{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:06:19Z","timestamp":1765544779012,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_30","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"355-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Recommender Systems with Condensed Local Differential Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3387-4145","authenticated-orcid":false,"given":"Ao","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2111-2533","authenticated-orcid":false,"given":"Yanqing","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1130-8302","authenticated-orcid":false,"given":"Xianfu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"unstructured":"Learning with Privacy at Scale (2017). https:\/\/machinelearning.apple.com\/2017\/12\/06\/learning-with-privacy-at-scale.html","key":"30_CR1"},{"doi-asserted-by":"crossref","unstructured":"Chen, Q., Zhao, H., Li, W., Huang, P., Ou, W.: Behavior sequence transformer for e-commerce recommendation in alibaba. arXiv Information Retrieval (2019)","key":"30_CR2","DOI":"10.1145\/3326937.3341261"},{"doi-asserted-by":"crossref","unstructured":"Covington, P., Adams, J., Sargin, E.: Deep neural networks for YouTube recommendations. In: Proceedings of the 10th ACM Conference on Recommender Systems, pp. 191\u2013198 (2016)","key":"30_CR3","DOI":"10.1145\/2959100.2959190"},{"unstructured":"Duchi, J., Rogers, R.: Lower bounds for locally private estimation via communication complexity. In: Proceedings of 32nd Annual Conference on Learning Theory, vol. 99, pp. 1\u201331 (2019)","key":"30_CR4"},{"doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Foundations of Computer Science, pp. 429\u2013438 (2013)","key":"30_CR5","DOI":"10.1109\/FOCS.2013.53"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming, vol. 2, pp. 1\u201312 (2006)","key":"30_CR6","DOI":"10.1007\/11787006_1"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"\u00dalfar Erlingsson, Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response, pp. 1054\u20131067 (2014)","key":"30_CR8","DOI":"10.1145\/2660267.2660348"},{"doi-asserted-by":"crossref","unstructured":"Guo, H., Tang, R., Ye, Y., Li, Z., He, X.: DeepFM: a factorization-machine based neural network for CTR prediction. In: International Joint Conference on Artificial Intelligence, pp. 1725\u20131731 (2017)","key":"30_CR9","DOI":"10.24963\/ijcai.2017\/239"},{"doi-asserted-by":"crossref","unstructured":"Gursoy, M.E., Tamersoy, A., Truex, S., Wei, W., Liu, L.: Secure and utility-aware data collection with condensed local differential privacy. IEEE Trans. Dependable Secure Comput. 1 (2019)","key":"30_CR10","DOI":"10.1109\/TDSC.2019.2949041"},{"issue":"4","key":"30_CR11","first-page":"19","volume":"5","author":"FM Harper","year":"2016","unstructured":"Harper, F.M., Konstan, J.A.: The movielens datasets: history and context. Ksii Trans. Internet Inf. Syst. 5(4), 19 (2016)","journal-title":"Ksii Trans. Internet Inf. Syst."},{"unstructured":"Hua, J., Xia, C., Zhong, S.: Differentially private matrix factorization. In: Proceedings of 24th International Joint Conference on Artificial Interlligence, pp. 1763\u20131770 (2015)","key":"30_CR12"},{"unstructured":"Kim, J.S., Kim, J.W., Chung, Y.D.: Successive point-of-interest recommendation with local differential privacy. arXiv Information Retrieval (2019)","key":"30_CR13"},{"issue":"2","key":"30_CR14","first-page":"377","volume":"5","author":"MM Merener","year":"2012","unstructured":"Merener, M.M.: Theoretical results on de-anonymization via linkage attacks. Trans. Data Priv. 5(2), 377\u2013402 (2012)","journal-title":"Trans. Data Priv."},{"doi-asserted-by":"crossref","unstructured":"Qi, T., Wu, F., Wu, C., Huang, Y., Xie, X.: Privacy-preserving news recommendation model training via federated learning. arXiv Information Retrieval (2020)","key":"30_CR15","DOI":"10.18653\/v1\/2020.findings-emnlp.128"},{"issue":"9","key":"30_CR16","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1109\/TKDE.2018.2805356","volume":"30","author":"H Shin","year":"2018","unstructured":"Shin, H., Kim, S., Shin, J., Xiao, X.: Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans. Knowl. Data Eng. 30(9), 1770\u20131782 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Wang, N., et al.: Collecting and analyzing multidimensional data with local differential privacy. In: Proceedings of the 35th Annual International Conference on Data Engineering, pp. 638\u2013649 (2019)","key":"30_CR17","DOI":"10.1109\/ICDE.2019.00063"},{"unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Differentially private protocols for frequency estimation. In: Proceedings of the 26th USENIX Security Symposium, pp. 729\u2013745 (2017)","key":"30_CR18"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T21:46:34Z","timestamp":1618350394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}