{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:00:44Z","timestamp":1725850844714},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319308395"},{"type":"electronic","value":"9783319308401"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30840-1_14","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T14:15:22Z","timestamp":1457532922000},"page":"210-226","source":"Crossref","is-referenced-by-count":0,"title":["On Differentially Private Online Collaborative Recommendation Systems"],"prefix":"10.1007","author":[{"given":"Seth","family":"Gilbert","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"issue":"6","key":"14_CR1","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734\u2013749 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Hayes, T.P.: Online collaborative filtering with nearly optimal dynamic regret. In: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, pp. 315\u2013319. ACM (2007)","DOI":"10.1145\/1248377.1248431"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the 2007 ACM Conference on Recommender Systems. pp. 9\u201316. ACM (2007)","DOI":"10.1145\/1297231.1297234"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 609\u2013618. ACM (2008)","DOI":"10.1145\/1374376.1374464"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Bolot, J., Fawaz, N., Muthukrishnan, S., Nikolov, A., Taft, N.: Private decayed predicate sums on streams. In: Proceedings of the 16th International Conference on Database Theory, pp. 284\u2013295. ACM (2013)","DOI":"10.1145\/2448496.2448530"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Calandrino, J., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V., et al.: \u201cYou might also like:\u201d privacy risks of collaborative filtering. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 231\u2013246. IEEE (2011)","DOI":"10.1109\/SP.2011.40"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45\u201357. IEEE (2002)","DOI":"10.1145\/564376.564419"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 238\u2013245. ACM (2002)","DOI":"10.1145\/564418.564419"},{"key":"14_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921","volume-title":"Prediction, Learning, and Games","author":"N Cesa-Bianchi","year":"2006","unstructured":"Cesa-Bianchi, N., Lugosi, G.: Prediction, Learning, and Games. Cambridge University Press, New York (2006)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-31680-7_8","volume-title":"Privacy Enhancing Technologies","author":"T-HH Chan","year":"2012","unstructured":"Chan, T.-H.H., Li, M., Shi, E., Xu, W.: Differentially private continual monitoring of heavy hitters from distributed streams. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 140\u2013159. Springer, Heidelberg (2012)"},{"issue":"3","key":"14_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/2043621.2043626","volume":"14","author":"THH Chan","year":"2011","unstructured":"Chan, T.H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. 14(3), 26 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"14_CR12","first-page":"2905","volume":"14","author":"K Chaudhuri","year":"2013","unstructured":"Chaudhuri, K., Sarwate, A.D., Sinha, K.: A near-optimal algorithm for differentially-private principal components. J. Mach. Learn. Res. 14(1), 2905\u20132943 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Chow, R., Pathak, M.A., Wang, C.: A practical system for privacy-preserving collaborative filtering. In: Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), pp. 547\u2013554. IEEE (2012)","DOI":"10.1109\/ICDMW.2012.84"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-642-00457-5_29","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2009","unstructured":"Dwork, C.: The differential privacy frontier (extended abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 496\u2013502. Springer, Heidelberg (2009)"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 715\u2013724. ACM (2010)","DOI":"10.1145\/1806689.1806787"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Reingold, O., Rothblum, G.N., Vadhan, S.: On the complexity of differentially private data release: efficient algorithms and hardness results. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 381\u2013390. ACM (2009)","DOI":"10.1145\/1536414.1536467"},{"issue":"2","key":"14_CR20","first-page":"2","volume":"1","author":"C Dwork","year":"2010","unstructured":"Dwork, C., Smith, A.: Differential privacy for statistics: what we know and what we want to learn. J. Priv. confidentiality 1(2), 2 (2010)","journal-title":"J. Priv. confidentiality"},{"key":"14_CR21","unstructured":"Gilbert, S., Liu, X., Yu, H.: On differentially private online collaborative recommendation systems. ArXiv e-prints (2015). arxiv:1510.08546"},{"issue":"8","key":"14_CR22","doi-asserted-by":"publisher","first-page":"862","DOI":"10.14778\/2757807.2757811","volume":"8","author":"R Guerraoui","year":"2015","unstructured":"Guerraoui, R., Kermarrec, A.M., Patra, R., Taziki, M.: D2P: distance-based differential privacy in recommenders. Proc. VLDB Endowment 8(8), 862\u2013873 (2015)","journal-title":"Proc. VLDB Endowment"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Hardt, M., Roth, A.: Beating randomized response on incoherent matrices. In: Proceedings of the 44th annual ACM Symposium on Theory of Computing, pp. 1255\u20131268. ACM (2012)","DOI":"10.1145\/2213977.2214088"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Hardt, M., Roth, A.: Beyond worst-case analysis in private singular vector computation. In: Proceedings of the 45th annual ACM Symposium on Theory of Computing, pp. 331\u2013340. ACM (2013)","DOI":"10.1145\/2488608.2488650"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, pp. 61\u201370. IEEE (2010)","DOI":"10.1109\/FOCS.2010.85"},{"key":"14_CR26","unstructured":"Jain, P., Kothari, P., Thakurta, A.: Differentially private online learning. In: Proceedings of the 25th Annual Conference on Learning Theory, pp. 24.1\u201324.34 (2011)"},{"issue":"3","key":"14_CR27","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.jcss.2004.10.016","volume":"71","author":"A Kalai","year":"2005","unstructured":"Kalai, A., Vempala, S.: Efficient algorithms for online decision problems. J. Comput. Syst. Sci. 71(3), 291\u2013307 (2005)","journal-title":"J. Comput. Syst. Sci."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Kapralov, M., Talwar, K.: On differentially private low rank approximation. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1395\u20131414. SIAM (2013)","DOI":"10.1137\/1.9781611973105.101"},{"issue":"12","key":"14_CR29","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.14778\/2732977.2732989","volume":"7","author":"G Kellaris","year":"2014","unstructured":"Kellaris, G., Papadopoulos, S., Xiao, X., Papadias, D.: Differentially private event sequences over infinite streams. Proc. VLDB Endowment 7(12), 1155\u20131166 (2014)","journal-title":"Proc. VLDB Endowment"},{"key":"14_CR30","volume-title":"Information Theory and Statistics","author":"S Kullback","year":"1968","unstructured":"Kullback, S.: Information Theory and Statistics. Courier Corporation, New York (1968)"},{"key":"14_CR31","unstructured":"Lee, W.S.: Collaborative learning for recommender systems. In: Proceedings of the 18th International Conference on Machine Learning, pp. 314\u2013321 (2001)"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627\u2013636. ACM (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"14_CR33","unstructured":"Nakamura, A., Abe, N.: Collaborative filtering using weighted majority prediction algorithms. In: Proceedings of the 15th International Conference on Machine Learning, pp. 395\u2013403 (1998)"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"issue":"4","key":"14_CR35","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/10864415.2003.11044341","volume":"9","author":"H Polat","year":"2003","unstructured":"Polat, H., Du, W.: Privacy-preserving collaborative filtering. Int. J. Electron. Commer. 9(4), 9\u201335 (2003)","journal-title":"Int. J. Electron. Commer."},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791\u2013795. ACM (2005)","DOI":"10.1145\/1066677.1066860"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Resnick, P., Sami, R.: The influence limiter: provably manipulation-resistant recommender systems. In: Proceedings of the 2007 ACM Conference on Recommender Systems, pp. 25\u201332. ACM (2007)","DOI":"10.1145\/1297231.1297236"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, pp. 765\u2013774. ACM (2010)","DOI":"10.1145\/1806689.1806794"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.P.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of the 2009 ACM Conference on Recommender Systems, pp. 157\u2013164. ACM (2009)","DOI":"10.1145\/1639714.1639741"},{"key":"14_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/421425","volume":"2009","author":"Xiaoyuan Su","year":"2009","unstructured":"Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 2009, Article ID 421425, 19 (2009). Doi: 10.1155\/2009\/421425","journal-title":"Advances in Artificial Intelligence"},{"key":"14_CR41","unstructured":"Thakurta, A.G., Smith, A.: (Nearly) optimal algorithms for private online learning in full-information and bandit settings. In: Advances in Neural Information Processing Systems, pp. 2733\u20132741 (2013)"},{"key":"14_CR42","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-319-12637-1_62","volume-title":"Neural Information Processing","author":"Xin Xin","year":"2014","unstructured":"Xin, Y., Jaakkola, T.: Controlling privacy in recommender systems. In: Advances in Neural Information Processing Systems, pp. 2618\u20132626 (2014)"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Yu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F.: Dsybil: optimal sybil-resistance for recommendation systems. In: Proceedings of the 2009 IEEE Symposium on Security and Privacy, pp. 283\u2013298. IEEE (2009)","DOI":"10.1109\/SP.2009.26"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30840-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T05:14:26Z","timestamp":1692249266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30840-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319308395","9783319308401"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30840-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}