li, S., & Zhang, S. (2018). Contextual dependent click bandit algorithm for web recommendation. In International Computing and Combinatorics Conference (pp. 39\u201350). Springer.","DOI":"10.1007\/978-3-319-94776-1_4"},{"key":"708_CR24","doi-asserted-by":"crossref","unstructured":"Liu, B., Wei, Y., Zhang, Y., Yan, Z., & Yang, Q. (2018). Transferable contextual bandit for cross-domain recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 32.","DOI":"10.1609\/aaai.v32i1.11699"},{"key":"708_CR25","doi-asserted-by":"crossref","unstructured":"Malinowski, J., Keim, T., Wendt, O., & Weitzel, T. (2006). Matching people and jobs: A bilateral recommendation approach. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS\u201906), (Vol. 6 pp. 137\u2013137). IEEE.","DOI":"10.1109\/HICSS.2006.266"},{"key":"708_CR26","doi-asserted-by":"crossref","unstructured":"Neve, J., & Palomares, I. (2019). Latent factor models and aggregation operators for collaborative filtering in reciprocal recommender systems. In Proceedings of the 13th ACM Conference on Recommender Systems (pp. 219\u2013227).","DOI":"10.1145\/3298689.3347026"},{"key":"708_CR27","doi-asserted-by":"crossref","unstructured":"Neve, J., & Palomares, I. (2020). Hybrid reciprocal recommender systems: Integrating item-to-user principles in reciprocal recommendation. In Companion Proceedings of the Web Conference 2020 (pp. 848\u2013853).","DOI":"10.1145\/3366424.3383295"},{"issue":"7","key":"708_CR28","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1080\/08839514.2021.1883855","volume":"35","author":"A Pilani","year":"2021","unstructured":"Pilani, A., Mathur, K., Agrawal, H., Chandola, D., Tikkiwal, V.A., & Kumar, A. (2021). Contextual bandit approach-based recommendation system for personalized web-based services. Applied Artificial Intelligence, 35(7), 489\u2013504.","journal-title":"Applied Artificial Intelligence"},{"key":"708_CR29","doi-asserted-by":"crossref","unstructured":"Pizzato, L., Rej, T., Chung, T., Koprinska, I., & Kay, J. (2010). Recon: A reciprocal recommender for online dating. In Proceedings of the Fourth ACM Conference on Recommender Systems (pp. 207\u2013214).","DOI":"10.1145\/1864708.1864787"},{"key":"708_CR30","doi-asserted-by":"crossref","unstructured":"Pizzato, L., Rej, T., Chung, T., Koprinska, I., Yacef, K., & Kay, J. (2010). Reciprocal recommender system for online dating. In Proceedings of the Fourth ACM Conference on Recommender Systems (pp. 353\u2013354).","DOI":"10.1145\/1864708.1864787"},{"key":"708_CR31","doi-asserted-by":"crossref","unstructured":"Potts, B.A., Khosravi, H., Reidsema, C., Bakharia, A., Belonogoff, M., & Fleming, M. (2018). Reciprocal peer recommendation for learning purposes. In Proceedings of the 8th International Conference on Learning Analytics and Knowledge (pp. 226\u2013235).","DOI":"10.1145\/3170358.3170400"},{"issue":"5","key":"708_CR32","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1177\/0165551518806114","volume":"45","author":"M\u00c1 Rodr\u00edguez-Garc\u00eda","year":"2019","unstructured":"Rodr\u00edguez-Garc\u00eda, M. \u00c1., Valencia-Garc\u00eda, R., Colomo-Palacios, R., & G\u00f3mez-Berb\u00eds, J.M. (2019). Blinddate recommender: A context-aware ontology-based dating recommendation platform. Journal of Information Science, 45(5), 573\u2013591.","journal-title":"Journal of Information Science"},{"key":"708_CR33","doi-asserted-by":"crossref","unstructured":"Santana, M.R., Melo, L.C., Camargo, F.H., Brand\u00e3o, B., Soares, A., Oliveira, R.M., & Caetano, S. (2020). Contextual meta-bandit for recommender systems selection. In Fourteenth ACM conference on recommender systems (pp. 444\u2013449).","DOI":"10.1145\/3383313.3412209"},{"key":"708_CR34","doi-asserted-by":"crossref","unstructured":"Shen, Y., Deng, Y., Ray, A., & Jin, H. (2018). Interactive recommendation via deep neural memory augmented contextual bandits. In Proceedings of the 12th ACM Conference on Recommender Systems (pp. 122\u2013130).","DOI":"10.1145\/3240323.3240344"},{"key":"708_CR35","doi-asserted-by":"crossref","unstructured":"Slivkins, A. (2019). Introduction to multi-armed bandits. arXiv preprint arXiv:1904.07272.","DOI":"10.1561\/9781680836219"},{"key":"708_CR36","doi-asserted-by":"crossref","unstructured":"Tay, Y., Tuan, L.A., & Hui, S.C. (2018). Couplenet: Paying attention to couples with coupled attention for relationship recommendation. In Twelfth International AAAI Conference on Web and Social Media.","DOI":"10.1609\/icwsm.v12i1.15007"},{"issue":"3\/4","key":"708_CR37","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2307\/2332286","volume":"25","author":"WR Thompson","year":"1933","unstructured":"Thompson, W.R. (1933). On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika, 25(3\/4), 285\u2013294.","journal-title":"Biometrika"},{"key":"708_CR38","doi-asserted-by":"crossref","unstructured":"Wenxing, H., Yiwei, C., Jianwei, Q., & Yin, H. (2015). ihr+: A mobile reciprocal job recommender system. In 2015 10th International Conference on Computer Science & Education (ICCSE) (pp. 492\u2013495). IEEE.","DOI":"10.1109\/ICCSE.2015.7250296"},{"key":"708_CR39","doi-asserted-by":"crossref","unstructured":"Xu, X., Dong, F., Li, Y., He, S., & Li, X. (2020). Contextual-bandit based personalized recommendation with time-varying user interests. In Proceedings of the AAAI Conference on Artificial Intelligence, (Vol. 34 pp. 6518\u20136525).","DOI":"10.1609\/aaai.v34i04.6125"},{"key":"708_CR40","doi-asserted-by":"crossref","unstructured":"Yang, M., Li, Q., Qin, Z., & Ye, J. (2020). Hierarchical adaptive contextual bandits for resource constraint based recommendation. In Proceedings of The Web Conference 2020 (pp. 292\u2013302).","DOI":"10.1145\/3366423.3380115"},{"issue":"5","key":"708_CR41","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIS.2020.3010298","volume":"35","author":"S Yang","year":"2020","unstructured":"Yang, S., Wang, H., Zhang, C., & Gao, Y. (2020). Contextual bandits with hidden features to online recommendation via sparse interactions. IEEE Intelligent Systems, 35(5), 62\u201372.","journal-title":"IEEE Intelligent Systems"},{"key":"708_CR42","doi-asserted-by":"crossref","unstructured":"Yu, M., Zhang, X., & Kreager, D. (2016). New to online dating? learning from experienced users for a successful match. In 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (pp. 467\u2013470). IEEE.","DOI":"10.1109\/ASONAM.2016.7752276"},{"issue":"6","key":"708_CR43","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1016\/j.jestch.2021.03.010","volume":"24","author":"E Y\u0131ld\u0131r\u0131m","year":"2021","unstructured":"Y\u0131ld\u0131r\u0131m, E., Azad, P., & \u00d6\u011f\u00fcD\u00fcc\u00fc, \u015e.G. (2021). bideepfm: A multi-objective deep factorization machine for reciprocal recommendation. Engineering Science and Technology, an International Journal, 24(6), 1467\u20131477.","journal-title":"Engineering Science and Technology, an International Journal"},{"key":"708_CR44","doi-asserted-by":"crossref","unstructured":"Zang, X., Yamasaki, T., Aizawa, K., Nakamoto, T., Kuwabara, E., Egami, S., & Fuchida, Y. (2017). You will succeed or not? matching prediction in a marriage consulting service. In 2017 IEEE Third International Conference on Multimedia Big Data (BigMM) (pp. 109\u2013116). IEEE.","DOI":"10.1109\/BigMM.2017.11"},{"key":"708_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, C., Liu, W., Ma, H., & Fu, H. (2016). Siamese neural network based gait recognition for human identification. In 2016 Ieee International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2832\u20132836). IEEE.","DOI":"10.1109\/ICASSP.2016.7472194"},{"key":"708_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xie, H., Li, H., & CS Lui, J. (2020). Conversational contextual bandit: Algorithm and application. In Proceedings of The Web Conference 2020 (pp. 662\u2013672).","DOI":"10.1145\/3366423.3380148"},{"key":"708_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhou, Q., He, T., & Liang, B. (2018). Con-cname: A contextual multi-armed bandit algorithm for personalized recommendations. In International Conference on Artificial Neural Networks (pp. 326\u2013336). Springer.","DOI":"10.1007\/978-3-030-01421-6_32"},{"key":"708_CR48","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Dave, T., Mishra, N., & Kumar, H. (2018). Fairness in reciprocal recommendations: A speed-dating study. In Adjunct publication of the 26th conference on user modeling, adaptation and personalization (pp. 29\u201334).","DOI":"10.1145\/3213586.3226207"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00708-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10844-022-00708-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-022-00708-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T02:12:38Z","timestamp":1668737558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10844-022-00708-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,25]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["708"],"URL":"https:\/\/doi.org\/10.1007\/s10844-022-00708-6","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,25]]},"assertion":[{"value":"29 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"\u2018Yes\u2019","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"\u2018Yes\u2019","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}