-
1
-
-
84864757137
-
-
[Online]. Available
-
"Amazon.com." [Online]. Available: http://www.amazon.com
-
-
-
-
2
-
-
84864767747
-
-
[Online]. Available
-
"Movielens." [Online]. Available: http://movielens.umn.edu
-
-
-
-
3
-
-
84864749035
-
-
[Online]. Available
-
"Netflix." [Online]. Available: http://www.netflix.com
-
-
-
-
4
-
-
84864749036
-
-
[Online]. Available
-
"Digg." [Online]. Available: http://digg.com
-
-
-
-
6
-
-
84976668719
-
Using collaborative filtering to weave an information tapestry
-
D. Goldberg, D. Nichols, B. M. Oki, and D. Terry, "Using collaborative filtering to weave an information tapestry," Commun. ACM, vol. 35, no. 12, pp. 61-70, Dec. 1992.
-
(1992)
Commun. ACM
, vol.35
, Issue.12
, pp. 61-70
-
-
Goldberg, D.1
Nichols, D.2
Oki, B.M.3
Terry, D.4
-
7
-
-
77954418047
-
A survey of collaborative filtering techniques
-
X. Su and T. M. Khoshgoftaar, "A survey of collaborative filtering techniques," Adv. Artif. Intell., vol. 2009, Jan. 2009.
-
(2009)
Adv. Artif. Intell.
, vol.2009
-
-
Su, X.1
Khoshgoftaar, T.M.2
-
8
-
-
1642301688
-
"I didn't buy it for myself". Privacy and e-commerce personalization
-
Washington, DC
-
L. F. Cranor, ""I didn't buy it for myself". Privacy and e-commerce personalization," in Proc. Workshop Priv. Electron. Society, Washington, DC, 2003, pp. 111-117.
-
(2003)
Proc. Workshop Priv. Electron. Society
, pp. 111-117
-
-
Cranor, L.F.1
-
9
-
-
84864751602
-
If TiVo thinks you are gay, here's how to set it straight
-
[Online]. Available
-
J. Zaslow, "If TiVo thinks you are gay, here's how to set it straight," Nov. 2002. [Online]. Available: http://online.wsj.com/article_email/SB1038261936872356908.html
-
(2002)
-
-
Zaslow, J.1
-
10
-
-
0041540817
-
Building consumer trust online
-
D. L. Hoffman, T. P. Novak, and M. Peralta, "Building consumer trust online," Commun. ACM, vol. 42, no. 4, pp. 80-85, Apr. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.4
, pp. 80-85
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.3
-
11
-
-
77955802941
-
Optimal query forgery for private information retrieval
-
D. Rebollo-Monedero and J. Forńe, "Optimal query forgery for private information retrieval," IEEE Trans. Inform. Theory, vol. 56, no. 9, pp. 4631-4642, 2010
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forńe, J.2
-
12
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
IEEE Comput. Soc.
-
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in Proc. SIAM Int. Conf. Data Min. (SDM). IEEE Comput. Soc., 2003.
-
(2003)
Proc. SIAM Int. Conf. Data Min. (SDM)
-
-
Polat, H.1
Du, W.2
-
13
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Washington, DC: IEEE Comput. Soc.
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. IEEE Int. Conf. Data Min. (ICDM). Washington, DC: IEEE Comput. Soc., 2003, pp. 99-106
-
(2003)
Proc. IEEE Int. Conf. Data Min. (ICDM)
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
14
-
-
29844458622
-
Deriving private information from randomized data
-
ACM
-
Z. Huang, W. Du, and B. Chen, "Deriving private information from randomized data," in Proc. ACM SIGMOD Int. Conf. Manage. Data. ACM, 2005, pp. 37-48.
-
(2005)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
16
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, CA
-
D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Santa Barbara, CA, 2001, pp. 247-255.
-
(2001)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
17
-
-
84864767745
-
Jester: The online joke recommender
-
[Online]. Available
-
"Jester: The online joke recommender." [Online]. Available: http://eigentaste.berkeley.edu/
-
-
-
-
18
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
Tampere, Finland: ACM
-
J. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval. Tampere, Finland: ACM, 2002, pp. 238-245.
-
(2002)
Proc. ACM SIGIR Conf. Res., Develop. Inform. Retrieval.
, pp. 238-245
-
-
Canny, J.1
-
20
-
-
46749120260
-
An architecture for privacy preserving collaborative filtering on web portals
-
Washington, DC: IEEE Comput. Soc.
-
W. Ahmad and A. Khokhar, "An architecture for privacy preserving collaborative filtering on web portals," in Proc. IEEE Int. Symp. Inform. Assurance, Secur. (IAS). Washington, DC: IEEE Comput. Soc., 2007, pp. 273-278.
-
(2007)
Proc. IEEE Int. Symp. Inform. Assurance, Secur. (IAS)
, pp. 273-278
-
-
Ahmad, W.1
Khokhar, A.2
-
21
-
-
77953721873
-
Privacy-preserving collaborative recommender systems
-
J. Zhan, C. L. Hsieh, I. C. Wang, T. S. Hsu, C. J. Liau, and D. W. Wang, "Privacy-preserving collaborative recommender systems," IEEE Trans. Syst. Man, Cybern., vol. 40, no. 4, pp. 472-476, Jul. 2010
-
(2010)
IEEE Trans. Syst. Man, Cybern.
, vol.40
, Issue.4
, pp. 472-476
-
-
Zhan, J.1
Hsieh, C.L.2
Wang, I.C.3
Hsu, T.S.4
Liau, C.J.5
Wang, D.W.6
-
22
-
-
3843049042
-
Pocketlens: Toward a personal recom-mender system
-
B. Miller, N. Bradley, and J. A. K. J. Riedl, "Pocketlens: Toward a personal recom-mender system," ACM Trans. Inform. Syst., vol. 22, no. 3, pp. 437-476, Jul. 2004.
-
(2004)
ACM Trans. Inform. Syst.
, vol.22
, Issue.3
, pp. 437-476
-
-
Miller, B.1
Bradley, N.2
Riedl, J.A.K.J.3
-
23
-
-
42149131542
-
Enhancing privacy and preserving accuracy of a distributed collaborative filtering
-
ACM
-
S. Berkovsky, Y. Eytani, T. Kuflik, and F. Ricci, "Enhancing privacy and preserving accuracy of a distributed collaborative filtering," in Proc. ACM Conf. Recommender Syst. (RecSys). ACM, 2007, pp. 9-16.
-
(2007)
Proc. ACM Conf. Recommender Syst. (RecSys)
, pp. 9-16
-
-
Berkovsky, S.1
Eytani, Y.2
Kuflik, T.3
Ricci, F.4
-
24
-
-
0003483188
-
Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression," SRI Int., Tech. Rep., 1998.
-
(1998)
SRI Int., Tech. Rep.
-
-
Samarati, P.1
Sweeney, L.2
-
25
-
-
72849133477
-
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
-
X. Sun, H. Wang, J. Li, and T. M. Truta, "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing," Trans. Data Priv., vol. 1, no. 2, pp. 53-66, 2008.
-
(2008)
Trans. Data Priv.
, vol.1
, Issue.2
, pp. 53-66
-
-
Sun, X.1
Wang, H.2
Li, J.3
Truta, T.M.4
-
26
-
-
84990966245
-
Privacy protection: p-sensitive k-anonymity property
-
Atlanta, GA
-
T. M. Truta and B. Vinay, "Privacy protection: p-sensitive k-anonymity property," in Proc. Int. Workshop Priv. Data Manage. (PDM), Atlanta, GA, 2006, p. 94.
-
(2006)
Proc. Int. Workshop Priv. Data Manage. (PDM)
, pp. 94
-
-
Truta, T.M.1
Vinay, B.2
-
27
-
-
33749607006
-
l-Diversity: Privacy beyond k-anonymity
-
Atlanta, GA
-
A. Machanavajjhala, J. Gehrke, D. Kiefer, and M. Venkitasubramanian, "l-Diversity: Privacy beyond k-anonymity," in Proc. IEEE Int. Conf. Data Eng. (ICDE), Atlanta, GA, Apr. 2006, p. 24.
-
(2006)
Proc. IEEE Int. Conf. Data Eng. (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kiefer, D.3
Venkitasubramanian, M.4
-
28
-
-
51749087499
-
An improved V-MDAV algorithm for l-diversity
-
Moscow, Russia
-
H. Jian-min, C. Ting-ting, and Y. Hui-qun, "An improved V-MDAV algorithm for l-diversity," in Proc. IEEE Int. Symp. Inform. Process. (ISIP), Moscow, Russia, May 2008, pp. 733-739.
-
(2008)
Proc. IEEE Int. Symp. Inform. Process. (ISIP)
, pp. 733-739
-
-
Jian-min, H.1
Ting-ting, C.2
Hui-qun, Y.3
-
29
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
Barcelona, Spain
-
J. Domingo-Ferrer and V. Torra, "A critique of k-anonymity and some of its enhancements," in Proc. Workshop Priv., Secur., Artif. Intell. (PSAI), Barcelona, Spain, 2008, pp. 990-993.
-
(2008)
Proc. Workshop Priv., Secur., Artif. Intell. (PSAI)
, pp. 990-993
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
30
-
-
34548805858
-
t-Closeness: Privacy beyond k-anonymity and l-diversity
-
Istanbul, Turkey
-
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy beyond k-anonymity and l-diversity," in Proc. IEEE Int. Conf. Data Eng. (ICDE), Istanbul, Turkey, Apr. 2007, pp. 106-115.
-
(2007)
Proc. IEEE Int. Conf. Data Eng. (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
31
-
-
56749173427
-
From t-closeness to PRAM and noise addition via information theory
-
ser. Lecture Notes Comput. Sci. (LNCS). Istambul, Turkey: Springer-Verlag
-
D. Rebollo-Monedero, J. Forńe, and J. Domingo-Ferrer, "From t-closeness to PRAM and noise addition via information theory," in Priv. Stat. Databases (PSD), ser. Lecture Notes Comput. Sci. (LNCS). Istambul, Turkey: Springer-Verlag, Sep. 2008, pp. 100-112.
-
(2008)
Priv. Stat. Databases (PSD)
, pp. 100-112
-
-
Rebollo-Monedero, D.1
Forńe, J.2
Domingo-Ferrer, J.3
-
32
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
[Online]. Available:
-
D. Rebollo-Monedero, J. Forńe, and J. Domingo-Ferrer, "From t-closeness-like privacy to postrandomization via information theory," IEEE Trans. Knowl. Data Eng., vol. 22, no. 11, pp. 1623-1636, Nov. 2010. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.190
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forńe, J.2
Domingo-Ferrer, J.3
-
33
-
-
84957800033
-
Towards measuring anonymity
-
ser. Lecture Notes Comput. Sci. (LNCS), vol. 2482. Springer-Verlag
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proc. Workshop Priv. Enhanc. Technol. (PET), ser. Lecture Notes Comput. Sci. (LNCS), vol. 2482. Springer-Verlag, Apr. 2002, pp. 54-68.
-
(2002)
Proc. Workshop Priv. Enhanc. Technol. (PET)
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
34
-
-
33947365689
-
Anonymity and privacy in electronic services
-
Ph.D. dissertation, Katholieke Univ. Leuven
-
C. Díaz, "Anonymity and privacy in electronic services," Ph.D. dissertation, Katholieke Univ. Leuven, Dec. 2005.
-
(2005)
-
-
Díaz, C.1
-
35
-
-
78049382830
-
A privacy-preserving architecture for the semantic web based on tag suppression
-
Bilbao, Spain
-
J. Parra-Arnau, D. Rebollo-Monedero, and J. Forńe, "A privacy-preserving architecture for the semantic web based on tag suppression," in Proc. Int. Conf. Trust, Priv., Secur., Digit. Bus. (TRUSTBUS), Bilbao, Spain, Aug. 2010, pp. 58-68.
-
(2010)
Proc. Int. Conf. Trust, Priv., Secur., Digit. Bus. (TRUSTBUS)
, pp. 58-68
-
-
Parra-Arnau, J.1
Rebollo-Monedero, D.2
Forńe, J.3
-
37
-
-
56349111434
-
The SPARTA pseudonym and authorization system
-
G. Bianchi, M. Bonola, V. Falletta, F. S. Proto, and S. Teofili, "The SPARTA pseudonym and authorization system," Sci. Comput. Program., vol. 74, no. 1-2, pp. 23-33, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, Issue.1-2
, pp. 23-33
-
-
Bianchi, G.1
Bonola, M.2
Falletta, V.3
Proto, F.S.4
Teofili, S.5
-
38
-
-
33644989680
-
Specification of a framework for the anonymous use of privileges
-
V. Benjumea, J. Ĺopez, and J. M. T. Linero, "Specification of a framework for the anonymous use of privileges," Telemat., Informat., vol. 23, no. 3, pp. 179-195, Aug. 2006.
-
(2006)
Telemat., Informat.
, vol.23
, Issue.3
, pp. 179-195
-
-
Benjumea, V.1
Ĺopez, J.2
Linero, J.M.T.3
-
39
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas, "Adnostic: Privacy preserving targeted advertising," in Proc. IEEE Symp. Netw. Distrib. Syst. Secur. (SNDSS), 2010, pp. 1-21.
-
(2010)
Proc. IEEE Symp. Netw. Distrib. Syst. Secur. (SNDSS)
, pp. 1-21
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
41
-
-
78049406696
-
Coprivacy: Towards a theory of sustainable privacy
-
ser. Lecture Notes Comput. Sci. (LNCS), vol. 6344. Corfu, Greece: Springer-Verlag
-
J. Domingo-Ferrer, "Coprivacy: Towards a theory of sustainable privacy," in Priv. Stat. Databases (PSD), ser. Lecture Notes Comput. Sci. (LNCS), vol. 6344. Corfu, Greece: Springer-Verlag, Sep. 2010, pp. 258-268.
-
(2010)
Priv. Stat. Databases (PSD)
, pp. 258-268
-
-
Domingo-Ferrer, J.1
-
42
-
-
0016572913
-
A vector space model for automatic indexing
-
G. Salton, A. Wong, and C. S. Yang, "A vector space model for automatic indexing," Commun. ACM, vol. 18, no. 11, pp. 613-620, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.11
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.S.3
-
43
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Trans. Knowl. Data Eng., vol. 17, no. 6, pp. 734-749, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
44
-
-
0020187981
-
On the rationale of maximum-entropy methods
-
E. T. Jaynes, "On the rationale of maximum-entropy methods," Proc. IEEE, vol. 70, no. 9, pp. 939-952, Sep. 1982.
-
(1982)
Proc. IEEE
, vol.70
, Issue.9
, pp. 939-952
-
-
Jaynes, E.T.1
-
47
-
-
0004147631
-
Maximum entropy spectral analysis
-
Ph.D. dissertation, Stanford Univ
-
J. P. Burg, "Maximum entropy spectral analysis," Ph.D. dissertation, Stanford Univ., 1975.
-
(1975)
-
-
Burg, J.P.1
-
48
-
-
0002652285
-
A maximum entropy approach to natural language processing
-
A. L. Berger, J. della Pietra, and A. della Pietra, "A maximum entropy approach to natural language processing," MIT Comput. Ling., vol. 22, no. 1, pp. 39-71, Mar. 1996.
-
(1996)
MIT Comput. Ling.
, vol.22
, Issue.1
, pp. 39-71
-
-
Berger, A.L.1
della Pietra, J.2
Della Pietra, A.3
-
49
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst., Tech. J., 1949.
-
(1949)
Bell Syst., Tech. J.
-
-
Shannon, C.E.1
-
51
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csisźar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csisźar, I.1
K̈orner, J.2
-
52
-
-
11944275853
-
Information theory and statistical mechanics II
-
E. T. Jaynes, "Information theory and statistical mechanics II," Phys. Review Ser. II, vol. 108, no. 2, pp. 171-190, 1957.
-
(1957)
Phys. Review Ser. II
, vol.108
, Issue.2
, pp. 171-190
-
-
Jaynes, E.T.1
|