{"id":"https://openalex.org/W4414360571","doi":"https://doi.org/10.24963/ijcai.2025/346","title":"Flow Matching Based Sequential Recommender Model","display_name":"Flow Matching Based Sequential Recommender Model","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360571","doi":"https://doi.org/10.24963/ijcai.2025/346"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/346","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076648042","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0002-0271-3632"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089307887","display_name":"Lixin Zou","orcid":"https://orcid.org/0000-0001-6755-871X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixin Zou","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100645854","display_name":"Xiangyu Zhao","orcid":"https://orcid.org/0000-0003-2926-4416"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiangyu Zhao","raw_affiliation_strings":["City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056445370","display_name":"Min Tang","orcid":"https://orcid.org/0009-0000-1088-8523"},"institutions":[{"id":"https://openalex.org/I2801239119","display_name":"Australian Regenerative Medicine Institute","ror":"https://ror.org/02qa5kg76","country_code":"AU","type":"facility","lineage":["https://openalex.org/I2801037857","https://openalex.org/I2801239119","https://openalex.org/I56590836"]},{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Min Tang","raw_affiliation_strings":["Monash University"],"affiliations":[{"raw_affiliation_string":"Monash University","institution_ids":["https://openalex.org/I2801239119","https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108419449","display_name":"Liming Dong","orcid":"https://orcid.org/0000-0002-8676-0363"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liming Dong","raw_affiliation_strings":["National Defense University"],"affiliations":[{"raw_affiliation_string":"National Defense University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071089113","display_name":"Dan Luo","orcid":"https://orcid.org/0000-0003-3243-2441"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Luo","raw_affiliation_strings":["Lehigh University"],"affiliations":[{"raw_affiliation_string":"Lehigh University","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[{"id":"https://openalex.org/I4210143490","display_name":"Computing Center","ror":"https://ror.org/0557kgc34","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210143490","https://openalex.org/I4210148470"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Lab of Mathematical Engineering and Advanced Computing"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Mathematical Engineering and Advanced Computing","institution_ids":["https://openalex.org/I4210143490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100734069","display_name":"Chenliang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenliang Li","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5076648042"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.3431,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9107918,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"3108","last_page":"3116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12384","display_name":"Customer churn and segmentation","score":0.9212999939918518,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6976000070571899},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5091000199317932},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5026000142097473},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4869999885559082},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4819999933242798},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.445499986410141},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.40310001373291016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133999705314636},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6976000070571899},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5343000292778015},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5091000199317932},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5026000142097473},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4869999885559082},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4819999933242798},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.445499986410141},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42320001125335693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4131999909877777},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.38119998574256897},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3319999873638153},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C2985179714","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Work flow","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/346","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Generative":[0],"models,":[1],"particularly":[2],"diffusion":[3],"model,":[4],"have":[5],"emerged":[6],"as":[7],"powerful":[8],"tools":[9],"for":[10,58],"sequential":[11],"recommendation.":[12],"However,":[13],"accurately":[14],"modeling":[15],"user":[16,80,114],"preferences":[17,81],"remains":[18],"challenging":[19],"due":[20],"to":[21,72,101],"the":[22,27,59,64,83,87,108],"noise":[23,76],"perturbations":[24],"inherent":[25],"in":[26],"forward":[28,84],"and":[29,53],"reverse":[30,88,94],"processes":[31],"of":[32,129],"diffusion-based":[33],"methods.":[34,133],"Towards":[35],"this":[36,38],"end,":[37],"study":[39],"introduces":[40],"FMRec,":[41],"a":[42,49,54,69,92],"Flow":[43],"Matching":[44],"based":[45],"model":[46],"that":[47,107,123],"employs":[48],"straight":[50],"flow":[51],"trajectory":[52],"modified":[55],"loss":[56,71],"tailored":[57],"recommendation":[60],"task.":[61],"Additionally,":[62],"from":[63],"diffusion-model":[65],"perspective,":[66],"we":[67,90],"integrate":[68],"reconstruction":[70],"improve":[73],"robustness":[74],"against":[75],"perturbations,":[77],"thereby":[78,105],"retaining":[79],"during":[82],"process.":[85],"In":[86],"process,":[89],"employ":[91],"deterministic":[93],"sampler,":[95],"specifically":[96],"an":[97,126],"ODE-based":[98],"updating":[99],"function,":[100],"eliminate":[102],"unnecessary":[103],"randomness,":[104],"ensuring":[106],"generated":[109],"recommendations":[110],"closely":[111],"align":[112],"with":[113],"needs.":[115],"Extensive":[116],"evaluations":[117],"on":[118],"four":[119],"benchmark":[120],"datasets":[121],"reveal":[122],"FMRec":[124],"achieves":[125],"average":[127],"improvement":[128],"6.53%":[130],"over":[131],"state-of-the-art":[132],"The":[134],"replication":[135],"code":[136],"is":[137],"available":[138],"at":[139],"https://github.com/FengLiu-1/FMRec.":[140]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
