-
1
-
-
85027276871
-
A practical privacy-preserving recommender system. Data Sci
-
Badsha, S., Yi, X., Khalil, I.: A practical privacy-preserving recommender system. Data Sci. Eng. 1(3), 161-177 (2016)
-
(2016)
Eng
, vol.1
, Issue.3
, pp. 161-177
-
-
Badsha, S.1
Yi, X.2
Khalil, I.3
-
2
-
-
49749086487
-
Scalable collaborative filtering with jointly derived neighborhood interpolation weights
-
Bell, R.M., Koren, Y.: Scalable collaborative filtering with jointly derived neighborhood interpolation weights. In: ICDM, pp. 43-52 (2007)
-
(2007)
ICDM
, pp. 43-52
-
-
Bell, R.M.1
Koren, Y.2
-
4
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Halevi, S., Rabin, T. (eds.), Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006). doi:10.1007/11681878_14
-
(2006)
TCC 2006. LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
6
-
-
84861133582
-
Generating private recommendations efficiently using homomorphic encryption and data packing
-
Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053-1066 (2012)
-
(2012)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.3
, pp. 1053-1066
-
-
Erkin, Z.1
Veugen, T.2
Toft, T.3
Lagendijk, R.L.4
-
7
-
-
84977935627
-
D 2 p: Distance-based differential privacy in recommenders
-
Guerraoui, R., Kermarrec, A.M., Patra, R., Taziki, M.: D 2 p: distance-based differential privacy in recommenders. VLDB 8(8), 862-873 (2015)
-
(2015)
VLDB
, vol.8
, Issue.8
, pp. 862-873
-
-
Guerraoui, R.1
Kermarrec, A.M.2
Patra, R.3
Taziki, M.4
-
8
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium, vol. 201 (2011)
-
(2011)
USENIX Security Symposium
, vol.201
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
9
-
-
84950257886
-
A secure and efficient framework for privacy preserving social recommendation
-
Cheng, R., Cui, B., Zhang, Z., Cai, R., Xu, J. (eds.), Springer, Cham
-
Liu, S., Liu, A., Liu, G., Li, Z., Xu, J., Zhao, P., Zhao, L.: A secure and efficient framework for privacy preserving social recommendation. In: Cheng, R., Cui, B., Zhang, Z., Cai, R., Xu, J. (eds.) APWeb 2015. LNCS, vol. 9313, pp. 781-792. Springer, Cham (2015). doi:10.1007/978-3-319-25255-1_64
-
(2015)
Apweb 2015. LNCS
, vol.9313
, pp. 781-792
-
-
Liu, S.1
Liu, A.2
Liu, G.3
Li, Z.4
Xu, J.5
Zhao, P.6
Zhao, L.7
-
10
-
-
84991628197
-
Applet: A privacypreserving framework for location-aware recommender system
-
Ma, X., Li, H., Ma, J., Jiang, Q., Gao, S., Xi, N., Lu, D.: Applet: a privacypreserving framework for location-aware recommender system. Sci. China Inf. Sci. 60(9), 092101 (2017)
-
(2017)
Sci. China Inf. Sci
, vol.60
, Issue.9
-
-
Ma, X.1
Li, H.2
Ma, J.3
Jiang, Q.4
Gao, S.5
Xi, N.6
Lu, D.7
-
11
-
-
84455177094
-
Personalized social recommendations: Accurate or private
-
Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: accurate or private. VLDB 4(7), 440-450 (2011)
-
(2011)
VLDB
, vol.4
, Issue.7
, pp. 440-450
-
-
Machanavajjhala, A.1
Korolova, A.2
Sarma, A.D.3
-
12
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the netflix prize contenders. In: KDD, pp. 627-636 (2009)
-
(2009)
KDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
13
-
-
84888987660
-
Privacypreserving matrix factorization
-
Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacypreserving matrix factorization. In: CCS, pp. 801-812 (2013)
-
(2013)
CCS
, pp. 801-812
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
14
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: ICDM, pp. 625-628 (2003)
-
(2003)
ICDM
, pp. 625-628
-
-
Polat, H.1
Du, W.2
-
16
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.C.: How to generate and exchange secrets. In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.C.1
-
17
-
-
77953721873
-
Privacypreserving collaborative recommender systems
-
Zhan, J., Hsieh, C.L., Wang, I.C., Hsu, T.S., Liau, C.J., Wang, D.W.: Privacypreserving collaborative recommender systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(4), 472-476 (2010)
-
(2010)
IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)
, vol.40
, Issue.4
, pp. 472-476
-
-
Zhan, J.1
Hsieh, C.L.2
Wang, I.C.3
Hsu, T.S.4
Liau, C.J.5
Wang, D.W.6
-
18
-
-
33745432713
-
Deriving private information from randomly perturbed ratings
-
Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: SDM, pp. 59-69 (2006)
-
(2006)
SDM
, pp. 59-69
-
-
Zhang, S.1
Ford, J.2
Makedon, F.3
|