-
1
-
-
49049090069
-
Hierarchical neighborhood topology for privacy enhanced collaborative filtering
-
Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Hierarchical neighborhood topology for privacy enhanced collaborative filtering. In: Proceedings of Workshop on Privacy-Enhanced Personalization, PEP 2006, Montreal, Canada, pp. 6–13 (2006)
-
(2006)
Proceedings of Workshop on Privacy-Enhanced Personalization, PEP 2006, Montreal, Canada
, pp. 6-13
-
-
Berkovsky, S.1
Eytani, Y.2
Kuflik, T.3
Ricci, F.4
-
2
-
-
84855897737
-
The impact of data obfuscation on the accuracy of collaborative filtering
-
Berkovsky, S., Kuflik, T., Ricci, F.: The impact of data obfuscation on the accuracy of collaborative filtering. Expert Systems with Applications 39(5), 5033–5042 (2012)
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.5
, pp. 5033-5042
-
-
Berkovsky, S.1
Kuflik, T.2
Ricci, F.3
-
3
-
-
84962877670
-
Applying differential privacy to matrix factorization
-
Berlioz, A., Friedman, A., Kâafar, M.A., Boreli, R., Berkovsky, S.: Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM Conference on Recommender Systems, RecSys 2015, Vienna, Austria, pp. 107–114 (2015). doi:10.1145/2792838.2800173
-
(2015)
Proceedings of the 9th ACM Conference on Recommender Systems, RecSys 2015, Vienna, Austria
, pp. 107-114
-
-
Berlioz, A.1
Friedman, A.2
Kâafar, M.A.3
Boreli, R.4
Berkovsky, S.5
-
4
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
Bhaskar, R., Laxman, S., Smith, A.D., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, Washington, DC, USA, pp. 503–512 (2010). doi:10.1145/1835804.1835869
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, Washington, DC, USA
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.D.3
Thakurta, A.4
-
5
-
-
84891705908
-
Robustness analysis of privacy-preserving model-based recommendation schemes
-
Bilge, A., Gunes, I., Polat, H.: Robustness analysis of privacy-preserving model-based recommendation schemes. Expert Systems With Applications 41(8), 3671–3681 (2014)
-
(2014)
Expert Systems With Applications
, vol.41
, Issue.8
, pp. 3671-3681
-
-
Bilge, A.1
Gunes, I.2
Polat, H.3
-
6
-
-
80051990341
-
Shmatikov, V.: “You Might Also Like”: Privacy risks of collaborative filtering
-
Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: “You Might Also Like”: Privacy risks of collaborative filtering. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy, S&P 2011, Berkeley, CA, USA, pp. 231–246 (2011). doi:10.1109/SP.2011.40
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy, S&P 2011, Berkeley, CA, USA
, pp. 231-246
-
-
Calandrino, J.A.1
Kilzer, A.2
Narayanan, A.3
Felten, E.W.4
-
7
-
-
0036082701
-
Collaborative filtering with privacy
-
Canny, J.F.: Collaborative filtering with privacy. In: Proceedings of the 23rd IEEE Symposium on Security and Privacy, S&P 2002, Berkeley, CA, USA, pp. 45–57 (2002). doi:10.1109/SECPRI.2002.1004361
-
(2002)
Proceedings of the 23rd IEEE Symposium on Security and Privacy, S&P 2002, Berkeley, CA, USA
, pp. 45-57
-
-
Canny, J.F.1
-
8
-
-
79955858775
-
Differentially private empirical risk minimization
-
Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. Journal of Machine Learning Research 12, 1069–1109 (2011)
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
9
-
-
74949132495
-
Trading robustness for privacy in decentralized recommender systems
-
Pasadena, CA, USA
-
Cheng, Z., Hurley, N.: Trading robustness for privacy in decentralized recommender systems. In: Proceedings of the 21st Conference on Innovative Applications of Artificial Intelligence, IAAI 2009, Pasadena, CA, USA (2009)
-
(2009)
Proceedings of the 21st Conference on Innovative Applications of Artificial Intelligence, IAAI
, pp. 2009
-
-
Cheng, Z.1
Hurley, N.2
-
10
-
-
70349305273
-
-
Dwork, C.: Differential privacy: A survey of results. In: Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, TAMC 2008, Xi’an, China, pp. 1–19
-
Dwork, C.: Differential privacy: A survey of results. In: Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, TAMC 2008, Xi’an, China, pp. 1–19 (2008). doi:10.1007/978-3-540-79228-4_1
-
(2008)
-
-
-
11
-
-
84939616621
-
Differential privacy – a primer for the preplexed
-
Tarragona, Spain
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Differential privacy – a primer for the preplexed. In: Joint UNECE/Eurostat work session on statistical data confidentiality. Tarragona, Spain (2011)
-
(2011)
Joint UNECE/Eurostat work session on statistical data confidentiality
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
33745556605
-
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.D.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference, TCC 2006, New York, NY, USA, pp. 265–284
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.D.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference, TCC 2006, New York, NY, USA, pp. 265–284 (2006). doi:10.1007/11681878_14
-
(2006)
-
-
-
13
-
-
84910685712
-
RAPPOR: Randomized aggregatable privacy-preserving ordinal response
-
Erlingsson, Ú., Pihur, V., Korolova, A.: RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, Scottsdale, AZ, USA, pp. 1054–1067 (2014). doi:10.1145/2660267.2660348
-
(2014)
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, Scottsdale, AZ, USA
, pp. 1054-1067
-
-
Erlingsson, Ú.1
Pihur, V.2
Korolova, A.3
-
14
-
-
84956759912
-
Privacy aspects of recommender systems
-
Springer
-
Friedman, A., Knijnenburg, B., Vanhecke, K., Martens, L., Berkovsky, S.: Privacy aspects of recommender systems. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook, pp. 649–688. Springer, (2015)
-
(2015)
Ricci, F., Rokach, L., Shapira, B
, pp. 649-688
-
-
Friedman, A.1
Knijnenburg, B.2
Vanhecke, K.3
Martens, L.4
Berkovsky, S.5
Handbook, R.S.6
-
15
-
-
77956195013
-
Data mining with differential privacy
-
Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, Washington, DC, USA, pp. 493–502 (2010). doi:10.1145/1835804.1835868
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, Washington, DC, USA
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
16
-
-
77954711905
-
On the geometry of differential privacy
-
Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, MA, USA, pp. 705–714 (2010). doi:10.1145/1806689.1806786
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, MA, USA
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
18
-
-
84979691947
-
Principled evaluation of differentially private algorithms using DPBench
-
Hay, M., Machanavajjhala, A., Miklau, G., Chen, Y., Zhang, D.: Principled evaluation of differentially private algorithms using DPBench. In: Proceedings of the International Conference on Management of Data, SIGMOD 2016, San Francisco, CA, USA, pp. 139–154 (2016). doi:10.1145/2882903.2882931
-
(2016)
Proceedings of the International Conference on Management of Data, SIGMOD 2016, San Francisco, CA, USA
, pp. 139-154
-
-
Hay, M.1
Machanavajjhala, A.2
Miklau, G.3
Chen, Y.4
Zhang, D.5
-
19
-
-
84908360438
-
Privacy in recommender systems
-
Springer
-
Jeckmans, A.J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S. (eds.) Social Media Retrieval, pp. 263–281. Springer, (2013)
-
(2013)
Ramzan, N., van Zwol, R., Lee, J.S., Clüver, K., Hua, X.S
, pp. 263-281
-
-
Jeckmans, A.J.1
Beye, M.2
Erkin, Z.3
Hartel, P.4
Lagendijk, R.L.5
Tang, Q.6
Retrieval, S.M.7
-
20
-
-
79959983519
-
No free lunch in data privacy
-
Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, 2011, pp. 193–204 (2011). doi:10.1145/1989323.1989345
-
(2011)
Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, 2011
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
21
-
-
14244249296
-
Anonymization techniques for knowledge discovery in databases
-
Klösgen, W.: Anonymization techniques for knowledge discovery in databases. In: Proceedings of the 1st International Conference on Knowledge Discovery and Data Mining, KDD 1995, Montreal, Canada, pp. 186–191 (1995)
-
(1995)
Proceedings of the 1st International Conference on Knowledge Discovery and Data Mining, KDD 1995, Montreal, Canada
, pp. 186-191
-
-
Klösgen, W.1
-
22
-
-
38849161575
-
Privacy-enhanced web personalization
-
Kobsa, A.: Privacy-enhanced web personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web, pp. 628–670. Springer, (2007)
-
(2007)
Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web, pp. 628–670. Springer
-
-
Kobsa, A.1
-
23
-
-
84956762490
-
Advances in collaborative filtering
-
Springer
-
Koren, Y., Bell, R.: Advances in collaborative filtering. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook, pp. 77–118. Springer, (2015)
-
(2015)
Ricci, F., Rokach, L., Shapira, B
, pp. 77-118
-
-
Koren, Y.1
Bell, R.2
Handbook, R.S.3
-
24
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(8), 30–37 (2009)
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 30-37
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
25
-
-
84876061994
-
Private traits and attributes are predictable from digital records of human behavior
-
Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences 110(15), 5802–5805 (2013)
-
(2013)
Proceedings of the National Academy of Sciences
, vol.110
, Issue.15
, pp. 5802-5805
-
-
Kosinski, M.1
Stillwell, D.2
Graepel, T.3
-
26
-
-
33746637971
-
-
Lam, S.K., Frankowski, D., Riedl, J.: Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, Freiburg, Germany, pp. 14–29
-
Lam, S.K., Frankowski, D., Riedl, J.: Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, Freiburg, Germany, pp. 14–29 (2006). doi:10.1007/11766155_2
-
(2006)
-
-
-
27
-
-
84868344726
-
Willing to pay for quality personalization? Trade-off between quality and privacy
-
Li, T., Unger, T.: Willing to pay for quality personalization? Trade-off between quality and privacy. European Journal of Information Systems 21(6), 621–642 (2012)
-
(2012)
European Journal of Information Systems
, vol.21
, Issue.6
, pp. 621-642
-
-
Li, T.1
Unger, T.2
-
28
-
-
84455177094
-
Personalized social recommendations - accurate or private?
-
Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations - accurate or private? Proceedings of the VLDB Endowment 4(7), 440–450 (2011)
-
(2011)
Proceedings of the VLDB Endowment
, vol.4
, Issue.7
, pp. 440-450
-
-
Machanavajjhala, A.1
Korolova, A.2
Sarma, A.D.3
-
30
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 29th IEEE Symposium on Security and Privacy, (S&P 2008), Oakland, CA, USA, pp. 111–125 (2008). doi:10.1109/SP.2008.33
-
(2008)
Proceedings of the 29th IEEE Symposium on Security and Privacy, (S&P 2008), Oakland, CA, USA
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
31
-
-
84995949413
-
-
Netflix spilled your Brokeback Mountain secret. Accessed: July 2016
-
Netflix spilled your Brokeback Mountain secret. http://www.wired.com/threatlevel/2009/12/netflix-privacy-lawsuit/. Accessed: July 2016
-
-
-
-
32
-
-
84888987660
-
Privacy-preserving matrix factorization
-
Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, pp. 801–812 (2013). doi:10.1145/2508859.2516751
-
(2013)
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany
, pp. 801-812
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
33
-
-
84956731733
-
A comprehensive survey of neighborhood-based recommendation methods
-
Springer
-
Ning, X., Desrosiers, C., Karypis, G.: A comprehensive survey of neighborhood-based recommendation methods. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook, pp. 37–76. Springer, (2015)
-
(2015)
Ricci, F., Rokach, L., Shapira, B
, pp. 37-76
-
-
Ning, X.1
Desrosiers, C.2
Karypis, G.3
Handbook, R.S.4
-
34
-
-
46749153877
-
Privacy preserving collaborative filtering using data obfuscation
-
Parameswaran, R., Blough, D.M.: Privacy preserving collaborative filtering using data obfuscation. In: Proceedings of the IEEE International Conference on Granular Computing, GrC 2007, San Jose, CA, USA, pp. 380–386 (2007). doi:10.1109/GRC.2007.129
-
(2007)
Proceedings of the IEEE International Conference on Granular Computing, GrC 2007, San Jose, CA, USA
, pp. 380-386
-
-
Parameswaran, R.1
Blough, D.M.2
-
35
-
-
33745783127
-
-
Polat, H., Du, W.: Achieving private recommendations using randomized response techniques. In: Proceedings of the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2014, Singapore, Singapore, pp. 637–646
-
Polat, H., Du, W.: Achieving private recommendations using randomized response techniques. In: Proceedings of the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2014, Singapore, Singapore, pp. 637–646 (2006). doi:10.1007/11731139_73
-
(2006)
-
-
-
36
-
-
84995973724
-
(eds.): Recommender Systems Handbook, 2nd edn
-
Ricci, F., Rokach, L., Shapira, B. (eds.): Recommender Systems Handbook, 2nd edn. Springer, (2015)
-
(2015)
Springer
-
-
Ricci, F.1
Rokach, L.2
Shapira, B.3
-
37
-
-
82555195626
-
Challenge on context-aware movie recommendation: Camra2011
-
Said, A., Berkovsky, S., De Luca, E.W., Hermanns, J.: Challenge on context-aware movie recommendation: Camra2011. In: Proceedings of the ACM Conference on Recommender Systems, RecSys 2011, Chicago, IL, USA, pp. 385–386 (2011). doi:10.1145/2043932.2044015
-
(2011)
Proceedings of the ACM Conference on Recommender Systems, RecSys 2011, Chicago, IL, USA
, pp. 385-386
-
-
Said, A.1
Berkovsky, S.2
De Luca, E.W.3
Hermanns, J.4
-
38
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computers 29(2), 38–47 (1996)
-
(1996)
IEEE Computers
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
39
-
-
85119665974
-
Analysis of recommendation algorithms for e-commerce
-
Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.: Analysis of recommendation algorithms for e-commerce. In: Proceedings of the ACM Conference on Electronic Commerce, Minneapolis, MN, USA, pp. 158–167 (2000). doi:10.1145/352871.352887
-
(2000)
Proceedings of the ACM Conference on Electronic Commerce, Minneapolis, MN, USA
, pp. 158-167
-
-
Sarwar, B.M.1
Karypis, G.2
Konstan, J.A.3
Riedl, J.4
-
40
-
-
79951744105
-
Averaged stochastic gradient descent with feedback: An accurate, robust, and fast training method
-
Sun, X., Kashima, H., Matsuzaki, T., Ueda, N.: Averaged stochastic gradient descent with feedback: An accurate, robust, and fast training method. In: Proceedings of the 10th IEEE International Conference on Data Mining, ICDM 2010, Sydney, Australia, pp. 1067–1072 (2010). doi:10.1109/ICDM.2010.26
-
(2010)
Proceedings of the 10th IEEE International Conference on Data Mining, ICDM 2010, Sydney, Australia
, pp. 1067-1072
-
-
Sun, X.1
Kashima, H.2
Matsuzaki, T.3
Ueda, N.4
-
42
-
-
84901276301
-
-
Vallet, D., Friedman, A., Berkovsky, S.: Matrix factorization without user data retention. In: Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2014, Tainan, Taiwan, pp. 569–580
-
Vallet, D., Friedman, A., Berkovsky, S.: Matrix factorization without user data retention. In: Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2014, Tainan, Taiwan, pp. 569–580 (2014). doi:10.1007/978-3-319-06608-0_47
-
(2014)
-
-
-
43
-
-
84867394997
-
BlurMe: Inferring and obfuscating user gender based on ratings
-
Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: Inferring and obfuscating user gender based on ratings. In: Proceedings of the 6th ACM Conference on Recommender Systems, RecSys 2012, Dublin, Ireland, pp. 195–202 (2012). doi:10.1145/2365952.2365989
-
(2012)
Proceedings of the 6th ACM Conference on Recommender Systems, RecSys 2012, Dublin, Ireland
, pp. 195-202
-
-
Weinsberg, U.1
Bhagat, S.2
Ioannidis, S.3
Taft, N.4
-
44
-
-
48249089255
-
-
Zhou, Y., Wilkinson, D.M., Schreiber, R., Pan, R.: Large-scale parallel collaborative filtering for the netflix prize. In: Proceedings of 4th International Conference on Algorithmic Aspects in Information and Management, AAIM 2008, Shanghai, China, pp. 337–348
-
Zhou, Y., Wilkinson, D.M., Schreiber, R., Pan, R.: Large-scale parallel collaborative filtering for the netflix prize. In: Proceedings of 4th International Conference on Algorithmic Aspects in Information and Management, AAIM 2008, Shanghai, China, pp. 337–348 (2008). doi:10.1007/978-3-540-68880-8_32
-
(2008)
-
-
|