{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T21:09:38Z","timestamp":1776892178872,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330984","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"825-833","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":248,"title":["Hierarchical Gating Networks for Sequential Recommendation"],"prefix":"10.1145","author":[{"given":"Chen","family":"Ma","sequence":"first","affiliation":[{"name":"McGill University, Montreal, PQ, Canada"}]},{"given":"Peng","family":"Kang","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Xue","family":"Liu","sequence":"additional","affiliation":[{"name":"McGill University, Montreal, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159668"},{"key":"e_1_3_2_1_2_1","unstructured":"Chen Cheng Haiqin Yang Michael R. Lyu and Irwin King. 2013. Where You Like to Go Next: Successive Point-of-Interest Recommendation. In IJCAI. IJCAI\/AAAI 2605--2611.   Chen Cheng Haiqin Yang Michael R. Lyu and Irwin King. 2013. Where You Like to Go Next: Successive Point-of-Interest Recommendation. In IJCAI. IJCAI\/AAAI 2605--2611."},{"key":"e_1_3_2_1_3_1","unstructured":"Kyunghyun Cho Bart van Merrienboer \u00c7aglar G\u00fcl\u00e7ehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. In EMNLP. ACL 1724--1734.  Kyunghyun Cho Bart van Merrienboer \u00c7aglar G\u00fcl\u00e7ehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. In EMNLP. ACL 1724--1734."},{"key":"e_1_3_2_1_4_1","volume-title":"ICML (Proceedings of Machine Learning Research)","volume":"70","author":"Dauphin Yann N.","year":"2017"},{"key":"e_1_3_2_1_5_1","unstructured":"Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: A Factorization-Machine based Neural Network for CTR Prediction. In IJCAI. ijcai.org 1725--1731.   Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: A Factorization-Machine based Neural Network for CTR Prediction. In IJCAI. ijcai.org 1725--1731."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109882"},{"key":"e_1_3_2_1_8_1","volume-title":"Fusing Similarity Models with Markov Chains for Sparse Sequential Recommendation","author":"He Ruining"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883037"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911489"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271761"},{"key":"e_1_3_2_1_13_1","volume-title":"Session-based Recommendations with Recurrent Neural Networks. CoRR abs\/1511.06939","author":"Hidasi Bal\u00e1zs","year":"2015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052639"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487589"},{"key":"e_1_3_2_1_18_1","volume-title":"Self-Attentive Sequential Recommendation","author":"Kang Wang-Cheng"},{"key":"e_1_3_2_1_19_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132926"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220023"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883090"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290977"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271733"},{"key":"e_1_3_2_1_25_1","volume-title":"Recommender Systems Handbook","author":"Ning Xia"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.16"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133005"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109896"},{"key":"e_1_3_2_1_29_1","volume-title":"BPR: Bayesian Personalized Ranking from Implicit Feedback","author":"Rendle Steffen","year":"2009"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273596"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Badrul Munir Sarwar George Karypis Joseph A. Konstan and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In WWW. ACM 285--295.  Badrul Munir Sarwar George Karypis Joseph A. Konstan and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In WWW. ACM 285--295.","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_33_1","unstructured":"Sainbayar Sukhbaatar Arthur Szlam Jason Weston and Rob Fergus. 2015. End- To-End Memory Networks. In NIPS. 2440--2448.   Sainbayar Sukhbaatar Arthur Szlam Jason Weston and Rob Fergus. 2015. End- To-End Memory Networks. In NIPS. 2440--2448."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159656"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271730"},{"key":"e_1_3_2_1_36_1","unstructured":"Thanh Tran Xinyue Liu Kyumin Lee and Xiangnan Kong. {n.d.}. Signed Distancebased Deep Memory Recommender.  Thanh Tran Xinyue Liu Kyumin Lee and Xiangnan Kong. {n.d.}. Signed Distancebased Deep Memory Recommender."},{"key":"e_1_3_2_1_37_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is All you Need. In NIPS. 6000--6010.   Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is All you Need. In NIPS. 6000--6010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240369"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783273"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835837"},{"key":"e_1_3_2_1_41_1","unstructured":"Hong-Jian Xue Xinyu Dai Jianbing Zhang Shujian Huang and Jiajun Chen. 2017. Deep Matrix Factorization Models for Recommender Systems. In IJCAI. ijcai.org 3203--3209.   Hong-Jian Xue Xinyu Dai Jianbing Zhang Shujian Huang and Jiajun Chen. 2017. Deep Matrix Factorization Models for Recommender Systems. In IJCAI. ijcai.org 3203--3209."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290975"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:04Z","timestamp":1750206364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":42,"alternative-id":["10.1145\/3292500.3330984","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330984","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}