A Snooze-less User-Aware Notification System for Proactive
Conversational Agents
- URL: http://arxiv.org/abs/2003.02097v1
- Date: Wed, 4 Mar 2020 14:31:21 GMT
- Title: A Snooze-less User-Aware Notification System for Proactive
Conversational Agents
- Authors: Yara Rizk, Vatche Isahagian, Merve Unuvar, Yasaman Khazaeni
- Abstract summary: We propose an alert and notification framework that intelligently issues, suppresses and aggregates notifications.
Our framework can be deployed as a backend service, but is better suited to be integrated into proactive conversational agents.
- Score: 6.4378876455245235
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The ubiquity of smart phones and electronic devices has placed a wealth of
information at the fingertips of consumers as well as creators of digital
content. This has led to millions of notifications being issued each second
from alerts about posted YouTube videos to tweets, emails and personal
messages. Adding work related notifications and we can see how quickly the
number of notifications increases. Not only does this cause reduced
productivity and concentration but has also been shown to cause alert fatigue.
This condition makes users desensitized to notifications, causing them to
ignore or miss important alerts. Depending on what domain users work in, the
cost of missing a notification can vary from a mere inconvenience to life and
death. Therefore, in this work, we propose an alert and notification framework
that intelligently issues, suppresses and aggregates notifications, based on
event severity, user preferences, or schedules, to minimize the need for users
to ignore, or snooze their notifications and potentially forget about
addressing important ones. Our framework can be deployed as a backend service,
but is better suited to be integrated into proactive conversational agents, a
field receiving a lot of attention with the digital transformation era, email
services, news services and others. However, the main challenge lies in
developing the right machine learning algorithms that can learn models from a
wide set of users while customizing these models to individual users'
preferences.
Related papers
- Careless Whisper: Exploiting Stealthy End-to-End Leakage in Mobile Instant Messengers [1.5496023883771977]
This paper highlights that delivery receipts can pose significant privacy risks to users.
We use specifically crafted messages that trigger delivery receipts allowing any user to be pinged without their knowledge or consent.
We argue for a design change to address this issue.
arXiv Detail & Related papers (2024-11-17T22:58:28Z) - Remote Timing Attacks on Efficient Language Model Inference [63.79839291641793]
We show it is possible to exploit timing differences to mount a timing attack.
We show how it is possible to learn the topic of a user's conversation with 90%+ precision.
An adversary can leverage a boosting attack to recover PII placed in messages for open source systems.
arXiv Detail & Related papers (2024-10-22T16:51:36Z) - TIM: Temporal Interaction Model in Notification System [6.377444652197526]
We propose the Temporal Interaction Model (TIM), which models users' behavior patterns by estimating CTR in every time slot over a day in our short video application Kuaishou.
TIM is a reliable tool for forecasting user behavior, leading to a remarkable enhancement in user engagement without causing undue disturbance.
arXiv Detail & Related papers (2024-06-11T08:53:15Z) - A State Transition Model for Mobile Notifications via Survival Analysis [10.638942431625381]
We propose a state transition framework to quantitatively evaluate the effectiveness of notifications.
We develop a survival model for badging notifications assuming a log-linear structure and a Weibull distribution.
Our results show that this model achieves more flexibility for applications and superior prediction accuracy than a logistic regression model.
arXiv Detail & Related papers (2022-07-07T05:38:39Z) - Should I send this notification? Optimizing push notifications decision
making by modeling the future [4.476351684070796]
Most recommender systems are myopic, that is they optimize based on the immediate response of the user.
This may be misaligned with the true objective, such as creating long term user satisfaction.
In this work we focus on mobile push notifications, where the long term effects of recommender system decisions can be particularly strong.
arXiv Detail & Related papers (2022-02-17T18:27:17Z) - Speech Enhancement for Wake-Up-Word detection in Voice Assistants [60.103753056973815]
Keywords spotting and in particular Wake-Up-Word (WUW) detection is a very important task for voice assistants.
This paper proposes a Speech Enhancement model adapted to the task of WUW detection.
It aims at increasing the recognition rate and reducing the false alarms in the presence of these types of noises.
arXiv Detail & Related papers (2021-01-29T18:44:05Z) - Speaker De-identification System using Autoencoders and Adversarial
Training [58.720142291102135]
We propose a speaker de-identification system based on adversarial training and autoencoders.
Experimental results show that combining adversarial learning and autoencoders increase the equal error rate of a speaker verification system.
arXiv Detail & Related papers (2020-11-09T19:22:05Z) - Privacy-accuracy trade-offs in noisy digital exposure notifications [3.04585143845864]
There is interest in using the power of mobile phones to automate the contact-tracing process.
The rough idea is simple: use Bluetooth or other data-exchange technologies to record contacts between users, enable users to report positive diagnoses, and alert users who have been exposed to sick users.
Although designing practical protocols is of crucial importance, it is essential to realize that notifying users about exposure events may itself leak confidential information.
arXiv Detail & Related papers (2020-11-08T15:00:38Z) - Robust and Verifiable Information Embedding Attacks to Deep Neural
Networks via Error-Correcting Codes [81.85509264573948]
In the era of deep learning, a user often leverages a third-party machine learning tool to train a deep neural network (DNN) classifier.
In an information embedding attack, an attacker is the provider of a malicious third-party machine learning tool.
In this work, we aim to design information embedding attacks that are verifiable and robust against popular post-processing methods.
arXiv Detail & Related papers (2020-10-26T17:42:42Z) - Learning with Weak Supervision for Email Intent Detection [56.71599262462638]
We propose to leverage user actions as a source of weak supervision to detect intents in emails.
We develop an end-to-end robust deep neural network model for email intent identification.
arXiv Detail & Related papers (2020-05-26T23:41:05Z) - Cloud-Based Face and Speech Recognition for Access Control Applications [55.84746218227712]
The system helps employees to unlock the entrance door via face recognition without the need of tag-keys or cards.
Visitors and delivery persons are provided with a speech-to-text service where they utter the name of the employee that they want to meet.
The hardware of the system is constituted by two Raspberry Pi, a 7-inch LCD-touch display, a camera, and a sound card with a microphone and speaker.
arXiv Detail & Related papers (2020-04-23T13:57:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.