{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:25:04Z","timestamp":1762352704552},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T00:00:00Z","timestamp":1534723200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The Funding Support to ECS Proposal","award":["RG 23\/2017-2018R"],"award-info":[{"award-number":["RG 23\/2017-2018R"]}]},{"name":"a grant from Research Grants Council of Hong Kong Special Administrative Region, China","award":["UGC\/FDS11\/E03\/16"],"award-info":[{"award-number":["UGC\/FDS11\/E03\/16"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572336"],"award-info":[{"award-number":["61572336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572335"],"award-info":[{"award-number":["61572335"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402313"],"award-info":[{"award-number":["61402313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s10844-018-0525-4","type":"journal-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T11:13:00Z","timestamp":1534763580000},"page":"205-224","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-preserving shared collaborative web services QoS prediction"],"prefix":"10.1007","volume":"54","author":[{"given":"An","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xindi","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Haoran","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Zhixu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiajie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fu Lee","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,20]]},"reference":[{"key":"525_CR1","doi-asserted-by":"crossref","unstructured":"Berlioz, A., Friedman, A., Kaafar, M.A., Boreli, R., Berkovsky, S. (2015). Applying differential privacy to matrix factorization. In Proceedings of the 9th ACM conference on recommender systems (pp. 107\u2013114). ACM.","DOI":"10.1145\/2792838.2800173"},{"key":"525_CR2","doi-asserted-by":"crossref","unstructured":"Calandrino, J.A., Kilzer, A., Narayanan, A. , Felten, E.W., Shmatikov, V. (2011). \u201cyou might also like:\u201d privacy risks of collaborative filtering. In 2011 IEEE Symposium on security and privacy (SP) (pp. 231\u2013246). IEEE.","DOI":"10.1109\/SP.2011.40"},{"issue":"1","key":"525_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TSC.2011.35","volume":"6","author":"X Chen","year":"2013","unstructured":"Chen, X., Zheng, Z., Liu, X., Huang, Z., Sun, H. (2013). Personalized QoS-aware web service recommendation and visualization. IEEE Transactions on Services Computing, 6(1), 35\u201347.","journal-title":"IEEE Transactions on Services Computing"},{"key":"525_CR4","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2008). Differential privacy: a survey of results. In International conference on theory and applications of models of computation (pp. 1\u201319). Springer.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"525_CR5","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2011). Differential privacy encyclopedia of cryptography and security.","DOI":"10.1007\/978-1-4419-5906-5_752"},{"issue":"3","key":"525_CR6","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L. (2012). Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Transactions on Information Forensics and Security, 7(3), 1053\u20131066.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"525_CR7","unstructured":"Gentry, C. (2009). A fully homomorphic encryption scheme. PhD thesis Stanford University."},{"issue":"8","key":"525_CR8","doi-asserted-by":"publisher","first-page":"862","DOI":"10.14778\/2757807.2757811","volume":"8","author":"R Guerraoui","year":"2015","unstructured":"Guerraoui, R., Kermarrec, A.-M., Patra, R., Taziki, M. (2015). D 2 p: distance-based differential privacy in recommenders. Proceedings of the VLDB Endowment, 8(8), 862\u2013873.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"525_CR9","unstructured":"Jorgensen, Z., & Yu, T. (2014). A privacy-preserving framework for personalized, social recommendations. In EDBT (pp. 571\u2013582)."},{"key":"525_CR10","doi-asserted-by":"crossref","unstructured":"Kifer, D., & Machanavajjhala, A. (2011). No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD international conference on management of data (pp. 193\u2013204). ACM.","DOI":"10.1145\/1989323.1989345"},{"key":"525_CR11","unstructured":"Li, N., Li, T., Venkatasubramanian, S. (2007). t-closeness: privacy beyond k-anonymity and l-diversity In IEEE 23rd International conference on data engineering, 2007. ICDE 2007 (pp. 106\u2013115). IEEE."},{"issue":"3-4","key":"525_CR12","first-page":"203","volume":"15","author":"L Li","year":"2016","unstructured":"Li, L., An, L., Li, Q., Liu, G., Li, Z. (2016). Privacy-preserving collaborative web services QoS prediction via Yao\u2019s garbled circuits and homomorphic encryption. Journal of Web Engineering, 15(3-4), 203\u2013 225.","journal-title":"Journal of Web Engineering"},{"issue":"4","key":"525_CR13","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/s11390-009-9264-x","volume":"24","author":"A Liu","year":"2009","unstructured":"Liu, A., Liu, H., Li, Q., Huang, L., Xiao, M. (2009). Constraints-aware scheduling for transactional services composition. Journal of Computer Science and Technology, 24(4), 638\u2013651.","journal-title":"Journal of Computer Science and Technology"},{"issue":"1","key":"525_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TSC.2009.28","volume":"3","author":"A Liu","year":"2010","unstructured":"Liu, A., Li, Q., Huang, L., Mingjun, X. (2010). FACTS A framework for fault-tolerant composition of transactional web services. IEEE Transactions of Services Computing, 3(1), 46\u201359.","journal-title":"IEEE Transactions of Services Computing"},{"issue":"3","key":"525_CR15","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSC.2012.12","volume":"6","author":"A Liu","year":"2013","unstructured":"Liu, A., Li, Q., Huang, L., Ying, S., Xiao, M. (2013). Coalitional game for community-based autonomous web services cooperation. IEEE Transactions of Services Computing, 6(3), 387\u2013399.","journal-title":"IEEE Transactions of Services Computing"},{"key":"525_CR16","doi-asserted-by":"crossref","unstructured":"Liu, A., Zhengy, K., Lu, L., Liu, G., Zhao, L., Zhou, X. (2015a). Efficient secure similarity computation on encrypted trajectory data. In 2015 IEEE 31st International conference on data engineering (ICDE) (pp. 66\u201377). IEEE.","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"525_CR17","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/978-3-319-25255-1_64","volume-title":"Web Technologies and Applications","author":"Shushu Liu","year":"2015","unstructured":"Liu, S., Liu, A., Liu, G., Li, Z., Xu, J., Zhao, P., Zhao, L. (2015b). A secure and efficient framework for privacy preserving social recommendation. In Web Technologies and Applications - 17th Asia-PacificWeb Conference, APWeb 2015, Guangzhou, China, September 18-20, 2015, Proceedings (pp. 781\u2013792)."},{"issue":"5","key":"525_CR18","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11390-017-1772-5","volume":"32","author":"An Liu","year":"2017","unstructured":"Liu, A., Li, Z., Liu, G., Zheng, K., Zhang, M., Li, Q., Zhang, X. (2017a). Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Science and Technology, 32(5), 905\u2013918.","journal-title":"Journal of Computer Science and Technology"},{"key":"525_CR19","doi-asserted-by":"crossref","unstructured":"Liu, S., An, L., Li, Z., Liu, G., Xu, J., Zhao, L., Zheng, K. (2017b). Privacy-preserving collaborative web services QoS prediction via differential privacy. In Asia-Pacific Web (APWeb) and web-age information management (WAIM) joint conference on web and big data (pp. 200\u2013214). Springer.","DOI":"10.1007\/978-3-319-63579-8_16"},{"key":"525_CR20","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, A., Zhang, X., Li, Z., Liu, G., Zhao, L., Zhou, X. (2017c). When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In International Conference on database systems for advanced applications (pp. 576\u2013591). Springer.","DOI":"10.1007\/978-3-319-55753-3_36"},{"key":"525_CR21","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/ACCESS.2017.2765317","volume":"6","author":"An Liu","year":"2018","unstructured":"Liu, A., Wang, W., Li, Z., Liu, G., Li, Q., Zhou, X., Zhang, X. (2018a). A privacy-preserving framework for trust-oriented point-of-interest recommendation. IEEE Access, 6, 393\u2013404.","journal-title":"IEEE Access"},{"issue":"2","key":"525_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10707-017-0305-2","volume":"22","author":"An Liu","year":"2017","unstructured":"Liu, A., Wang, W., Shang, S., Li, Q., Zhang, X. (2018b). Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica, 22(2), 335\u2013362.","journal-title":"GeoInformatica"},{"key":"525_CR23","doi-asserted-by":"crossref","unstructured":"McSherry, F.D. (2009). Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD international conference on management of data (pp. 19\u201330). ACM.","DOI":"10.1145\/1559845.1559850"},{"key":"525_CR24","doi-asserted-by":"crossref","unstructured":"McSherry, F., & Mironov, I. (2009). Differentially private recommender systems: building privacy into the net. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 627\u2013636). ACM.","DOI":"10.1145\/1557019.1557090"},{"key":"525_CR25","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D. (2013a). Privacy-preserving matrix factorization. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (pp. 801\u2013812). ACM.","DOI":"10.1145\/2508859.2516751"},{"key":"525_CR26","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N. (2013b). Privacy-preserving ridge regression on hundreds of millions of records. In 2013 IEEE Symposium on security and privacy (SP) (pp. 334\u2013348). IEEE.","DOI":"10.1109\/SP.2013.30"},{"key":"525_CR27","doi-asserted-by":"crossref","unstructured":"Polat, H., & Du, W. (2003). Privacy-preserving collaborative filtering using randomized perturbation techniques. In Third IEEE International conference on data mining, 2003. ICDM 2003 (pp. 625\u2013628). IEEE.","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"525_CR28","doi-asserted-by":"crossref","unstructured":"Qi, L., Xiang, H., Dou, W., Yang, C., Qin, Y., Zhang, X. (2017). Privacy-preserving distributed service recommendation based on locality-sensitive hashing. In 2017 IEEE International conference on web services (ICWS) (pp. 49\u201356). IEEE.","DOI":"10.1109\/ICWS.2017.15"},{"key":"525_CR29","doi-asserted-by":"crossref","unstructured":"Shen, Y., & Jin, H. (2016). Epicrec: towards practical differentially private framework for personalized recommendation. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 180\u2013191). ACM.","DOI":"10.1145\/2976749.2978316"},{"key":"525_CR30","doi-asserted-by":"crossref","unstructured":"Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.-P. (2009). Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In Proceedings of the third ACM conference on recommender systems (pp. 157\u2013164). ACM.","DOI":"10.1145\/1639714.1639741"},{"issue":"05","key":"525_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"525_CR32","doi-asserted-by":"crossref","unstructured":"Tang, M., Jiang, Y., Liu, J., Liu, X. (2012). Location-aware collaborative filtering for QoS-based service recommendation. In 2012 IEEE 19th International conference on web services (ICWS) (pp. 202\u2013209). IEEE.","DOI":"10.1109\/ICWS.2012.61"},{"key":"525_CR33","doi-asserted-by":"crossref","unstructured":"Yao, L., Sheng, Q.Z., Segev, A., Yu, J. (2013). Recommending web services via combining collaborative filtering with content-based features. In 2013 IEEE 20th International conference on web services (ICWS) (pp. 42\u201349). IEEE.","DOI":"10.1109\/ICWS.2013.16"},{"key":"525_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ford, J., Makedon, F. (2006). Deriving private information from randomly perturbed ratings. In Proceedings of the 2006 SIAM international conference on data mining (pp. 59\u201369). SIAM.","DOI":"10.1137\/1.9781611972764.6"},{"key":"525_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Ding, C., Chi, C.-H. (2011). Collaborative filtering based service ranking using invocation histories. In 2011 IEEE International conference on web services (ICWS) (pp. 195\u2013202). IEEE.","DOI":"10.1109\/ICWS.2011.61"},{"key":"525_CR36","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I. (2009). Wsrec: A collaborative filtering based web service recommender system. In IEEE International conference on web services, 2009. ICWS 2009 (pp. 437\u2013444). IEEE.","DOI":"10.1109\/ICWS.2009.30"},{"key":"525_CR37","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Zhang, Y., Lyu, M.R. (2010). Distributed QoS evaluation for real-world web services. In 2010 IEEE International conference on web services (ICWS) (pp. 83\u201390). IEEE.","DOI":"10.1109\/ICWS.2010.10"},{"issue":"1","key":"525_CR38","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/TSC.2012.34","volume":"7","author":"Z Zheng","year":"2014","unstructured":"Zheng, Z., Zhang, Y., Lyu, M.R. (2014). Investigating QoS of real-world web services. IEEE Transactions on Services Computing, 7(1), 32\u201339.","journal-title":"IEEE Transactions on Services Computing"},{"key":"525_CR39","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, P., Zheng, Z., Lyu, M.R. (2015). A privacy-preserving QoS prediction framework for web service recommendation. In 2015 IEEE International conference on web services (ICWS) (pp. 241\u2013248). IEEE.","DOI":"10.1109\/ICWS.2015.41"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-018-0525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-018-0525-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-018-0525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:58:53Z","timestamp":1604797133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-018-0525-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,20]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["525"],"URL":"https:\/\/doi.org\/10.1007\/s10844-018-0525-4","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,20]]},"assertion":[{"value":"29 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}