skip to main content
10.1145/3289600.3291033acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
research-article
Open access

Off-Policy Evaluation of Probabilistic Identity Data in Lookalike Modeling

Published: 30 January 2019 Publication History

Abstract

We evaluate the impact of probabilistically-constructed digital identity data collected between Sep. 2017 and Dec. 2017, approximately, in the context of Lookalike-targeted campaigns. The backbone of this study is a large set of probabilistically-constructed "identities", represented as small bags of cookies and mobile ad identifiers with associated metadata, that are likely all owned by the same underlying user. The identity data allows to generate "identity-based", rather than "identifier-based", user models, giving a fuller picture of the interests of the users underlying the identifiers. We employ off-policy evaluation techniques to evaluate the potential of identity-powered lookalike models without incurring the risk of allowing untested models to direct large amounts of ad spend or the large cost of performing A/B tests. We add to historical work on off-policy evaluation by noting a significant type of "finite-sample bias" that occurs for studies combining modestly-sized datasets and evaluation metrics based on ratios involving rare events (e.g., conversions). We illustrate this bias using a simulation study that later informs the handling of inverse propensity weights in our analyses on real data. We demonstrate significant lift in identity-powered lookalikes versus an identity-ignorant baseline: on average ~70% lift in conversion rate, CVR, with a concordant drop in cost-per-acquisition, CPA. This rises to factors of ~(4-32)x for identifiers having little data themselves, but that can be inferred to belong to users with substantial data to aggregate across identifiers. This implies that identity-powered user modeling is especially important in the context of identifiers having very short lifespans (i.e., frequently churned cookies). Our work motivates and informs the use of probabilistically-constructed digital identities in the marketing context. It also deepens the canon of examples in which off-policy learning has been employed to evaluate the complex systems of the internet economy.

References

[1]
2015. ICDM 2015: Drawbridge Cross-Device Connections. (Aug. 2015). http: //www.kaggle.com/c/icdm-2015-drawbridge-cross-device-connections
[2]
2016. CIKM Cup 2016 Track 1: Cross-Device Entity Linking Challenge. (Dec. 2016). http://competitions.codalab.org/competitions/11171
[3]
Alessandro Acquisti, Curtis Taylor, and Liad Wagman. 2016. The economics of privacy. Journal of Economic Literature 54, 2 (2016), 442--92.
[4]
Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008.
[5]
L. Bottou, J. Peters, J. Quiñonero-Candela, D. X. Charles, D. M. Chickering, E. Portugaly, D. Ray, P. Simard, and E. Snelson. 2012. Counterfactual Reasoning and Learning Systems. ArXiv e-prints (Sept. 2012). arXiv:cs.LG/1209.2355
[6]
Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5--32.
[7]
Xuezhi Cao, Weiyue Huang, and Yong Yu. 2015. Recovering cross-device connections via mining IP footprints with ensemble learning. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1681--1686.
[8]
Yun Chi, Xiaodan Song, Dengyong Zhou, Koji Hino, and Belle L Tseng. 2007. Evolutionary spectral clustering by incorporating temporal smoothness. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 153--162.
[9]
Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding community structure in very large networks. Physical review E 70, 6 (2004), 066111.
[10]
A. DasGupta. 2008. Asymptotic Theory of Statistics and Probability. Springer New York.
[11]
Fabrício Olivetti de França and Guilherme Palermo Coelho. 2015. A flexible fitness function for community detection in complex networks. In Complex Networks VI. Springer, 1--12.
[12]
Roberto Díaz-Morales. 2015. Cross-device tracking: Matching devices and cookies. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1699--1704.
[13]
Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3--5 (2010), 75--174.
[14]
Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232.
[15]
Alexandre Gilotte, Clément Calauzènes, Thomas Nedelec, Alexandre Abraham, and Simon Dollé. 2018. Offline A/B testing for Recommender Systems. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 198--206.
[16]
Palash Goyal and Emilio Ferrara. 2018. Graph embedding techniques, applications, and performance: A survey. Knowledge-Based Systems 151 (2018), 78--94.
[17]
Devin Guan, Xiang Li, Randy Cotta, Rahul Bafna, and Obuli Venkatesan. 2016. System to group internet devices based upon device usage. (Dec. 6 2016). US Patent 9,514,248.
[18]
Keisuke Hirano, Guido W Imbens, and Geert Ridder. 2003. Efficient estimation of average treatment effects using the estimated propensity score. Econometrica 71, 4 (2003), 1161--1189.
[19]
Daniel G Horvitz and Donovan J Thompson. 1952. A generalization of sampling without replacement from a finite universe. Journal of the American statistical Association 47, 260 (1952), 663--685.
[20]
Nan Jiang and Lihong Li. 2016. Doubly Robust Off-policy Value Evaluation for Reinforcement Learning. In International Conference on Machine Learning. 652--661.
[21]
Thorsten Joachims and Adith Swaminathan. 2016. Counterfactual Evaluation and Learning for Search, Recommendation and Ad Placement. In Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '16). ACM, New York, NY, USA, 1199--1201.
[22]
Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. LightGBM: A highly efficient gradient boosting decision tree. In Advances in Neural Information Processing Systems. 3149--3157.
[23]
Girma Kejela and Chunming Rong. 2015. Cross-device consumer identification. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1687--1689.
[24]
Jay P Kesan, Carol M Hayes, and Masooda N Bashir. 2015. A comprehensive empirical study of data privacy, trust, and consumer autonomy. Ind. LJ 91 (2015), 267.
[25]
Michael Sungjun Kim, Jiwei Liu, XiaozhouWang, andWei Yang. 2015. Connecting devices to cookies via filtering, feature engineering, and boosting. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1690--1694.
[26]
Ron Kohavi, Alex Deng, Brian Frasca, Roger Longbotham, Toby Walker, and Ya Xu. 2012. Trustworthy online controlled experiments: Five puzzling outcomes explained. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 786--794.
[27]
Andrea Lancichinetti, Santo Fortunato, and János Kertész. 2009. Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics 11, 3 (2009), 033015.
[28]
Andrea Lancichinetti, Filippo Radicchi, José J Ramasco, and Santo Fortunato. 2011. Finding statistically significant communities in networks. PloS one 6, 4 (2011), e18961.
[29]
Susan Landau. 2015. Control use of data to protect privacy. Science 347, 6221 (2015), 504--506.
[30]
Mark Landry, Robert Chong, et al. 2015. Multi-layer classification: ICDM 2015 drawbridge cross-device connections competition. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1695--1698.
[31]
Lihong Li. 2015. Offline evaluation and optimization for interactive systems. (2015).
[32]
Lihong Li, Jin Young Kim, and Imed Zitouni. 2015. Toward predicting the outcome of an A/B experiment for search relevance. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining. ACM, 37--46.
[33]
Jianxun Lian and Xing Xie. 2016. Cross-device user matching based on massive browse logs: The runner-up solution for the 2016 CIKM Cup. arXiv preprint arXiv:1610.03928 (2016).
[34]
Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze. 2008. Introduction to Information Retrieval. Cambridge University Press.
[35]
Mark EJ Newman. 2003. The structure and function of complex networks. SIAM review 45, 2 (2003), 167--256.
[36]
Mark EJ Newman. 2006. Modularity and community structure in networks. Proceedings of the national academy of sciences 103, 23 (2006), 8577--8582.
[37]
Judea Pearl. 1998. Graphs, causality, and structural equation models. Sociological Methods & Research 27, 2 (1998), 226--284.
[38]
Judea Pearl. 2009. Causality. Cambridge university press.
[39]
Minh C Phan, Aixin Sun, and Yi Tay. 2017. Cross-device user linking: url, session, visiting time, and device-log embedding. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 933--936.
[40]
Minh C Phan, Yi Tay, and Tuan-Anh Nguyen Pham. 2016. Cross device matching for online advertising with neural feature ensembles: First place solution at CIKM Cup 2016. arXiv preprint arXiv:1610.07119 (2016).
[41]
Doina Precup, Richard S Sutton, and Satinder P Singh. 2000. Eligibility Traces for Off-Policy Policy Evaluation. In ICML. Citeseer, 759--766.
[42]
Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 (2007), 036106.
[43]
Satu Elisa Schaeffer. 2005. Stochastic local clustering for massive graphs. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 354-- 360.
[44]
Lars Ropeid Selsaas, Bikash Agrawal, Chumming Rong, and Thomasz Wiktorski. 2015. AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1705--1709.
[45]
Ugo Tanielian, Anne-Marie Tousch, and Flavian Vasile. 2018. Siamese Cookie Embedding Networks for Cross-Device User Matching. arXiv preprint arXiv:1803.10450 (2018).
[46]
Nam Khanh Tran. 2016. Classification and Learning-to-rank Approaches for Cross-Device Matching at CIKM Cup 2016. arXiv preprint arXiv:1612.07117 (2016).
[47]
Elena Volkova. 2017. Cross-device tracking with machine learning. Master's thesis.
[48]
Jeremy Walthers. 2015. Learning to rank for cross-device identification. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference on. IEEE, 1710-- 1712.
[49]
Sewall Wright. 1921. Correlation and causation. Journal of agricultural research 20, 7 (1921), 557--585.

Cited By

View all
  • (2024)Exploring the Landscape of Recommender Systems Evaluation: Practices and PerspectivesACM Transactions on Recommender Systems10.1145/36291702:1(1-31)Online publication date: 7-Mar-2024
  • (2022)Scalable Safety-Critical Policy Evaluation with Accelerated Rare Event Sampling2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)10.1109/IROS47612.2022.9981867(12919-12926)Online publication date: 23-Oct-2022
  • (2021)Interactive Audience Expansion On Large Scale Online Visitor DataProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467179(2621-2631)Online publication date: 14-Aug-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WSDM '19: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining
January 2019
874 pages
ISBN:9781450359405
DOI:10.1145/3289600
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. entity resolution
  2. identity management
  3. marketing and advertising
  4. off-policy evaluation
  5. user modeling and recommendation systems

Qualifiers

  • Research-article

Conference

WSDM '19

Acceptance Rates

WSDM '19 Paper Acceptance Rate 84 of 511 submissions, 16%;
Overall Acceptance Rate 498 of 2,863 submissions, 17%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)78
  • Downloads (Last 6 weeks)17
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring the Landscape of Recommender Systems Evaluation: Practices and PerspectivesACM Transactions on Recommender Systems10.1145/36291702:1(1-31)Online publication date: 7-Mar-2024
  • (2022)Scalable Safety-Critical Policy Evaluation with Accelerated Rare Event Sampling2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)10.1109/IROS47612.2022.9981867(12919-12926)Online publication date: 23-Oct-2022
  • (2021)Interactive Audience Expansion On Large Scale Online Visitor DataProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467179(2621-2631)Online publication date: 14-Aug-2021
  • (2021)Customer Lookalike Modeling: A Study of Machine Learning Techniques for Customer Lookalike ModelingIntelligent Data Communication Technologies and Internet of Things10.1007/978-981-15-9509-7_18(211-222)Online publication date: 13-Feb-2021
  • (undefined)Lookalike Targeting on Others' Journeys: Brand Versus Performance MarketingSSRN Electronic Journal10.2139/ssrn.3927976

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media