Author:
Xiao Wei,Hu Qian,Mohamed Thahir,Gao Zheng,Gao Xibin,Arava Radhika,AbdelHady Mohamed
Abstract
Intelligent personal assistants (IPA) enable voice applications that facilitate people's daily tasks. However, due to the complexity and ambiguity of voice requests, some requests may not be handled properly by the standard natural language understanding (NLU) component. In such cases, a simple reply like “Sorry, I don't know” hurts the user's experience and limits the functionality of IPA. In this paper, we propose a two-stage shortlister-reranker recommender system to match third-party voice applications (skills) to unhandled utterances. In this approach, a skill shortlister is proposed to retrieve candidate skills from the skill catalog by calculating both lexical and semantic similarity between skills and user requests. We also illustrate how to build a new system by using observed data collected from a baseline rule-based system, and how the exposure biases can generate discrepancy between offline and human metrics. Lastly, we present two relabeling methods that can handle the incomplete ground truth, and mitigate exposure bias. We demonstrate the effectiveness of our proposed system through extensive offline experiments. Furthermore, we present online A/B testing results that show a significant boost on user experience satisfaction.
Subject
Artificial Intelligence,Information Systems,Computer Science (miscellaneous)
Reference35 articles.
1. Hybrid recommender systems: survey and experiments;Burke;User Model. User-Adapt. Interact,2002
2. Bias and debias in recommender system: a survey and future directions;Chen,2020
3. “Samwalker: social recommendation with informative sampling strategy,”;Chen,2019
4. “End-to-end memory networks with knowledge carryover for multi-turn spoken language understanding,”;Chen,2016
5. “Wide & deep learning for recommender systems,”;Cheng,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07