{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:31:12Z","timestamp":1774629072002,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61932006"],"award-info":[{"award-number":["61932006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"national key research and development project","award":["2018YFC0831800"],"award-info":[{"award-number":["2018YFC0831800"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072065"],"award-info":[{"award-number":["62072065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011241","name":"Key Laboratory on Development and Application of Rural Renewable Energy","doi-asserted-by":"crossref","award":["cstc2019jscx-mbdxX0044"],"award-info":[{"award-number":["cstc2019jscx-mbdxX0044"]}],"id":[{"id":"10.13039\/501100011241","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2018jcyjA3041"],"award-info":[{"award-number":["cstc2018jcyjA3041"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013160","name":"Venture and Innovation Support Program for Chongqing Overseas Returnees","doi-asserted-by":"crossref","award":["cx2020004"],"award-info":[{"award-number":["cx2020004"]}],"id":[{"id":"10.13039\/501100013160","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing","award":["cx2018015"],"award-info":[{"award-number":["cx2018015"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s00779-021-01646-w","type":"journal-article","created":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:03:06Z","timestamp":1643500986000},"page":"1595-1606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An efficient and secure recommendation system based on federated matrix factorization in digital economy"],"prefix":"10.1007","volume":"27","author":[{"given":"Hongyu","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chunlei","family":"Fu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5825-2241","authenticated-orcid":false,"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,1,30]]},"reference":[{"key":"1646_CR1","unstructured":"Ammad-Ud-Din M, Ivannikova E, Khan SA, Oyomno W, Fu Q, Tan KE, Flanagan A (2019) Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv:1901.09888"},{"key":"1646_CR2","doi-asserted-by":"crossref","unstructured":"Berlioz A, Friedman A, Kaafar MA, Boreli R, Berkovsky S (2015) Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM conference on recommender systems, pp 107\u2013114","DOI":"10.1145\/2792838.2800173"},{"issue":"4","key":"1646_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M Blum","year":"1984","unstructured":"Blum M, Micali S (1984) How to generate cryptographically strong sequences of pseudorandom bits. SIAM J Comput 13(4):850\u2013864","journal-title":"SIAM J Comput"},{"key":"1646_CR4","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"1646_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1646_CR6","doi-asserted-by":"crossref","unstructured":"Bottou L\u00e9on (2010) Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT\u20192010. Springer, pp 177\u2013186","DOI":"10.1007\/978-3-7908-2604-3_16"},{"issue":"3","key":"1646_CR7","doi-asserted-by":"publisher","first-page":"13:1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory 6(3):13:1\u201313:36","journal-title":"ACM Trans Comput Theory"},{"key":"1646_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.osnem.2017.10.005","volume":"3","author":"MG Campana","year":"2017","unstructured":"Campana MG, Delmastro F (2017) Recommender systems for online and mobile social networks: a survey. Online Social Networks and Media 3:75\u201397","journal-title":"Online Social Networks and Media"},{"key":"1646_CR9","doi-asserted-by":"crossref","unstructured":"Chai D, Wang L, Chen K, Yang Q (2020) Secure federated matrix factorization. IEEE Intelligent Systems","DOI":"10.1109\/MIS.2020.3014880"},{"key":"1646_CR10","doi-asserted-by":"crossref","unstructured":"Davidson J, Liebald B, Liu J, Nandy P, Vleet TV, Gargi U, Gupta S, He Y, Lambert M, Livingston B, et al. (2010) The youtube video recommendation system. In: Proceedings of the fourth ACM conference on recommender systems, pp 293\u2013296","DOI":"10.1145\/1864708.1864770"},{"key":"1646_CR11","doi-asserted-by":"crossref","unstructured":"Debnath S, Ganguly N, Mitra P (2008) Feature weighting in content based recommendation system using social network analysis. In: Proceedings of the 17th international conference on World Wide Web, pp 1041\u20131042","DOI":"10.1145\/1367497.1367646"},{"issue":"6","key":"1646_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22 (6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"1646_CR13","doi-asserted-by":"crossref","unstructured":"Farashahi RR, Schoenmakers B, Sidorenko A (2007) Efficient pseudorandom generators based on the ddh assumption. In: International workshop on public key cryptography. Springer, pp 426\u2013441","DOI":"10.1007\/978-3-540-71677-8_28"},{"key":"1646_CR14","doi-asserted-by":"crossref","unstructured":"Fiore D, Gennaro R, Pastro V (2014) Efficiently verifiable computation on encrypted data. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 844\u2013855","DOI":"10.1145\/2660267.2660366"},{"issue":"15-16","key":"1646_CR15","doi-asserted-by":"publisher","first-page":"9735","DOI":"10.1007\/s11042-019-08059-1","volume":"79","author":"J Guo","year":"2019","unstructured":"Guo J, Li C, Zhang G, Sun Y, Bie R (2019) Blockchain-enabled digital rights management for multimedia resources of online education. Multimed Tools Appl 79(15-16):9735\u20139755","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"1646_CR16","first-page":"1","volume":"5","author":"FM Harper","year":"2015","unstructured":"Harper FM, Konstan JA (2015) The movielens datasets: history and context. ACM Trans Interact Intell Syst (tiis) 5(4):1\u201319","journal-title":"ACM Trans Interact Intell Syst (tiis)"},{"issue":"3","key":"1646_CR17","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1109\/TNET.2021.3063102","volume":"29","author":"C Hu","year":"2021","unstructured":"Hu C, Cheng X, Tian Z, Yu J, Lv W (2021) Achieving privacy preservation and billing via delayed information release. IEEE\/ACM Trans Netw 29(3):1376\u20131390","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1646_CR18","doi-asserted-by":"crossref","unstructured":"Jalalirad A, Scavuzzo M, Capota C, Sprague M (2019) A simple and efficient federated recommender system. In: Proceedings of the 6th IEEE\/ACM international conference on big data computing, applications and technologies, pp 53\u201358","DOI":"10.1145\/3365109.3368788"},{"key":"1646_CR19","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet Aur\u00e9lien, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, et al. (2019) Advances and open problems in federated learning"},{"key":"1646_CR20","doi-asserted-by":"crossref","unstructured":"Kim S, Kim J, Koo D, Kim Y, Yoon H, Shin J (2016) Efficient privacy-preserving matrix factorization via fully homomorphic encryption. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, pp 617\u2013628","DOI":"10.1145\/2897845.2897875"},{"issue":"8","key":"1646_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren Y, Bell R, Volinsky C (2009) Matrix factorization techniques for recommender systems. Computer 42(8):30\u201337","journal-title":"Computer"},{"issue":"4","key":"1646_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MWC.2015.7224730","volume":"22","author":"H Li","year":"2015","unstructured":"Li H, Liu D, Dai Y, Luan TH (2015) Engineering searchable encryption of mobile cloud networks: when qoe meets qop. IEEE Wireless Communications 22(4):74\u201380","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"1646_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TETC.2014.2371239","volume":"3","author":"H Li","year":"2014","unstructured":"Li H, Liu D, Dai Y, Luan TH, Shen XS (2014) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3(1):127\u2013138","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"1646_CR24","doi-asserted-by":"crossref","unstructured":"Li T, Song L, Fragouli C (2020) Federated recommendation system via differential privacy. In: IEEE international symposium on information theory, ISIT 2020, Los Angeles, CA, USA, June 21-26, 2020. IEEE, pp 2592\u20132597","DOI":"10.1109\/ISIT44484.2020.9174297"},{"key":"1646_CR25","doi-asserted-by":"crossref","unstructured":"McDonald DW, Ackerman MS (2000) Expertise recommender: a flexible recommendation system and architecture. In: Proceedings of the 2000 ACM conference on computer supported cooperative work, pp 231\u2013240","DOI":"10.1145\/358916.358994"},{"key":"1646_CR26","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Ag\u00fcera y Arcas B (2017) Communication-efficient learning of deep networks from decentralized data. In: Singh A, Zhu X (Jerry) (eds) Proceedings of the 20th international conference on artificial intelligence and statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA, volume 54 of Proceedings of Machine Learning Research. PMLR, pp 1273\u20131282"},{"key":"1646_CR27","doi-asserted-by":"crossref","unstructured":"McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the netflix prize contenders. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 627\u2013636","DOI":"10.1145\/1557019.1557090"},{"key":"1646_CR28","doi-asserted-by":"crossref","unstructured":"Muhammad K, Wang Q, O\u2019Reilly-Morgan D, Tragos EZ, Smyth B, Hurley N, Geraci J, Lawlor A (2020) Fedfast: going beyond average for faster training of federated recommender systems. In: Gupta R, Liu Y, Tang J, Prakash BA (eds) KDD \u201920: the 26th ACM SIGKDD conference on knowledge discovery and data mining, virtual event, CA, USA, August 23-27, 2020, pages 1234\u20131242. ACM","DOI":"10.1145\/3394486.3403176"},{"key":"1646_CR29","unstructured":"Nichol A, Achiam J, Schulman J (2018) On first-order meta-learning algorithms. arXiv:1803.02999"},{"key":"1646_CR30","doi-asserted-by":"crossref","unstructured":"Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D (2013) Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 801\u2013812","DOI":"10.1145\/2508859.2516751"},{"key":"1646_CR31","doi-asserted-by":"crossref","unstructured":"Osvik DA, Bos JW, Stefan D, Canright D (2010) Fast software aes encryption. In: International workshop on fast software encryption. Springer, pp 75\u201393","DOI":"10.1007\/978-3-642-13858-4_5"},{"issue":"6","key":"1646_CR32","first-page":"276","volume":"5","author":"A Ozturk","year":"2015","unstructured":"Ozturk A, Polat H (2015) From existing trends to future trends in privacy-preserving collaborative filtering. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 5(6):276\u2013291","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"1646_CR33","doi-asserted-by":"crossref","unstructured":"Pazzani MJ, Billsus D (2007) Content-based recommendation systems. In: The adaptive web. Springer, pp 325\u2013341","DOI":"10.1007\/978-3-540-72079-9_10"},{"issue":"9","key":"1646_CR34","doi-asserted-by":"publisher","first-page":"8077","DOI":"10.1109\/JIOT.2020.2997389","volume":"7","author":"Y Pu","year":"2020","unstructured":"Pu Y, Hu C, Deng S, Alrawais A (2020) R2PEDS: a recoverable and revocable privacy-preserving edge data sharing scheme. IEEE Internet of Things Journal 7(9):8077\u20138089","journal-title":"IEEE Internet of Things Journal"},{"key":"1646_CR35","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.ins.2020.05.087","volume":"540","author":"Y Pu","year":"2020","unstructured":"Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Information Sciences 540:308\u2013324","journal-title":"Information Sciences"},{"key":"1646_CR36","doi-asserted-by":"crossref","unstructured":"Schafer JB, Frankowski D, Herlocker J, Sen S (2007) Collaborative filtering recommender systems. In: The adaptive web. Springer, pp 291\u2013324","DOI":"10.1007\/978-3-540-72079-9_9"},{"issue":"11","key":"1646_CR37","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Communications of the ACM 22(11):612\u2013613","journal-title":"Communications of the ACM"},{"issue":"3","key":"1646_CR38","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s00779-018-1121-x","volume":"22","author":"Y Sun","year":"2018","unstructured":"Sun Y, Fang M, Wang X (2018) A novel stock recommendation system using guba sentiment analysis. Personal and Ubiquitous Computing 22(3):575\u2013587","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"1646_CR39","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s00779-018-1159-9","volume":"22","author":"Y Sun","year":"2018","unstructured":"Sun Y, Zhang J, Bie R, Yu J (2018) Advancing researches on iot systems and intelligent applications. Personal and Ubiquitous Computing 22(3):449\u2013452","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"1646_CR40","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF02293745","volume":"42","author":"Y Takane","year":"1977","unstructured":"Takane Y, Young FW, Leeuw JD (1977) Nonmetric individual differences multidimensional scaling: an alternating least squares method with optimal scaling features. Psychometrika 42(1):7\u201367","journal-title":"Psychometrika"},{"key":"1646_CR41","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.eswa.2016.09.040","volume":"69","author":"J Wei","year":"2017","unstructured":"Wei J, He J, Chen K, Zhou Y, Tang Z (2017) Collaborative filtering and deep learning based recommendation system for cold start items. Expert Systems with Applications 69:29\u201339","journal-title":"Expert Systems with Applications"},{"key":"1646_CR42","doi-asserted-by":"crossref","unstructured":"Wu C, Wu F, Cao Y, Huang Y, Xie X (2021) Fedgnn: federated graph neural network for privacy-preserving recommendation. arXiv:2102.04925","DOI":"10.1038\/s41467-022-30714-9"},{"issue":"2","key":"1646_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1\u201319","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01646-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01646-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01646-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T09:25:37Z","timestamp":1693301137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01646-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,30]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1646"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01646-w","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,30]]},"assertion":[{"value":"28 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}