{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:17Z","timestamp":1760596277326},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319557526"},{"type":"electronic","value":"9783319557533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55753-3_34","type":"book-chapter","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:38:10Z","timestamp":1490053090000},"page":"543-558","source":"Crossref","is-referenced-by-count":10,"title":["A Local-Clustering-Based Personalized Differential Privacy Framework for User-Based Collaborative Filtering"],"prefix":"10.1007","author":[{"given":"Yongkai","family":"Li","sequence":"first","affiliation":[]},{"given":"Shubo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mengjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"issue":"1\u20132","key":"34_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11257-011-9112-x","volume":"22","author":"JA Konstan","year":"2012","unstructured":"Konstan, J.A., Riedl, J.: Recommender systems: from algorithms to user experience. User Model. User-Adap. Interact. 22(1\u20132), 101\u2013123 (2012)","journal-title":"User Model. User-Adap. Interact."},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/421425","volume":"4","author":"X Su","year":"2009","unstructured":"Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 4, 1\u201319 (2009). doi: 10.1155\/2009\/421425","journal-title":"Adv. Artif. Intell."},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, pp. 338\u2013340 (2011)","key":"34_CR3","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi: 10.1007\/11787006_1"},{"doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627\u2013636 (2009)","key":"34_CR5","DOI":"10.1145\/1557019.1557090"},{"doi-asserted-by":"crossref","unstructured":"Hardt, M., Roth, A.: Beating randomized response on incoherent matrices. In: Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, pp. 1255\u20131268 (2012)","key":"34_CR6","DOI":"10.1145\/2213977.2214088"},{"issue":"8","key":"34_CR7","doi-asserted-by":"crossref","first-page":"862","DOI":"10.14778\/2757807.2757811","volume":"8","author":"R Guerraoui","year":"2015","unstructured":"Guerraoui, R., Kermarrec, A.M., Patra, R., et al.: D2P: distance-based differential privacy in recommenders. Proc. VLDB Endowment 8(8), 862\u2013873 (2015)","journal-title":"Proc. VLDB Endowment"},{"issue":"4","key":"34_CR8","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48(4), 101\u2013106 (2005)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: IEEE International Conference on Data Engineering, pp. 1023\u20131034 (2015)","key":"34_CR9","DOI":"10.1109\/ICDE.2015.7113353"},{"doi-asserted-by":"crossref","unstructured":"Luo, Y., Le, J., Chen, H.: A privacy-preserving book recommendation model based on multi-agent. In: Computer Science and Engineering, pp. 323\u2013327 (2009)","key":"34_CR10","DOI":"10.1109\/WCSE.2009.822"},{"doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chow, S.S.M.: Privacy preserving collaborative filtering from asymmetric randomized encoding. In: International Conference on Financial Cryptography and Data Security, pp. 459\u2013477 (2015)","key":"34_CR11","DOI":"10.1007\/978-3-662-47854-7_28"},{"issue":"9","key":"34_CR12","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1810891.1810916","volume":"53","author":"FD Mcsherry","year":"2010","unstructured":"Mcsherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM 53(9), 89\u201397 (2010)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Friedman, A., Schuster, A.: Data mining with differential privacy. In: SIGKDD, pp. 493\u2013502 (2010)","key":"34_CR13","DOI":"10.1145\/1835804.1835868"},{"issue":"8","key":"34_CR14","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23(8), 1200\u20131214 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Zhu, X., Sun, Y.: Differential privacy for collaborative filtering recommender algorithm. In: ACM on International Workshop on Security and Privacy Analytics (2016)","key":"34_CR15","DOI":"10.1145\/2875475.2875483"},{"doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., et al.: Locality-sensitive hashing scheme based on p-stable distributions. In: Twentieth Symposium on Computational Geometry, pp. 253\u2013262 (2004)","key":"34_CR16","DOI":"10.1145\/997817.997857"},{"doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: Applied and Computational Harmonic Analysis, pp. 380\u2013388 (2002)","key":"34_CR17","DOI":"10.1145\/509907.509965"},{"doi-asserted-by":"crossref","unstructured":"Li, C., Hay, M., Rastogi, V., et al.: Optimizing linear counting queries under differential privacy. In: Proceedings of the Twenty-ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 123\u2013134 (2010)","key":"34_CR18","DOI":"10.1145\/1807085.1807104"},{"key":"34_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). doi: 10.1007\/11681878_14"},{"issue":"5814","key":"34_CR20","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1126\/science.1136800","volume":"315","author":"BJ Frey","year":"2007","unstructured":"Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972\u20136 (2007)","journal-title":"Science"},{"issue":"2","key":"34_CR21","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1023\/A:1011419012209","volume":"4","author":"K Goldberg","year":"2001","unstructured":"Goldberg, K., Roeder, T., Gupta, D., et al.: Eigentaste: a constant time collaborative filtering algorithm. Inf. Retrieval J. 4(2), 133\u2013151 (2001)","journal-title":"Inf. Retrieval J."},{"doi-asserted-by":"crossref","unstructured":"Cantador, I., Brusilovsky, P., Kuflik, T.: HetRec 2011: Second Workshop on Information Heterogeneity and Fusion in Recommender Systems, Chicago (2011)","key":"34_CR22","DOI":"10.1145\/2043932.2044016"},{"doi-asserted-by":"crossref","unstructured":"Cremonesi, P., Koren, Y., Turrin, R.: Performance of recommender algorithms on top-n recommendation tasks. In: RecSys, pp. 39\u201346 (2010)","key":"34_CR23","DOI":"10.1145\/1864708.1864721"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55753-3_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T01:07:53Z","timestamp":1601773673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55753-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557526","9783319557533"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55753-3_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}