{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:53:59Z","timestamp":1775667239038,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s41060-020-00241-1","type":"journal-article","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T08:02:42Z","timestamp":1617177762000},"page":"191-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Modeling uncertainty to improve personalized recommendations via Bayesian deep learning"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9178-8259","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Serdar","family":"Kad\u0131o\u011flu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"key":"241_CR1","unstructured":"Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs. In: Proceedings of the 30th International Conference on Machine Learning, vol.\u00a028, pp. 127\u2013135. PMLR (2013)"},{"issue":"2\u20133","key":"241_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"241_CR3","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. In: CoRR (2014)"},{"key":"241_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"R Bell","year":"2009","unstructured":"Bell, R., Koren, Y., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42, 30\u201337 (2009)","journal-title":"Computer"},{"key":"241_CR5","unstructured":"Bishop, C.M.: Bayesian methods for neural networks. Technical report (1995)"},{"key":"241_CR6","unstructured":"Collier, M., Llorens, H.U.: Deep contextual multi-armed bandits. CoRR arXiv:1807.09809 (2018)"},{"key":"241_CR7","doi-asserted-by":"crossref","unstructured":"Ekstrand, M.D.: The lkpy package for recommender systems experiments. In: Computer Science Faculty Publications and Presentations, vol. 147. Boise State University. https:\/\/md.ekstrandom.net\/pubs\/lkpy (2018). Accessed 16 July 2019","DOI":"10.18122\/cs_facpubs\/147\/boisestate"},{"key":"241_CR8","unstructured":"Funk, S.: Funksvd proposal (2006). https:\/\/sifter.org\/~simon\/journal\/20061211.html"},{"key":"241_CR9","unstructured":"F\u00e9raud, R., Allesiardo, R., Urvoy, T., Cl\u00e9rot, F.: Random forest for the contextual bandit problem. In: Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, Proceedings of Machine Learning Research, vol.\u00a051, pp. 93\u2013101 (2016)"},{"key":"241_CR10","unstructured":"Gal, Y., Ghahramani, Z.: Dropout as a Bayesian approximation: representing model uncertainty in deep learning. In: Proceedings of The 33rd International Conference on Machine Learning, vol.\u00a048, pp. 1050\u20131059 (2016)"},{"key":"241_CR11","doi-asserted-by":"crossref","unstructured":"Gomez-Uribe, C.A., Hunt, N.: The netflix recommender system: algorithms, business value, and innovation. ACM Trans. Manag. Inf. Syst. 6(4), 13:1\u201313:19 (2015)","DOI":"10.1145\/2843948"},{"key":"241_CR12","unstructured":"Grouplens.org (2019). https:\/\/grouplens.org\/datasets\/movielens\/"},{"key":"241_CR13","doi-asserted-by":"crossref","unstructured":"He, X., Liao, L., Zhang, H., Nie, L., Hu, X., Chua, T.S.: Neural collaborative filtering. In: Proceedings of the 26th International Conference on World Wide Web, pp. 173\u2013182. Republic and Canton of Geneva, Switzerland (2017)","DOI":"10.1145\/3038912.3052569"},{"key":"241_CR14","doi-asserted-by":"crossref","unstructured":"Hu, Y., Koren, Y., Volinsky, C.: Collaborative filtering for implicit feedback datasets. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 263\u2013272 (2008)","DOI":"10.1109\/ICDM.2008.22"},{"issue":"4","key":"241_CR15","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/582415.582418","volume":"20","author":"K J\u00e4rvelin","year":"2002","unstructured":"J\u00e4rvelin, K., Kek\u00e4l\u00e4inen, J.: Cumulated gain-based evaluation of ir techniques. ACM Trans. Inf. Syst. 20(4), 422\u2013446 (2002)","journal-title":"ACM Trans. Inf. Syst."},{"key":"241_CR16","first-page":"5574","volume":"30","author":"A Kendall","year":"2017","unstructured":"Kendall, A., Gal, Y.: What uncertainties do we need in Bayesian deep learning for computer vision? Adv. Neural Inf. Process. Syst. 30, 5574\u20135584 (2017)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"241_CR17","doi-asserted-by":"crossref","unstructured":"Koren, Y.: Factorization meets the neighborhood: a multifaceted collaborative filtering model. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 426\u2013434 (2008)","DOI":"10.1145\/1401890.1401944"},{"key":"241_CR18","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: Proceedings of the 19th International Conference on World Wide Web, pp. 661\u2013670. New York, NY, USA (2010)","DOI":"10.1145\/1772690.1772758"},{"key":"241_CR19","doi-asserted-by":"crossref","unstructured":"Liu, B., Wei, Y., Zhang, Y., Yan, Z., Yang, Q.: Transferable contextual bandit for cross-domain recommendation (2018)","DOI":"10.1609\/aaai.v32i1.11699"},{"key":"241_CR20","doi-asserted-by":"crossref","unstructured":"Lops, P., de Gemmis, M., Semeraro, G.: Content-Based Recommender Systems: State of the Art and Trends, pp. 73\u2013105. Springer, Boston (2011)","DOI":"10.1007\/978-0-387-85820-3_3"},{"issue":"3","key":"241_CR21","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1162\/neco.1992.4.3.448","volume":"4","author":"DJC MacKay","year":"1992","unstructured":"MacKay, D.J.C.: A practical Bayesian framework for backpropagation networks. Neural Comput. 4(3), 448\u2013472 (1992)","journal-title":"Neural Comput."},{"key":"241_CR22","doi-asserted-by":"crossref","unstructured":"McAuley, J., Targett, C., Shi, Q., van\u00a0den Hengel, A.: Image-based recommendations on styles and substitutes. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201915, pp. 43\u201352 (2015)","DOI":"10.1145\/2766462.2767755"},{"key":"241_CR23","doi-asserted-by":"crossref","unstructured":"Neal, R.: Bayesian learning for neural networks. Ph.D. thesis, University of Toronto (1995)","DOI":"10.1007\/978-1-4612-0745-0"},{"key":"241_CR24","unstructured":"Riquelme, C., Tucker, G., Snoek, J.: Deep Bayesian bandits showdown: an empirical comparison of Bayesian deep networks for Thompson sampling. In: International Conference on Learning Representations (2018)"},{"key":"241_CR25","unstructured":"Salakhutdinov, R., Mnih, A.: Probabilistic matrix factorization. In: Proceedings of the 20th International Conference on Neural Information Processing Systems, NIPS\u201907, pp. 1257\u20131264 (2007)"},{"key":"241_CR26","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web, pp. 285\u2013295. New York, NY, USA (2001)","DOI":"10.1145\/371920.372071"},{"key":"241_CR27","unstructured":"Schwab, I., Koychev, I., Kobsa, A.: Learning about users from observation. In: In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI) Spring Symposium: Adaptive User Interfaces, pp. 241\u2013247 (2000)"},{"key":"241_CR28","doi-asserted-by":"crossref","unstructured":"Shardanand, U., Maes, P.: Social information filtering: algorithms for automating&ldquo;word of mouth&rdquo;. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 210\u2013217 (1995)","DOI":"10.1145\/223904.223931"},{"issue":"1","key":"241_CR29","first-page":"2533","volume":"15","author":"A Slivkins","year":"2014","unstructured":"Slivkins, A.: Contextual bandits with similarity information. J. Mach. Learn. Res. 15(1), 2533\u20132568 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"241_CR30","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"241_CR31","first-page":"2949","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Salakhutdinov, R.: Multimodal learning with deep Boltzmann machines. J. Mach. Learn. Res. 15(1), 2949\u20132980 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"241_CR32","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1093\/biomet\/25.3-4.285","volume":"25","author":"WR Thompson","year":"1933","unstructured":"Thompson, W.R.: On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika 25, 285\u2013294 (1933)","journal-title":"Biometrika"},{"key":"241_CR33","doi-asserted-by":"crossref","unstructured":"Tuan, T.X., Phuong, T.M.: 3d convolutional networks for session-based recommendation with content features. In: Proceedings of the Eleventh ACM Conference on Recommender Systems, RecSys \u201917, pp. 138\u2013146 (2017)","DOI":"10.1145\/3109859.3109900"},{"key":"241_CR34","unstructured":"Valko, M., Korda, N., Munos, R., Flaounas, I., Cristianini, N.: Finite-time analysis of kernelised contextual bandits. In: Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence, pp. 654\u2013663 (2013)"},{"key":"241_CR35","first-page":"2643","volume-title":"Advances in Neural Information Processing Systems","author":"A van den Oord","year":"2013","unstructured":"van den Oord, A., Dieleman, S., Schrauwen, B.: Deep content-based music recommendation. In: Burges, C.J.C., Bottou, L., Welling, M., Ghahramani, Z., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 26, pp. 2643\u20132651. Curran Associates Inc., Red Hook (2013)"},{"key":"241_CR36","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, N., Yeung, D.Y.: Collaborative deep learning for recommender systems. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1235\u20131244 (2015)","DOI":"10.1145\/2783258.2783273"},{"key":"241_CR37","doi-asserted-by":"crossref","unstructured":"Wang, H., Wu, Q., Wang, H.: Learning hidden features for contextual bandits. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 1633\u20131642 (2016)","DOI":"10.1145\/2983323.2983847"},{"issue":"12","key":"241_CR38","doi-asserted-by":"publisher","first-page":"3395","DOI":"10.1109\/TKDE.2016.2606428","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang, H., Yeung, D.Y.: Towards Bayesian deep learning: a framework and some existing methods. IEEE Trans. Knowl. Data Eng. 28(12), 3395\u20133408 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"241_CR39","doi-asserted-by":"crossref","unstructured":"Wang, X., Kadioglu, S.: Bayesian deep learning based exploration\u2013exploitation for personalized recommendations. In: 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI), pp. 1715\u20131719 (2019)","DOI":"10.1109\/ICTAI.2019.00253"},{"key":"241_CR40","doi-asserted-by":"crossref","unstructured":"Wu, C.Y., Ahmed, A., Beutel, A., Smola, A.J., Jing, H.: Recurrent recommender networks. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 495\u2013503. New York, NY, USA (2017)","DOI":"10.1145\/3018661.3018689"},{"key":"241_CR41","unstructured":"Yue, Y., Hong, S.A., Guestrin, C.: Hierarchical exploration for accelerating contextual bandits. In: Proceedings of the 29th International Conference on International Conference on Machine Learning, pp. 979\u2013986 (2012)"},{"key":"241_CR42","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Chen, J., Chen, M., Jain, S., Beutel, A., Belletti, F., Chi, E.H.: Categorical-attributes-based item classification for recommender systems. In: Proceedings of the 12th ACM Conference on Recommender Systems, RecSys \u201918, pp. 320\u2013328. New York, NY, USA (2018)","DOI":"10.1145\/3240323.3240367"},{"key":"241_CR43","doi-asserted-by":"crossref","unstructured":"Zhao, X., Xia, L., Zhang, L., Ding, Z., Yin, D., Tang, J.: Deep reinforcement learning for page-wise recommendations. In: Proceedings of the 12th ACM Conference on Recommender Systems, RecSys \u201918, pp. 95\u2013103 (2018)","DOI":"10.1145\/3240323.3240374"},{"key":"241_CR44","doi-asserted-by":"crossref","unstructured":"Zheng, J., Liu, J., Shi, C., Zhuang, F., Li, J., Wu, B.: Recommendation in heterogeneous information network via dual similarity regularization. Int. J. Data Sci, Anal. 3(1), 35\u201348 (2017)","DOI":"10.1007\/s41060-016-0031-0"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-020-00241-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-020-00241-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-020-00241-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T10:29:04Z","timestamp":1689589744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-020-00241-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["241"],"URL":"https:\/\/doi.org\/10.1007\/s41060-020-00241-1","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,31]]},"assertion":[{"value":"6 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}