{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:02:41Z","timestamp":1725793361902},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066073"},{"type":"electronic","value":"9783319066080"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06608-0_47","type":"book-chapter","created":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T01:40:40Z","timestamp":1399513240000},"page":"569-580","source":"Crossref","is-referenced-by-count":7,"title":["Matrix Factorization without User Data Retention"],"prefix":"10.1007","author":[{"given":"David","family":"Vallet","sequence":"first","affiliation":[]},{"given":"Arik","family":"Friedman","sequence":"additional","affiliation":[]},{"given":"Shlomo","family":"Berkovsky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: RecSys, pp. 9\u201316 (2007)","DOI":"10.1145\/1297231.1297234"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: \u201cYou might also like:\u201d privacy risks of collaborative filtering. In: IEEE Symposium on Security and Privacy, pp. 231\u2013246 (2011)","DOI":"10.1109\/SP.2011.40"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Campos, P., D\u00edez, F., Cantador, I.: Time-aware recommender systems: a comprehensive survey and analysis of existing evaluation protocols. In: UMUAI (2013)","DOI":"10.1007\/s11257-012-9136-x"},{"key":"47_CR4","unstructured":"Chaabane, A., Acs, G., Kaafar, M.: You are what you like! information leakage through users\u2019 interests. In: Proc. NDSS (2012)"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Cremonesi, P., Koren, Y., Turrin, R.: Performance of recommender algorithms on top-n recommendation tasks. In: RecSys, pp. 39\u201346 (2010)","DOI":"10.1145\/1864708.1864721"},{"key":"47_CR6","unstructured":"Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. In: The Guardian (June 2013)"},{"key":"47_CR7","unstructured":"Guha, S., Reznichenko, A., Tang, K., Haddadi, H., Francis, P.: Serving ads from localhost for performance, privacy, and profit. In: HotNets (2009)"},{"issue":"8","key":"47_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y. Koren","year":"2009","unstructured":"Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. IEEE Computer\u00a042(8), 30\u201337 (2009)","journal-title":"IEEE Computer"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences (March 2013)","DOI":"10.1073\/pnas.1218772110"},{"key":"47_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/11766155_2","volume-title":"Emerging Trends in Information and Communication Security","author":"S.K. Lam","year":"2006","unstructured":"Lam, S.K., Frankowski, D., Riedl, J.: Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 14\u201329. Springer, Heidelberg (2006)"},{"key":"47_CR11","first-page":"471","volume":"5","author":"D. Lemire","year":"2005","unstructured":"Lemire, D., Maclachlan, A.: Slope one predictors for online rating-based collaborative filtering. Society for Industrial Mathematics\u00a05, 471\u2013480 (2005)","journal-title":"Society for Industrial Mathematics"},{"key":"47_CR12","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.knosys.2011.09.006","volume":"27","author":"X. Luo","year":"2012","unstructured":"Luo, X., Xia, Y., Zhu, Q.: Incremental collaborative filtering recommender based on regularized matrix factorization. Know. -Based Syst.\u00a027, 271\u2013280 (2012)","journal-title":"Know. -Based Syst."},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: Building privacy into the netflix prize contenders. In: KDD, pp. 627\u2013636 (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Rendle, S., Schmidt-Thieme, L.: Online-updating regularized kernel matrix factorization models for large-scale recommender systems. In: RecSys (2008)","DOI":"10.1145\/1454008.1454047"},{"key":"47_CR16","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Incremental singular value decomposition algorithms for highly scalable recommender systems. In: Fifth International Conference on Computer and Information Science, pp. 27\u201328 (2002)"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Shani, G., Gunawardana, A.: Evaluating recommendation systems. In: Recommender Systems Handbook, pp. 257\u2013297. Springer (2011)","DOI":"10.1007\/978-0-387-85820-3_8"},{"key":"47_CR18","first-page":"623","volume":"10","author":"G. Tak\u00e1cs","year":"2009","unstructured":"Tak\u00e1cs, G., Pil\u00e1szy, I., N\u00e9meth, B., Tikk, D.: Scalable collaborative filtering approaches for large recommender systems. JMLR\u00a010, 623\u2013656 (2009)","journal-title":"JMLR"},{"key":"47_CR19","unstructured":"Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: NDSS (2010)"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: inferring and obfuscating user gender based on ratings. In: RecSys, pp. 195\u2013202 (2012)","DOI":"10.1145\/2365952.2365989"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06608-0_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:22:19Z","timestamp":1558898539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06608-0_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066073","9783319066080"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06608-0_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}