{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:49:40Z","timestamp":1773841780478,"version":"3.50.1"},"reference-count":105,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s13198-024-02359-y","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T19:01:53Z","timestamp":1715713313000},"page":"2818-2852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A systematic literature review of solutions for cold start problem"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3081-1085","authenticated-orcid":false,"given":"Neetu","family":"Singh","sequence":"first","affiliation":[]},{"given":"Sandeep Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"2359_CR1","unstructured":"Agrawal S, Devanur NR (2016) Linear contextual bandits with knapsacks. In: Advances in neural information processing systems, pp 3458\u20133466"},{"key":"2359_CR2","unstructured":"Agarwal A, Hsu D, Kale S, Langford J, Li L, Schapire RE (2014) Taming the monster: a fast and simple algorithm for contextual bandits. In: International conference on machine learning"},{"issue":"06","key":"2359_CR3","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1142\/S0218194017500358","volume":"27","author":"ZK Aghdam","year":"2017","unstructured":"Aghdam ZK, Arasteh B (2017) An efficient method to generate test data for software structural testing using artificial bee colony optimization algorithm. Int J Softw Eng Knowl Eng 27(06):951\u2013966","journal-title":"Int J Softw Eng Knowl Eng"},{"issue":"3","key":"2359_CR4","first-page":"28","volume":"182","author":"R Alle","year":"2016","unstructured":"Alle R, Aranya A, Thakur A, Kadam AJ (2016) Effective bug triage using cold-start recommendation system. Int J Comput Appl 182(3):28\u201331","journal-title":"Int J Comput Appl"},{"key":"2359_CR5","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s13198-022-01783-2","volume":"15","author":"AT Al-Taani","year":"2022","unstructured":"Al-Taani AT, Al-Sayadi SH (2022) Extractive text summarization of arabic multi-document using fuzzy C-means and Latent Dirichlet allocation. Int J Syst Assur Eng Manag 15:713","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"3","key":"2359_CR6","first-page":"95","volume":"9","author":"B Arasteh","year":"2018","unstructured":"Arasteh B (2018) Software fault-prediction using combination of neural network and Naive Bayes algorithm. J Netw Technol 9(3):95","journal-title":"J Netw Technol"},{"issue":"2","key":"2359_CR7","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/s13198-019-00878-7","volume":"11","author":"Arvind","year":"2020","unstructured":"Arvind, Ratan R (2020) Identifying traffic of same keys in cryptographic communications using fuzzy decision criteria and bit-plane measures. Int J Syst Assur Eng Manag 11(2):466\u2013480","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR8","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1007\/s13198-014-0314-6","volume":"8","author":"A Azadeh","year":"2017","unstructured":"Azadeh A, Jebreili S, Chang E, Saberi M, Hussain OK (2017) An integrated fuzzy algorithm approach to factory floor design incorporating environmental quality and health impact. Int J Syst Assur Eng Manag 8:2071\u20132082","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"3","key":"2359_CR9","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1287\/mnsc.2020.3605","volume":"67","author":"H Bastani","year":"2021","unstructured":"Bastani H, Bayati M, Khosravi K (2021) Mostly exploration-free algorithms for contextual bandits. Manag Sci 67(3):1329\u20131349. https:\/\/doi.org\/10.1287\/mnsc.2020.3605=","journal-title":"Manag Sci"},{"key":"2359_CR88","unstructured":"Besbes, O., Gur, Y., & Zeevi, A. (2014). Stochastic multi-armed-bandit problem with non-stationary rewards. Advances in neural information processing systems, 27."},{"issue":"4","key":"2359_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1287\/stsy.2019.0033","volume":"9","author":"O Besbes","year":"2019","unstructured":"Besbes O, Gur Y, Zeevi A (2019) Optimal exploration-exploitation in a multi-armed bandit problem with non-stationary rewards. Stoch Syst 9(4):319\u2013337. https:\/\/doi.org\/10.1287\/stsy.2019.0033","journal-title":"Stoch Syst"},{"key":"2359_CR11","doi-asserted-by":"crossref","unstructured":"Bharadhwaj H (2019) Meta-learning for user cold-start recommendation. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE","DOI":"10.1109\/IJCNN.2019.8852100"},{"key":"2359_CR12","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s13198-021-01330-5","volume":"13","author":"J Bhat","year":"2022","unstructured":"Bhat J, Saqib M, Moon AH (2022) Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication. Int J Syst Assur Eng Manag 13:697","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR13","first-page":"1","volume":"22","author":"A Bietti","year":"2021","unstructured":"Bietti A, Agarwal A, Langford J (2021) A contextual bandit bake off. J Mach Learn Res 22:1\u201349","journal-title":"J Mach Learn Res"},{"key":"2359_CR14","doi-asserted-by":"crossref","unstructured":"Bouneffouf D et al (2014) Contextual bandit for active learning: active Thompson sampling. Available: https:\/\/hal.archives-ouvertes.fr\/hal-01069802","DOI":"10.1007\/978-3-319-12637-1_51"},{"key":"2359_CR79","doi-asserted-by":"crossref","unstructured":"Bouneffouf D, Rish I, Cecchi GA, Feraud R (2017) Context attentive bandits: contextual bandit with restricted context. Available: http:\/\/arxiv.org\/abs\/1705.03821","DOI":"10.24963\/ijcai.2017\/203"},{"key":"2359_CR81","doi-asserted-by":"publisher","unstructured":"Burtini G, Loeppky J, Lawrence R (2015) Improving online marketing experiments with drifting multi- armed bandits. In: ICEIS 2015\u201417th International Conference on Enterprise Information Systems, Proceedings, vol 1, pp 630\u2013636. https:\/\/doi.org\/10.5220\/0005458706300636","DOI":"10.5220\/0005458706300636"},{"key":"2359_CR80","doi-asserted-by":"publisher","unstructured":"Caron S, Bhagat S (2013) Mixing bandits: a recipe for improved cold-start recommendations in a social network. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis, SNA-KDD. https:\/\/doi.org\/10.1145\/2501025.2501029","DOI":"10.1145\/2501025.2501029"},{"issue":"3","key":"2359_CR15","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/e23030380","volume":"23","author":"E Cavenaghi","year":"2021","unstructured":"Cavenaghi E, Sottocornola G, Stella F, Zanker M (2021) Non stationary multi-armed bandit: empirical evaluation of a new concept drift-aware algorithm. Entropy 23(3):380. https:\/\/doi.org\/10.3390\/e23030380","journal-title":"Entropy"},{"key":"2359_CR16","unstructured":"Chakrabarti, D., Kumar, R., Radlinski, F., Upfal, E.: Mortal Multi-Armed Bandits. In: Neural Information Processing Systems (NIPS), pp. 273\u2013280. MIT Press (2008)"},{"key":"2359_CR106","doi-asserted-by":"crossref","unstructured":"Chen Z, Wang D, Yin S (2021) Improving cold-start recommendation via multi-prior meta-learning. In Advances in Information In: 43rd European Conference on IR Research, ECIR 2021, Virtual Event, March 28\u2013April 1, 2021, Proceedings, Part II 43, Springer, pp 249\u2013256","DOI":"10.1007\/978-3-030-72240-1_22"},{"key":"2359_CR17","unstructured":"Cortes D (2018) Adapting multi-armed bandits policies to contextual bandits scenarios. Available: http:\/\/arxiv.org\/abs\/1811.04383"},{"key":"2359_CR18","doi-asserted-by":"publisher","unstructured":"Covington P, Adams J, Sargin E (2016) Deep neural networks for you tube recommendations. In: RecSys 2016\u2014Proceedings of the 10th ACM Conference on Recommender Systems, pp 191\u2013198. https:\/\/doi.org\/10.1145\/2959100.2959190","DOI":"10.1145\/2959100.2959190"},{"key":"2359_CR19","doi-asserted-by":"crossref","unstructured":"Covington P, Jay A, Emre S (2016) Deep neural networks for you tube recommendations. In: Proceedings of the 10th ACM conference on recommender systems","DOI":"10.1145\/2959100.2959190"},{"key":"2359_CR20","unstructured":"Dutta P, Cheuk J, Kim JS, Mascaro M (2019) Auto ML for Contextual Bandits. Available: http:\/\/arxiv.org\/abs\/1909.03212"},{"key":"2359_CR21","doi-asserted-by":"publisher","unstructured":"Ekstrand M, Riedl J (2012) When recommenders fail: Predicting recommender failure for algorithm selection and c ombination. In: RecSys\u201912-Proceedings 6th ACM Conference Recommender System, pp 233\u2013236. https:\/\/doi.org\/10.1145\/2365952.2366002","DOI":"10.1145\/2365952.2366002"},{"key":"2359_CR22","first-page":"1","volume":"15","author":"M Faiz","year":"2022","unstructured":"Faiz M, Daniel AK (2022) A multi-criteria cloud selection model based on fuzzy logic technique for QoS. Int J Syst Assur Eng Manag 15:1\u201318","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR73","doi-asserted-by":"crossref","unstructured":"Fel\u00edcio CZ et al (2017) A multi-armed bandit model selection for cold-start user recommendation. In: Proceedings of the 25th conference on user modeling, adaptation and personalization","DOI":"10.1145\/3079628.3079681"},{"key":"2359_CR23","doi-asserted-by":"crossref","unstructured":"Feng X et al (2021) Cmml: Contextual modulation meta learning for cold-start recommendation. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management","DOI":"10.1145\/3459637.3482241"},{"key":"2359_CR24","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1007\/s13198-022-01691-5","volume":"15","author":"R Gadekar","year":"2022","unstructured":"Gadekar R, Sarkar B, Gadekar A (2022) Model development for assessing inhibitors impacting Industry 4.0 implementation in Indian manufacturing industries: an integrated ISM-Fuzzy MICMAC approach. Int J Syst Assur Eng Manag 15:646","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR82","doi-asserted-by":"crossref","unstructured":"Geddes, J., Carney, S., Cowen, P., Goodwin, G., Rogers, R., Dearness, K., Tomlin, A., Eastaugh, J., Freemantle, N., Lester, H., Harvey, A., & Scott, A. (2003). Efficacy and safety of electroconvulsive therapy in depressive disorders: A systematic review and meta-analysis. The Lancet, 361(9360), 799-808. https:\/\/doi.org\/10.1016\/S0140-6736(03)12705-5","DOI":"10.1016\/S0140-6736(03)12705-5"},{"key":"2359_CR74","doi-asserted-by":"crossref","unstructured":"Gope J, Jain SK (2017) A summary of cold-start problem on recommendation system. In: International Conference on Computing, Communication & Automation, pp 133\u2013138","DOI":"10.1109\/CCAA.2017.8229786"},{"key":"2359_CR71","doi-asserted-by":"publisher","unstructured":"Guo J, Rahimi M, Cleland-Huang J, Rasin A, Hayes JH, Vierhauser M (2016) Cold-start software analytics. In: Proceedings of the 13th International Conference on Mining Software Repositories MSR, pp 142\u2013153. https:\/\/doi.org\/10.1145\/2901739.2901740","DOI":"10.1145\/2901739.2901740"},{"key":"2359_CR25","doi-asserted-by":"publisher","unstructured":"Guo D et al (2020) Deep Bayesian bandits: exploring in online personalized recommendations. In: RecSys 2020\u201414th ACM conference on recommender systems, pp 456\u2013461. https:\/\/doi.org\/10.1145\/3383313.3412214","DOI":"10.1145\/3383313.3412214"},{"issue":"4","key":"2359_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","volume":"42","author":"I Gunes","year":"2014","unstructured":"Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767\u2013799. https:\/\/doi.org\/10.1007\/s10462-012-9364-9","journal-title":"Artif Intell Rev"},{"key":"2359_CR27","doi-asserted-by":"publisher","unstructured":"Gupta N, Granmo OC, Agrawala A (2011) Thompson sampling for dynamic multi-armed bandits. In: Proceedings\u201410th International Conference on Machine Learning and Applications, ICMLA 2011, vol 1, pp 484\u2013489. https:\/\/doi.org\/10.1109\/ICMLA.2011.144","DOI":"10.1109\/ICMLA.2011.144"},{"key":"2359_CR77","doi-asserted-by":"publisher","unstructured":"Gupta N et al (2020) IEEE congress on evolutionary computation (CEC). In: 2020 conference proceedings. J Big Data, vol 9, no 1, pp 1\u201325. https:\/\/doi.org\/10.1186\/s40537-022-00592-5","DOI":"10.1186\/s40537-022-00592-5"},{"key":"2359_CR28","doi-asserted-by":"publisher","unstructured":"He X et al (2020) Contextual user browsing bandits for large-scale online mobile recommendation. In RecSys 2020 14th ACM Conference on Recommender Systems, pp 63\u201372. https:\/\/doi.org\/10.1145\/3383313.3412234","DOI":"10.1145\/3383313.3412234"},{"key":"2359_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109835","volume":"256","author":"N Heidari","year":"2022","unstructured":"Heidari N, Moradi P, Koochari A (2022) An attention-based deep learning method for solving the cold-start and sparsity issues of recommender systems. Knowl-Based Syst 256:109835","journal-title":"Knowl-Based Syst"},{"key":"2359_CR30","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.4131","author":"PM Iftikhar","year":"2019","unstructured":"Iftikhar PM, Ali F, Faisaluddin M, Khayyat A, De Sa MDG, Rao T (2019) A bibliometric analysis of the top 30 most-cited articles in gestational diabetes mellitus literature. Cureus. https:\/\/doi.org\/10.7759\/cureus.4131","journal-title":"Cureus"},{"key":"2359_CR93","unstructured":"Institute of Electrical and Electronics Engineers and IEEE Computational Intelligence Society (2020) IEEE Congress on Evolutionary Computation (CEC). In: 2020 conference proceedings"},{"key":"2359_CR86","unstructured":"Jagdish Rao D (2020) Contextual bandits for adapting to changing user preferences overtime"},{"key":"2359_CR31","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1007\/s13198-018-0729-6","volume":"9","author":"V Jain","year":"2018","unstructured":"Jain V, Raj T (2018) An adaptive neuro-fuzzy inference system for makespan estimation of flexible manufacturing system assembly shop: a case study. Int J Syst Assur Eng Manag 9:1302\u20131314","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR32","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/978-981-10-0557-2_112","volume":"376","author":"S Khusro","year":"2016","unstructured":"Khusro S, Ali Z, Ullah I (2016) Recommender systems: issues, challenges, and research opportunities. Lect Notes Electr Eng 376:1179\u20131189. https:\/\/doi.org\/10.1007\/978-981-10-0557-2_112","journal-title":"Lect Notes Electr Eng"},{"key":"2359_CR33","first-page":"14","volume":"1448","author":"M Kula","year":"2015","unstructured":"Kula M (2015) Metadata embeddings for user and item cold-start recommendations. CEUR Workshop Proc 1448:14\u201321","journal-title":"CEUR Workshop Proc"},{"key":"2359_CR34","doi-asserted-by":"publisher","first-page":"100255","DOI":"10.1016\/j.cosrev.2020.10025","volume":"37","author":"S Kulkarni","year":"2020","unstructured":"Kulkarni S, Rodd SF (2020) Context aware recommendation systems: a review of the state of the art techniques. Comput Sci Rev 37:100255. https:\/\/doi.org\/10.1016\/j.cosrev.2020.10025","journal-title":"Comput Sci Rev"},{"key":"2359_CR35","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1007\/s13198-017-0618-4","volume":"8","author":"L Kumar","year":"2017","unstructured":"Kumar L, Rath SK (2017) Software maintainability prediction using hybrid neural network and fuzzy logic approach with parallel computing concept. Int J Syst Assur Eng Manag 8:1487\u20131502","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR36","unstructured":"Kveton B, Szepesv\u00e1ri C, Vaswani S, Wen Z, Ghavamzadeh M, Lattimore T (2019) Garbage in, reward out: Boot strapping exploration in multi-armed bandits. In: 36th International Conference on Machine Learning, ICML 2019, vol 2019, pp 6380\u20136395"},{"key":"2359_CR97","doi-asserted-by":"publisher","unstructured":"Labille K, Huang W, Wu X (2021) Transferable contextual bandits with prior observations. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 12713, pp 398\u2013 410. https:\/\/doi.org\/10.1007\/978-3-030-75765-6_32","DOI":"10.1007\/978-3-030-75765-6_32"},{"key":"2359_CR95","doi-asserted-by":"publisher","unstructured":"Li L, Chu W, Langford J, Schapire RE (2010) A contextual-bandit approach to personalized news article recommendation. In: Proceedings of the 19th international conference on World Wide Web. https:\/\/doi.org\/10.1145\/1772690.1772758","DOI":"10.1145\/1772690.1772758"},{"issue":"4","key":"2359_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446427","volume":"39","author":"S Li","year":"2021","unstructured":"Li S, Lei W, Wu Q, He X, Jiang P, Chua TS (2021) Seamlessly unifying attributes and items: conversational recommendation for cold-start users. ACM Trans Inf Syst 39(4):1. https:\/\/doi.org\/10.1145\/3446427","journal-title":"ACM Trans Inf Syst"},{"key":"2359_CR78","doi-asserted-by":"crossref","unstructured":"Liu B, Wei Y, Zhang Y, Yan Z, Yang Q (2018) Transferable contextual bandit for cross-domain recommendation. Available: www.aaai.org","DOI":"10.1609\/aaai.v32i1.11699"},{"key":"2359_CR91","unstructured":"Liu L, Downe R, Reid J (2019) Multi-armed bandit strategies for non-stationary reward distributions and delayed feedback processes. Available:http:\/\/arxiv.org\/abs\/1902.08593"},{"issue":"7","key":"2359_CR38","doi-asserted-by":"publisher","first-page":"3565","DOI":"10.3390\/app12073565","volume":"12","author":"Y Liu","year":"2022","unstructured":"Liu Y, Qi X, Zhang J, Li H, Ge X, Ai J (2022) Automatic bug triaging via deep reinforcement learning. Appl Sci 12(7):3565. https:\/\/doi.org\/10.3390\/app12073565","journal-title":"Appl Sci"},{"key":"2359_CR90","unstructured":"Lovato P (2013) Multi-armed bandit problem and its applications in reinforcement learning, pp 1\u201325. Available: http:\/\/profs.sci.univr.it\/~farinelli\/courses\/ddrMAS\/slides\/Bandit.pdf"},{"issue":"1","key":"2359_CR39","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TEM.2019.2961376","volume":"68","author":"Y Ma","year":"2020","unstructured":"Ma Y, Geng X, Wang J (2020) A deep neural network with multiplex interactions for cold-start service recommendation. IEEE Trans Eng Manag 68(1):105\u2013119","journal-title":"IEEE Trans Eng Manag"},{"key":"2359_CR85","doi-asserted-by":"publisher","unstructured":"Meng C, Cheng Y, Jiechao C, Peng Y (2013) A method to solve cold start problem in recommendation system based on social network sub-community and ontology decision model. In: Proceedings of 3rd International Conference on Multimedia Technology (ICMT-13), vol 84. https:\/\/doi.org\/10.2991\/icmt-13.2013.20","DOI":"10.2991\/icmt-13.2013.20"},{"issue":"7716","key":"2359_CR41","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1136\/bmj.b2535","volume":"339","author":"D Moher","year":"2009","unstructured":"Moher D, Liberati A, Tetzlaff J, Altman DG (2009) Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. BMJ 339(7716):332\u2013336. https:\/\/doi.org\/10.1136\/bmj.b2535","journal-title":"BMJ"},{"key":"2359_CR42","doi-asserted-by":"crossref","unstructured":"Mondal R, Bhowmik B (2022) DeCS: a deep neural network framework for cold start problem in recommender systems. In: 2022 IEEE Region 10 Symposium (TENSYMP), IEEE","DOI":"10.1109\/TENSYMP54529.2022.9864409"},{"key":"2359_CR43","doi-asserted-by":"publisher","first-page":"63","DOI":"10.4018\/978-1-60960-165-2.ch004","volume-title":"Decision theory models for applications in artificial intelligence: concepts and solutions","author":"EF Morales","year":"2011","unstructured":"Morales EF, Zaragoza JH (2011) An introduction to reinforcement learning. In: Sucar LE, Morales EF, Hoey J (eds) Decision theory models for applications in artificial intelligence: concepts and solutions. IGI Global, Hershey, pp 63\u201380. https:\/\/doi.org\/10.4018\/978-1-60960-165-2.ch004"},{"key":"2359_CR44","unstructured":"Nguyen HT, Mary J, Preux P (2014) Cold start problems in recommendation systems via contextual-bandit algorithms, no June. Available: http:\/\/arxiv.org\/abs\/1405.7544"},{"key":"2359_CR69","unstructured":"Nicol O (2014) Data driven evaluation of contextual bandit algorithms and applications to dynamic recommendation, 2014. Available: https:\/\/tel.archives-ouvertes.fr\/tel-01297407"},{"key":"2359_CR45","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-67597-8_17","volume":"778","author":"I Obadi\u0107","year":"2017","unstructured":"Obadi\u0107 I, Madjarov G, Dimitrovski I, Gjorgjevikj D (2017) addressing item-cold start problem in recommendation systems using model based approach and deep learning. Commun Comput Inf Sci 778:176\u2013185. https:\/\/doi.org\/10.1007\/978-3-319-67597-8_17","journal-title":"Commun Comput Inf Sci"},{"issue":"3","key":"2359_CR46","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1108\/IJCS-03-2021-0005","volume":"5","author":"R Qiu","year":"2021","unstructured":"Qiu R, Ji W (2021) An embedded bandit algorithm based on agent evolution for cold-start problem. Int J Crowd Sci 5(3):228\u2013238. https:\/\/doi.org\/10.1108\/IJCS-03-2021-0005","journal-title":"Int J Crowd Sci"},{"issue":"1","key":"2359_CR47","doi-asserted-by":"publisher","first-page":"81106","DOI":"10.1007\/bf00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81106. https:\/\/doi.org\/10.1007\/bf00116251","journal-title":"Mach Learn"},{"key":"2359_CR48","unstructured":"Rama K, Kumar P, Bhasker B (2019) Deep learning to address candidate generation and cold start challenges in recommender systems: a research survey. arXiv preprint arXiv:1907.08674"},{"key":"2359_CR70","unstructured":"Rappa M (2010) ACM Digital Library. In: Proceedings of the19th International conference on World Wide Web, ACM"},{"issue":"2","key":"2359_CR49","doi-asserted-by":"publisher","first-page":"174","DOI":"10.5195\/jmla.2021.962","volume":"109","author":"ML Rethlefsen","year":"2021","unstructured":"Rethlefsen ML et al (2021) PRISMAS: an extension to the PRISMA statement for reporting literature searches in systematic reviews. J Med Libr Assoc 109(2):174\u2013200. https:\/\/doi.org\/10.5195\/jmla.2021.962","journal-title":"J Med Libr Assoc"},{"key":"2359_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0341-8_10","volume-title":"Cold start problem in social recommender systems: state-of-the-art review","author":"VR Revathy","year":"2019","unstructured":"Revathy VR, Anitha SP (2019) Cold start problem in social recommender systems: state-of-the-art review, vol 759. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-0341-8_10"},{"key":"2359_CR51","unstructured":"Riquelme C, Tucker G, Snoek J (2018) Deep Bayesian bandits show down: An empirical comparison of Bayesian d eep networks for Thompson sampling. In: 6th International Conference on Learning Representations, ICLR 2018\u2014Conference Track Proceedings"},{"issue":"3","key":"2359_CR52","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1108\/10662241011050722","volume":"20","author":"RM Rodr\u00edguez","year":"2010","unstructured":"Rodr\u00edguez RM, Espinilla M, S\u00e1nchez PJ, Mart\u00ednez- L\u00f3pez L (2010) Using linguistic incomplete preference relationstocoldstartrecommendations. Internet Res 20(3):296\u2013315. https:\/\/doi.org\/10.1108\/10662241011050722","journal-title":"Internet Res"},{"key":"2359_CR53","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/123726","author":"VA Rohani","year":"2014","unstructured":"Rohani VA, Kasirun ZM, Kumar S, Shamshirband S (2014) An effective recommender algorithm for cold-start problem in academic social networks. Math Probl Eng. https:\/\/doi.org\/10.1155\/2014\/123726","journal-title":"Math Probl Eng"},{"key":"2359_CR75","doi-asserted-by":"publisher","unstructured":"Roy D, Dutta M. (2022) A systematic review and research perspective on recommender systems. J. Big Data, 9(1).doi:https:\/\/doi.org\/10.1186\/s40537-022-00592-5.","DOI":"10.1186\/s40537-022-00592-5"},{"key":"2359_CR54","doi-asserted-by":"crossref","unstructured":"Sarumathi M, Singarani S, Thameemaa S, Umayal V, Archana S, Indira K, Devi MK (2016) Systematic approach for cold start issues in recommendations system. In: 2016 International Conference on Recent Trends in Information Technology (ICRTIT), IEEE, pp 1\u20137","DOI":"10.1109\/ICRTIT.2016.7569601"},{"issue":"1","key":"2359_CR55","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5152\/TAO.2019.4058","volume":"57","author":"AA Sel\u00e7uk","year":"2019","unstructured":"Sel\u00e7uk AA (2019) A guide for systematic reviews: PRISMA. Turk Arch Otorhinolaryngol 57(1):57. https:\/\/doi.org\/10.5152\/TAO.2019.4058","journal-title":"Turk Arch Otorhinolaryngol"},{"issue":"2","key":"2359_CR56","first-page":"1","volume":"36","author":"Y Shen","year":"2017","unstructured":"Shen Y (2017) Local representative based matrix factorization for cold start recommendation. ACM Trans Inf Syst 36(2):1\u201328","journal-title":"ACM Trans Inf Syst"},{"key":"2359_CR98","doi-asserted-by":"publisher","unstructured":"Shi S, Zhang M, Liu Y, Ma S (2018) Attention-based adaptive model to unify warm and cold starts recommendation. In: Proceedings of the 27th ACM international conference on information and knowledge management, pp 127\u2013136. https:\/\/doi.org\/10.1145\/3269206.3271710.","DOI":"10.1145\/3269206.3271710"},{"key":"2359_CR57","doi-asserted-by":"crossref","unstructured":"Singh N, Singh SK (2021) MABTriage: multi armed bandit triaging model approach. In: 2021 13th International Conference on Contemporary Computing (IC3-2021)","DOI":"10.1145\/3474124.3474194"},{"key":"2359_CR96","unstructured":"Slivkins A (2011) Contextual Bandits with Similarity Information. In: Proceedings of the 24th annual Conference on learning theory"},{"issue":"4","key":"2359_CR58","doi-asserted-by":"publisher","first-page":"2029","DOI":"10.1007\/s13198-021-01616-8","volume":"13","author":"T Sreenivasulu Reddy","year":"2022","unstructured":"Sreenivasulu Reddy T, Sathya R, Nuka M (2022) Intuitionistic fuzzy rough sets and fruit fly algorithm for association rule mining. Int J Syst Assur Eng Manag 13(4):2029\u20132039","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"1","key":"2359_CR59","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/bdcc2010007","volume":"2","author":"M Sun","year":"2018","unstructured":"Sun M, Li F, Zhang J (2018) A multi-modality deep network for cold-start recommendation. Big Data Cogn Comput 2(1):7","journal-title":"Big Data Cogn Comput"},{"key":"2359_CR72","doi-asserted-by":"crossref","unstructured":"Tagra A, Zhang H, Rajbahadur GK, Hassan AE (2022) Revisiting reopened bugs in open source software systems. Available: http:\/\/arxiv.org\/abs\/2202.08701","DOI":"10.1007\/s10664-022-10133-6"},{"key":"2359_CR100","doi-asserted-by":"publisher","unstructured":"Tang L, Rosales R, Singh AP, Agarwal D (2013) Automatic ad format selection via contextual bandits. In: International Conference on Information and Knowledge Management, Proceedings, pp 15871594. https:\/\/doi.org\/10.1145\/2505515.2514700","DOI":"10.1145\/2505515.2514700"},{"key":"2359_CR60","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00484-0","author":"FJ Tey","year":"2021","unstructured":"Tey FJ, Wu TY, Lin CL, Chen JL (2021) Accuracy improvements for cold start recommendation problem using indirect relations in social networks. J Big Data. https:\/\/doi.org\/10.1186\/s40537-021-00484-0","journal-title":"J Big Data"},{"key":"2359_CR92","unstructured":"Tsun A, Testing MH, Vegas L () Chapter 9\u202f: Applications to Computing The Multi Armed Bandit Framework, pp 1\u201312@@"},{"key":"2359_CR61","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s13198-020-00951-6","volume":"11","author":"AM Ubaid","year":"2020","unstructured":"Ubaid AM, Aghdeab SH, Abdulameer AG, Al-Juboori LA, Dweiri FT (2020) Multidimensional optimization of electrical discharge machining for high speed steel (AISI M2) using Taguchi-fuzzy approach. Int J Syst Assur Eng Manag 11:1021\u20131045","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2359_CR94","unstructured":"van Emden R, Kaptein M (2018) Contextual: evaluating contextual multi-armed bandit problems in R. Available: http:\/\/arxiv.org\/abs\/1811.01926"},{"key":"2359_CR105","unstructured":"Vartak M et al (2017) A meta-learning perspective on cold-start recommendations for items. In: Advances in neural information processing systems, p 30"},{"issue":"4","key":"2359_CR62","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TLT.2012.11","volume":"5","author":"K Verbert","year":"2012","unstructured":"Verbert K et al (2012) Context aware recommender systems for learning: a survey and future challenges. IEEE Trans Learn Technol 5(4):318\u2013335. https:\/\/doi.org\/10.1109\/TLT.2012.11","journal-title":"IEEE Trans Learn Technol"},{"issue":"4","key":"2359_CR63","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1016\/j.joi.2015.08.001","volume":"9","author":"L Waltman","year":"2015","unstructured":"Waltman L, van Eck NJ (2015) Field-normalized citation impact indicators and the choice of an appropriate counting method. J Informetr 9(4):872\u2013894. https:\/\/doi.org\/10.1016\/j.joi.2015.08.001","journal-title":"J Informetr"},{"issue":"3","key":"2359_CR64","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TAC.2005.844079","volume":"50","author":"C-C Wang","year":"2005","unstructured":"Wang C-C, Kulkarni SR, Poor HV (2005) Bandit problems with side observations. IEEE Trans Autom Control 50(3):338\u2013355","journal-title":"IEEE Trans Autom Control"},{"key":"2359_CR103","doi-asserted-by":"publisher","unstructured":"Wang L, Wang C, Wang K, He X (2017) BiUCB: A contextual bandit algorithm for cold-start and diversified Recommendation. In: Proceedings\u20142017 IEEE International Conference on Big Knowledge, ICBK 2017, pp 248\u2013253. https:\/\/doi.org\/10.1109\/ICBK.2017.49","DOI":"10.1109\/ICBK.2017.49"},{"key":"2359_CR102","doi-asserted-by":"publisher","unstructured":"Wei L, Srivatsva V (2018) On abruptly-changing and slowly-varying multi armed bandit problems. In Proceedings of the American Control Conference, vol 2018, pp 6291\u20136296. https:\/\/doi.org\/10.23919\/ACC.2018.8431265","DOI":"10.23919\/ACC.2018.8431265"},{"key":"2359_CR104","doi-asserted-by":"crossref","unstructured":"Wei J, He J, Chen K, Zhou Y, Tang Z (2016) Collaborative filtering and deep learning- based hybrid recommendation for cold start problem. In: 2016 IEEE 14th International conference on dependable, autonomic and secure computing, 14th International conference on pervasive intelligence and computing, 2nd International conference on big data intelligence and computing and cyber science and technology congress (DASC\/PiCom\/DataCom\/CyberSciTech), IEEE, pp 874\u2013877","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.149"},{"key":"2359_CR87","unstructured":"Wu Q, Liu Y, Miao C, Zhao Y, Guan L, Tang H (2019) Recent advances in diversified recommendation. Available: http:\/\/arxiv.org\/abs\/1905.06589"},{"key":"2359_CR83","doi-asserted-by":"publisher","unstructured":"Xie R, Qiu Z, Rao J, Liu Y, Zhang B, Lin L (2020) Internal and contextual attention network for cold-start multi- channel matching in recommendation. In: IJCAI International Joint Conference on Artificial Intelligence, vol 2021, pp 2732\u20132738. https:\/\/doi.org\/10.24963\/ijcai.2020\/379","DOI":"10.24963\/ijcai.2020\/379"},{"key":"2359_CR99","doi-asserted-by":"publisher","unstructured":"Yang Y, Mo W, Shen B, Chen Y (2017) Cold start developer recommendation in software crowd sourcing: a topic sampling approach. In: Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, pp 376\u2013381. https:\/\/doi.org\/10.18293\/SEKE2017-104","DOI":"10.18293\/SEKE2017-104"},{"key":"2359_CR101","doi-asserted-by":"publisher","unstructured":"Yang L, Liu B, Lin L, Xia F, Chen K, Yang Q (2020) Exploring clustering of bandits for online recommendation system. In: RecSys 2020-14th ACM Conference on Recommender Systems, pp 120\u2013129. https:\/\/doi.org\/10.1145\/3383313.3412250","DOI":"10.1145\/3383313.3412250"},{"key":"2359_CR68","doi-asserted-by":"publisher","unstructured":"Yuan J, Shalaby W, Korayem M, Lin D, Aljadda K, Luo J (2016) Solving cold-start problem in large- scale recommendation engines: a deep learning approach. In: Proceedings of 2016 IEEE International Conference on Big Data, Big Data, pp 1901\u20131910. https:\/\/doi.org\/10.1109\/BigData.2016.7840810","DOI":"10.1109\/BigData.2016.7840810"},{"key":"2359_CR65","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4347004","author":"SFA Zaidi","year":"2022","unstructured":"Zaidi SFA, Woo H, Lee CG (2022) Toward an effective bug triage system using transformers to add new developers. J Sensors. https:\/\/doi.org\/10.1155\/2022\/4347004","journal-title":"J Sensors"},{"key":"2359_CR76","doi-asserted-by":"publisher","unstructured":"Zeng C, Wang Q, Mokhtari S, Li T (2016) Online context-aware recommendation with time varying multi- armed bandit. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol 13\u201317, pp 2025\u20132034. https:\/\/doi.org\/10.1145\/2939672.2939878","DOI":"10.1145\/2939672.2939878"},{"key":"2359_CR84","doi-asserted-by":"publisher","unstructured":"Zhang M, Tang J, Zhang X, Xue X (2014) Addressing cold start in recommender systems: a semi- supervised co-training algorithm. In: SIGIR 2014-Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp73\u201382. https:\/\/doi.org\/10.1145\/2600428.2609599","DOI":"10.1145\/2600428.2609599"},{"key":"2359_CR66","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/186","author":"J Zhang","year":"2017","unstructured":"Zhang J, Bareinboim E (2017) Transfer learning in multi-armed bandits: a causal approach. IJCAI Int Jt Conf Artif Intell. https:\/\/doi.org\/10.24963\/ijcai.2017\/186","journal-title":"IJCAI Int Jt Conf Artif Intell"},{"key":"2359_CR89","unstructured":"Zhou L (2015) A Survey on Contextual Multi armed Bandits. Available: http:\/\/arxiv.org\/abs\/150 8.03326"},{"key":"2359_CR67","unstructured":"Zhouand L, Brunskill E (2016) Latent contextual bandits and their application to personalized recommendations for new users. Available: http:\/\/arxiv.org\/abs\/1604.06743"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02359-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02359-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02359-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T13:21:53Z","timestamp":1720704113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02359-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":105,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["2359"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02359-y","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"19 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study does not involve any human\/animal participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animals rights"}},{"value":"This study does not involve any human\/animal participants, as a result, no consent is needed.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}