{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T13:55:15Z","timestamp":1764424515091,"version":"3.46.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00521-025-11189-3","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T23:40:15Z","timestamp":1746488415000},"page":"28431-28448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy protection and data security in intelligent recommendation systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Donghua","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Mohammed Hazim","family":"Alkawaz","sequence":"additional","affiliation":[]},{"given":"Md Gapar Md","family":"Johar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"issue":"4","key":"11189_CR1","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TSC.2020.2964552","volume":"13","author":"Z Cui","year":"2020","unstructured":"Cui Z, Xu X, Fei X, Cai X, Cao Y, Zhang W et al (2020) Personalized recommendation system based on collaborative filtering for IoT scenarios. IEEE Trans Services Comput 13(4):685\u2013695. https:\/\/doi.org\/10.1109\/TSC.2020.2964552","journal-title":"IEEE Trans Services Comput"},{"issue":"1","key":"11189_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.26599\/BDMA.2020.9020015","volume":"4","author":"Al Fararni","year":"2021","unstructured":"Fararni Al, Khalid FN, Aghoutane B, Yahyaouy A, Riffi J, Sabri A (2021) Hybrid recommender system for tourism based on big data and AI: a conceptual framework. Big Data Min and Anal 4(1):47\u201355. https:\/\/doi.org\/10.26599\/BDMA.2020.9020015","journal-title":"Big Data Min and Anal"},{"issue":"2","key":"11189_CR3","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.32604\/iasc.2023.039911","volume":"37","author":"S Yu","year":"2023","unstructured":"Yu S, Jie Z, Wu G, Zhang H, Shen S (2023) FedNRM: a federal personalized news recommendation model achieving user privacy protection. Intell Auto Soft Comput 37(2):1729\u20131751. https:\/\/doi.org\/10.32604\/iasc.2023.039911","journal-title":"Intell Auto Soft Comput"},{"issue":"7","key":"11189_CR4","doi-asserted-by":"publisher","first-page":"4600","DOI":"10.3390\/app13074600","volume":"13","author":"B Cheng","year":"2023","unstructured":"Cheng B, Chen P, Zhang X, Fang K, Qin X, Liu W (2023) Personalized privacy protection-preserving collaborative filtering algorithm for recommendation systems. Appl Sci 13(7):4600. https:\/\/doi.org\/10.3390\/app13074600","journal-title":"Appl Sci"},{"key":"11189_CR5","doi-asserted-by":"crossref","unstructured":"Alnaish, Zakaria A. Hamed, and Safwan O. Hasoon. (2023) \"A Comparison of Classification Algorithms for Software Defect Prediction.\"In: 2023 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT). IEEE","DOI":"10.1109\/COMNETSAT59769.2023.10420771"},{"issue":"6","key":"11189_CR6","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1007\/s10207-023-00710-1","volume":"22","author":"TB Ogunseyi","year":"2023","unstructured":"Ogunseyi TB, Avoussoukpo CB, Jiang Y (2023) A systematic review of privacy techniques in recommendation systems. Int J Inform Secur 22(6):1651\u20131664. https:\/\/doi.org\/10.1007\/s10207-023-00710-1","journal-title":"Int J Inform Secur"},{"issue":"5","key":"11189_CR7","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s00778-021-00700-6","volume":"31","author":"Q Wang","year":"2022","unstructured":"Wang Q, Yin H, Chen T, Junliang Y, Zhou A, Zhang X (2022) Fast-adapting and privacy-preserving federated recommender system. The VLDB J 31(5):877\u2013896. https:\/\/doi.org\/10.1007\/s00778-021-00700-6","journal-title":"The VLDB J"},{"issue":"5","key":"11189_CR8","doi-asserted-by":"publisher","first-page":"3168","DOI":"10.1109\/TDSC.2021.3085562","volume":"19","author":"J Chen","year":"2021","unstructured":"Chen J, Liu L, Chen R, Peng W, Huang X (2021) SecRec: a privacy-preserving method for the context-aware recommendation system. IEEE Trans Dependable Secure Comput 19(5):3168\u20133182. https:\/\/doi.org\/10.1109\/TDSC.2021.3085562","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"11189_CR9","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s42045-020-00045-8","volume":"3","author":"Y Wang","year":"2020","unstructured":"Wang Y, Tian Y, Yin X, Hei X (2020) A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans Network 3(3):218\u2013228. https:\/\/doi.org\/10.1007\/s42045-020-00045-8","journal-title":"CCF Trans Network"},{"issue":"7","key":"11189_CR10","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1093\/comjnl\/bxab025","volume":"64","author":"W Ali","year":"2021","unstructured":"Ali W, Kumar R, Deng Z, Wang Y, Shao J (2021) A federated learning approach for privacy protection in context-aware recommender systems. The Comput J 64(7):1016\u20131027. https:\/\/doi.org\/10.1093\/comjnl\/bxab025","journal-title":"The Comput J"},{"issue":"7","key":"11189_CR11","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.1007\/s11227-019-02751-7","volume":"76","author":"C Yin","year":"2020","unstructured":"Yin C, Shi L, Sun R, Wang J (2020) Improved collaborative filtering recommendation algorithm based on differential privacy protection. The J Supercomput 76(7):5161\u20135174. https:\/\/doi.org\/10.1007\/s11227-019-02751-7","journal-title":"The J Supercomput"},{"issue":"4","key":"11189_CR12","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","volume":"35","author":"Q Li","year":"2021","unstructured":"Li Q, Wen Z, Zhaomin W, Sixu H, Wang N, Li Y et al (2021) A survey on federated learning systems: vision, hype, and reality for data privacy and protection. IEEE Trans Knowledge and Data Eng 35(4):3347\u20133366. https:\/\/doi.org\/10.1109\/TKDE.2021.3124599","journal-title":"IEEE Trans Knowledge and Data Eng"},{"issue":"12","key":"11189_CR13","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3901\/JME.2023.12.149","volume":"59","author":"W Lei","year":"2023","unstructured":"Lei W (2023) \"Research on personalized recommendation methods for manufacturing services based on the federal learning framework. J Mech Eng 59(12):149\u2013161. https:\/\/doi.org\/10.3901\/JME.2023.12.149","journal-title":"J Mech Eng"},{"issue":"3","key":"11189_CR14","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TKDE.2019.2936565","volume":"33","author":"P Zhou","year":"2019","unstructured":"Zhou P, Wang K, Guo L, Gong S, Zheng B (2019) A privacy-preserving distributed contextual federated online learning framework with big data support in social recommender systems. IEEE Trans Knowl Data Eng 33(3):824\u2013838. https:\/\/doi.org\/10.1109\/TKDE.2019.2936565","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"11189_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448099","volume":"5","author":"Y Guo","year":"2021","unstructured":"Guo Y, Liu F, Cai Z, Zeng H, Chen L, Zhou T et al (2021) PREFER: point-of-interest REcommendation with efficiency and privacy-preservation via federated edge learning. Proceed ACM on Interact, Mobile, Wearable and Ubiquit Technol 5(1):1\u201325. https:\/\/doi.org\/10.1145\/3448099","journal-title":"Proceed ACM on Interact, Mobile, Wearable and Ubiquit Technol"},{"issue":"1","key":"11189_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-020-00323-1","volume":"3","author":"N Rieke","year":"2020","unstructured":"Rieke N, Hancox J, Li W, Milletari F, Roth HR, Albarqouni S et al (2020) The future of digital health with federated learning. NPJ Digit Med 3(1):1\u20137. https:\/\/doi.org\/10.1038\/s41746-020-00323-1","journal-title":"NPJ Digit Med"},{"issue":"1","key":"11189_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000083","volume":"14","author":"P Kairouz","year":"2021","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN et al (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14(1):1\u2013210. https:\/\/doi.org\/10.1561\/2200000083","journal-title":"Found Trends Mach Learn"},{"issue":"1","key":"11189_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2020.3036952","volume":"39","author":"HT Nguyen","year":"2020","unstructured":"Nguyen HT, Sehwag V, Hosseinalipour S, Brinton CG, Mung Chiang H, Poor V (2020) Fast-convergent federated learning. IEEE J Selected Areas in Commun 39(1):201\u2013218. https:\/\/doi.org\/10.1109\/JSAC.2020.3036952","journal-title":"IEEE J Selected Areas in Commun"},{"issue":"6","key":"11189_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCOM.001.1900461","volume":"58","author":"S Niknam","year":"2020","unstructured":"Niknam S, Dhillon HS, Reed JH (2020) Federated learning for wireless communications: motivation, opportunities, and challenges. IEEE Commun Mag 58(6):46\u201351. https:\/\/doi.org\/10.1109\/MCOM.001.1900461","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"11189_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TDSC.2021.3128679","volume":"20","author":"J Gao","year":"2021","unstructured":"Gao J, Hou B, Guo X, Liu Z, Zhang Y, Chen K et al (2021) Secure aggregation is insecure: category inference attack on federated learning. IEEE Trans Dependable and Secure Comput 20(1):147\u2013160. https:\/\/doi.org\/10.1109\/TDSC.2021.3128679","journal-title":"IEEE Trans Dependable and Secure Comput"},{"issue":"1","key":"11189_CR21","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s40747-020-00212-w","volume":"7","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Jie L, Jin Y (2021) Artificial intelligence in recommender systems. Complex & Intell Syst 7(1):439\u2013457. https:\/\/doi.org\/10.1007\/s40747-020-00212-w","journal-title":"Complex & Intell Syst"},{"issue":"1","key":"11189_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJIIT.369336","volume":"21","author":"V Kulkarni","year":"2025","unstructured":"Kulkarni V, Sharma KH, Shah M, Kulkarni AV (2025) LIDNeRF: language-guided NeRF editing with instructdiffusion. Int J Intell Inform Technol (IJIIT) 21(1):1\u201318","journal-title":"Int J Intell Inform Technol (IJIIT)"},{"issue":"4","key":"11189_CR23","doi-asserted-by":"publisher","first-page":"2709","DOI":"10.1007\/s10462-019-09744-1","volume":"53","author":"A Da\u2019u","year":"2020","unstructured":"Da\u2019u A, Salim N (2020) Recommendation system based on deep learning methods: a systematic review and new directions. Artific Intell Rev 53(4):2709\u20132748. https:\/\/doi.org\/10.1007\/s10462-019-09744-1","journal-title":"Artific Intell Rev"},{"issue":"3","key":"11189_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2019.2959108","volume":"9","author":"Z Li","year":"2020","unstructured":"Li Z, Sharma V, Mohanty SP (2020) Preserving data privacy via federated learning: challenges and solutions. IEEE Consume Electron Magaz 9(3):8\u201316. https:\/\/doi.org\/10.1109\/MCE.2019.2959108","journal-title":"IEEE Consume Electron Magaz"},{"issue":"9","key":"11189_CR25","doi-asserted-by":"publisher","first-page":"2142","DOI":"10.16383\/j.aas.c211189","volume":"48","author":"Z Honglei","year":"2022","unstructured":"Honglei Z, Li Hudong Wu, Jun CN, Hairong D (2022) \"Review of federal recommendation algorithms based on privacy protection. J Auto 48(9):2142\u20132163. https:\/\/doi.org\/10.16383\/j.aas.c211189","journal-title":"J Auto"},{"key":"11189_CR26","doi-asserted-by":"publisher","first-page":"178","DOI":"10.11992\/tis.202009032","volume":"161","author":"W Jianzong","year":"2021","unstructured":"Jianzong W, Jing X, Xinghua Z, Zeyuan L (2021) \"The federal recommended system\u2019s collaborative filtering cold start solution. J Intell Syst 161:178\u2013185. https:\/\/doi.org\/10.11992\/tis.202009032","journal-title":"J Intell Syst"},{"key":"11189_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s43926-025-00108-6","volume":"5","author":"A Khraisat","year":"2025","unstructured":"Khraisat A, Alazab A, Alazab M et al (2025) Securing federated learning: a defense strategy against targeted data poisoning attack. Discov Internet Things 5:16","journal-title":"Discov Internet Things"},{"issue":"4","key":"11189_CR28","first-page":"2715","volume":"18","author":"SH Haji","year":"2021","unstructured":"Haji SH, Abdulazeez AM (2021) Comparison of optimization techniques based on gradient descent algorithm: a review. PalArch\u2019s J Archaeol Egypt\/Egyptol 18(4):2715\u20132743","journal-title":"PalArch\u2019s J Archaeol Egypt\/Egyptol"},{"issue":"4","key":"11189_CR29","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1137\/22M1477805","volume":"45","author":"L Nurbekyan","year":"2023","unstructured":"Nurbekyan L, Lei W, Yang Y (2023) Efficient natural gradient descent methods for large-scale PDE-based optimization problems. SIAM J Sci Comput 45(4):1621\u20131655. https:\/\/doi.org\/10.1137\/22M1477805","journal-title":"SIAM J Sci Comput"},{"issue":"3","key":"11189_CR30","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1007\/s00245-020-09718-8","volume":"84","author":"TT Truong","year":"2021","unstructured":"Truong TT, Nguyen H-T (2021) Backtracking gradient descent method and some applications in large scale optimisation. Part 2: Algorithms and experiments. Appl Math Opt 84(3):2557\u20132586. https:\/\/doi.org\/10.1007\/s00245-020-09718-8","journal-title":"Appl Math Opt"},{"issue":"3","key":"11189_CR31","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/computation8030073","volume":"8","author":"D Klyuchinskiy","year":"2020","unstructured":"Klyuchinskiy D, Novikov N, Shishlenin M (2020) A modification of gradient descent method for solving coefficient inverse problem for acoustics equations. Computation 8(3):73. https:\/\/doi.org\/10.3390\/computation8030073","journal-title":"Computation"},{"issue":"136","key":"11189_CR32","first-page":"1","volume":"21","author":"B Fehrman","year":"2020","unstructured":"Fehrman B, Gess B, Jentzen A (2020) Convergence rates for the stochastic gradient descent method for non-convex objective functions. J Mach Learn Res 21(136):1\u201348","journal-title":"J Mach Learn Res"},{"issue":"3","key":"11189_CR33","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1109\/TCYB.2020.2997399","volume":"52","author":"T Sun","year":"2020","unstructured":"Sun T, Tang Ke, Li D (2020) Gradient descent learning with floats. IEEE Trans Cybernet 52(3):1763\u20131771. https:\/\/doi.org\/10.1109\/TCYB.2020.2997399","journal-title":"IEEE Trans Cybernet"},{"issue":"6","key":"11189_CR34","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1093\/bioinformatics\/btaa764","volume":"38","author":"S Stammler","year":"2022","unstructured":"Stammler S, Kussel T, Schoppmann P, Stampe F, Tremper G, Katzenbeisser S et al (2022) Mainzelliste SecureEpiLinker (MainSEL): privacy-preserving record linkage using secure multi-party computation. Bioinformatics 38(6):1657\u20131668","journal-title":"Bioinformatics"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11189-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11189-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11189-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T13:51:23Z","timestamp":1764424283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11189-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":34,"journal-issue":{"issue":"34","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["11189"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11189-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"27 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no potential conflict of interest in our paper and all authors have seen the manuscript and approved to submit to your journal. We confirm that the content of the manuscript has not been published or submitted for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}