-
1
-
-
85199473276
-
-
Shopzilla, inc. privacy policy. 2014. http://about.bizrate.com/privacy-policy.
-
(2014)
-
-
-
2
-
-
80255122829
-
Privacy and security issues in e-commerce
-
Academic Press/ Elsevier
-
M. S. Ackerman and D. T. Davis Jr. Privacy and security issues in e-commerce. In New Economy Handbook, pages 911-930. Academic Press/ Elsevier, 2003.
-
(2003)
In New Economy Handbook
, pp. 911-930
-
-
Ackerman, M.S.1
Davis, D.T.2
-
4
-
-
1242263708
-
Personalization of web services: opportunities and challenges
-
In Ariadne Journal
-
M. Bonett. Personalization of web services: opportunities and challenges. In Ariadne Journal, 2001.
-
(2001)
-
-
Bonett, M.1
-
5
-
-
84920484024
-
Hyrec: Leveraging browsers for scalable recommenders
-
In MIDDLEWARE
-
A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, and R. Patra. Hyrec: Leveraging browsers for scalable recommenders. pages 85-96. In MIDDLEWARE, 2014.
-
(2014)
, pp. 85-96
-
-
Boutet, A.1
Frey, D.2
Guerraoui, R.3
Kermarrec, A.-M.4
Patra, R.5
-
6
-
-
78649914423
-
Performance of recommender algorithms on top-n recommendation tasks
-
P. Cremonesi, Y. Koren, and R. Turrin. Performance of recommender algorithms on top-n recommendation tasks. pages 39-46. In RecSys, 2010.
-
(2010)
In RecSys
, pp. 39-46
-
-
Cremonesi, P.1
Koren, Y.2
Turrin, R.3
-
7
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. pages 1-12. In ICALP, 2006.
-
(2006)
In ICALP
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
70350682013
-
Differential privacy and robust statistics
-
C. Dwork and J. Lei. Differential privacy and robust statistics. pages 371-380. In STOC, 2009.
-
(2009)
In STOC
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
9
-
-
77956195013
-
Data mining with differential privacy
-
A. Friedman and A. Schuster. Data mining with differential privacy. pages 493-502. In SIGKDD, 2010.
-
(2010)
In SIGKDD
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
10
-
-
78649970493
-
Beyond accuracy: evaluating recommender systems by coverage and serendipity
-
M. Ge, C. Delgado-Battenfeld, and D. Jannach. Beyond accuracy: evaluating recommender systems by coverage and serendipity. pages 257-260. In RECSYS, 2010.
-
(2010)
In RECSYS
, pp. 257-260
-
-
Ge, M.1
Delgado-Battenfeld, C.2
Jannach, D.3
-
11
-
-
77957333585
-
Nsa.s domestic spying grows as agency sweeps up data
-
S. Gorman. Nsa.s domestic spying grows as agency sweeps up data. In The Wall Street Journal, 2008.
-
(2008)
In The Wall Street Journal
-
-
Gorman, S.1
-
14
-
-
85199461361
-
-
Jester, Online Joke Recommender System and Dataset, 2001.
-
(2001)
-
-
-
15
-
-
79960379430
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? pages 793-826. In SIAM, 2011.
-
(2011)
In SIAM
, pp. 793-826
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
16
-
-
49049091204
-
Privacy-preserving recommendation systems for consumer healthcare services
-
S. Katzenbeisser and M. Petkovic. Privacy-preserving recommendation systems for consumer healthcare services. pages 889-895. In ARES, 2008.
-
(2008)
In ARES
, pp. 889-895
-
-
Katzenbeisser, S.1
Petkovic, M.2
-
17
-
-
84858702721
-
Recommender systems: from algorithms to user experience
-
J. A. Konstan and J. Riedl. Recommender systems: from algorithms to user experience. pages 101-123. In UMUAI, 2012.
-
(2012)
In UMUAI
, pp. 101-123
-
-
Konstan, J.A.1
Riedl, J.2
-
18
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
Y. Koren, R. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. pages 30-37. In IEEE Computer Journal, 2009.
-
(2009)
In IEEE Computer Journal
, pp. 30-37
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
19
-
-
84868344726
-
Willing to pay for quality personalization? trade-off between quality and privacy
-
T. Li and T. Unger. Willing to pay for quality personalization? trade-off between quality and privacy. pages 621-642. In European Journal of Information Systems, 2012.
-
(2012)
In European Journal of Information Systems
, pp. 621-642
-
-
Li, T.1
Unger, T.2
-
20
-
-
77950219954
-
A privacy-preserving book recommendation model based on multi-agent
-
Y. Luo, J. Le, and H. Chen. A privacy-preserving book recommendation model based on multi-agent. pages 323-327. In WCSE, 2009.
-
(2009)
In WCSE
, pp. 323-327
-
-
Luo, Y.1
Le, J.2
Chen, H.3
-
21
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the net
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the net. pages 627-636. In SIGKDD, 2009.
-
(2009)
In SIGKDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
22
-
-
0033653019
-
Content-based book recommending using learning for text categorization
-
R. J. Mooney and L. Roy. Content-based book recommending using learning for text categorization. pages 195-204. In JCDL, 2000.
-
(2000)
In JCDL
, pp. 195-204
-
-
Mooney, R.J.1
Roy, L.2
-
23
-
-
85199420456
-
-
MovieLens dataset, 2003. http://grouplens.org/datasets/movielens/.
-
(2003)
-
-
-
24
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. pages 111-125. In SP, 2008.
-
(2008)
In SP
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
25
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM, 2003.
-
(2003)
In ICDM
-
-
Polat, H.1
Du, W.2
-
26
-
-
84860577617
-
Madlinq: large-scale distributed matrix computation for the cloud
-
Z. Qian, X. Chen, N. Kang, M. Chen, Y. Yu, T. Moscibroda, and Z. Zhang. Madlinq: large-scale distributed matrix computation for the cloud. pages 197-210. In EUROSYS, 2012.
-
(2012)
In EUROSYS
, pp. 197-210
-
-
Qian, Z.1
Chen, X.2
Kang, N.3
Chen, M.4
Yu, Y.5
Moscibroda, T.6
Zhang, Z.7
-
27
-
-
0035509452
-
Privacy risks in recommender systems
-
N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis. Privacy risks in recommender systems. pages 54-62. In Internet Computing, 2001.
-
(2001)
In Internet Computing
, pp. 54-62
-
-
Ramakrishnan, N.1
Keller, B.J.2
Mirza, B.J.3
Grama, A.Y.4
Karypis, G.5
-
28
-
-
0036384150
-
Getting to know you: learning new user preferences in recommender systems
-
A. M. Rashid, I. Albert, D. Cosley, S. K. Lam, S. M. McNee, J. A. Konstan, and J. Riedl. Getting to know you: learning new user preferences in recommender systems. pages 127-134. In IUI, 2002.
-
(2002)
In IUI
, pp. 127-134
-
-
Rashid, A.M.1
Albert, I.2
Cosley, D.3
Lam, S.K.4
McNee, S.M.5
Konstan, J.A.6
Riedl, J.7
-
29
-
-
85052617391
-
Item-based collaborative filtering recommendation algorithms
-
B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. pages 285-295. In WWW, 2001.
-
(2001)
In WWW
, pp. 285-295
-
-
Sarwar, B.1
Karypis, G.2
Konstan, J.3
Riedl, J.4
-
30
-
-
84959075275
-
Setting goals and choosing metrics for recommender system evaluations
-
G. Schröder, M. Thiele, and W. Lehner. Setting goals and choosing metrics for recommender system evaluations. In UCERSTI 2, 2011.
-
(2011)
In UCERSTI
, vol.2
-
-
Schröder, G.1
Thiele, M.2
Lehner, W.3
-
31
-
-
77954418047
-
A survey of collaborative filtering techniques
-
X. Su and T. M. Khoshgoftaar. A survey of collaborative filtering techniques. page 4. In AAI, 2009.
-
(2009)
In AAI
, pp. 4
-
-
Su, X.1
Khoshgoftaar, T.M.2
-
32
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
M. Van Dijk and A. Juels. On the impossibility of cryptography alone for privacy-preserving cloud computing. pages 1-8. In HotSec, 2010.
-
(2010)
In HotSec
, pp. 1-8
-
-
Van Dijk, M.1
Juels, A.2
-
34
-
-
33745432713
-
Deriving private information from randomly perturbed ratings
-
S. Zhang, J. Ford, and F. Makedon. Deriving private information from randomly perturbed ratings. pages 59-69. In SIAM, 2006.
-
(2006)
In SIAM
, pp. 59-69
-
-
Zhang, S.1
Ford, J.2
Makedon, F.3
|