{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:36:17Z","timestamp":1774949777354,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,7,14]],"date-time":"2018-07-14T00:00:00Z","timestamp":1531526400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,7,14]],"date-time":"2018-07-14T00:00:00Z","timestamp":1531526400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672500"],"award-info":[{"award-number":["61672500"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572474"],"award-info":[{"award-number":["61572474"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402446"],"award-info":[{"award-number":["61402446"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of International S&T Cooperation","award":["2016YFE0121500"],"award-info":[{"award-number":["2016YFE0121500"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1614576"],"award-info":[{"award-number":["1614576"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2257"],"award-info":[{"award-number":["N00014-16-1-2257"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11280-018-0620-z","type":"journal-article","created":{"date-parts":[[2018,7,14]],"date-time":"2018-07-14T08:06:12Z","timestamp":1531555572000},"page":"2853-2881","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Towards privacy preserving social recommendation under personalized privacy settings"],"prefix":"10.1007","volume":"22","author":[{"given":"Xuying","family":"Meng","sequence":"first","affiliation":[]},{"given":"Suhang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Jundong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yujun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,14]]},"reference":[{"issue":"4","key":"620_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MS.2015.100","volume":"32","author":"S Bhamidipati","year":"2015","unstructured":"Bhamidipati, S., Fawaz, N., Kveton, B., Zhang, A.: Priview: Personalized media consumption meets privacy against inference attacks. IEEE Softw. 32(4), 53\u201359 (2015)","journal-title":"IEEE Softw."},{"key":"620_CR2","doi-asserted-by":"publisher","unstructured":"Cao, Y., Yoshikawa, M., Xiao, Y., Xiong, L.: Quantifying differential privacy under temporal correlations. In: 33rd IEEE International Conference on Data Engineering, ICDE 2017. San Diego, CA, USA, April 19-22, 2017, pp. 821\u2013832. https:\/\/doi.org\/10.1109\/ICDE.2017.132 (2017)","DOI":"10.1109\/ICDE.2017.132"},{"key":"620_CR3","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12, 1069\u20131109 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"620_CR4","doi-asserted-by":"publisher","unstructured":"Cremonesi, P., Koren, Y., Turrin, R.: Performance of recommender algorithms on top-n recommendation tasks. In: Proceedings of the 2010 ACM Conference on Recommender Systems, RecSys 2010. Barcelona, Spain, September 26-30, 2010, pp. 39\u201346. https:\/\/doi.org\/10.1145\/1864708.1864721 (2010)","DOI":"10.1145\/1864708.1864721"},{"key":"620_CR5","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference, pp. 265\u2013284. Springer (2006)","DOI":"10.1007\/11681878_14"},{"issue":"3\u20134","key":"620_CR6","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends. Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends. Theor. Comput. Sci."},{"issue":"5","key":"620_CR7","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1080\/0025570X.2008.11953577","volume":"81","author":"B Eisenberg","year":"2008","unstructured":"Eisenberg, B., Sullivan, R.: Why is the sum of independent normal random variables normal? Math. Mag. 81(5), 362\u2013366 (2008)","journal-title":"Math. Mag."},{"key":"620_CR8","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pp. 17\u201332 (2014)"},{"key":"620_CR9","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM Sigsac Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"620_CR10","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the Acm Workshop on Privacy in the Electronic Society, pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"620_CR11","doi-asserted-by":"crossref","unstructured":"Hoens, T.R., Blanton, M., Chawla, N.V.: A private and reliable recommendation system for social networks. In: IEEE Second International Conference on Social Computing, pp. 816\u2013825 (2010)","DOI":"10.1109\/SocialCom.2010.124"},{"key":"620_CR12","unstructured":"Hua, J., Xia, C., Zhong, S.: Differentially private matrix factorization. In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015. Buenos Aires, Argentina, July 25-31, 2015, pp. 1763\u20131770. http:\/\/ijcai.org\/Abstract\/15\/251 (2015)"},{"key":"620_CR13","unstructured":"Jorgensen, Z., Yu, T.: A privacy-preserving framework for personalized, social recommendations. In: International Conference on Extending Database Technology, EDBT (2014)"},{"key":"620_CR14","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S.P., Rudelson, M., Ullman, J.: The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. In: ACM Symposium on Theory of Computing, pp. 775\u2013784 (2010)","DOI":"10.1145\/1806689.1806795"},{"key":"620_CR15","unstructured":"Komarova, T., Nekipelov, D., Yakovlev, E.: Estimation of treatment effects from combined data: Identification versus data security. In: Iccas-Sice, pp. 3066\u20133071 (2013)"},{"key":"620_CR16","doi-asserted-by":"crossref","unstructured":"Koren, Y.: Factorization meets the neighborhood: A multifaceted collaborative filtering model. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 426\u2013434 (2008)","DOI":"10.1145\/1401890.1401944"},{"issue":"4","key":"620_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1721654.1721677","volume":"53","author":"Y Koren","year":"2010","unstructured":"Koren, Y.: Collaborative filtering with temporal dynamics. Commun. ACM 53 (4), 89\u201397 (2010)","journal-title":"Commun. ACM"},{"issue":"8","key":"620_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren, Y., Bell, R.M., Volinsky, C.: Matrix factorization techniques for recommender systems. IEEE Comput. 42(8), 30\u201337 (2009). https:\/\/doi.org\/10.1109\/MC.2009.263","journal-title":"IEEE Comput."},{"key":"620_CR19","unstructured":"Kotz, S., Kozubowski, T., Podgorski, K.: The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance. Springer Science & Business Media (2012)"},{"key":"620_CR20","doi-asserted-by":"crossref","unstructured":"Krohngrimberghe, A., Drumond, L., Freudenthaler, C., Schmidtthieme, L.: Multi-relational matrix factorization using bayesian personalized ranking for social network data, 173\u2013182 (2012)","DOI":"10.1145\/2124295.2124317"},{"key":"620_CR21","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 226\u2013233 (2011)","DOI":"10.1109\/TrustCom.2011.31"},{"issue":"1","key":"620_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. Acm Trans. Knowl. Discov. Data 5(1), 1\u201330 (2010)","journal-title":"Acm Trans. Knowl. Discov. Data"},{"key":"620_CR23","doi-asserted-by":"publisher","unstructured":"Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: Proceedings of the Forth International Conference on Web Search and Web Data Mining, WSDM 2011. Hong Kong, China, February 9-12, 2011, pp. 287\u2013296. https:\/\/doi.org\/10.1145\/1935826.1935877 (2011)","DOI":"10.1145\/1935826.1935877"},{"issue":"7","key":"620_CR24","doi-asserted-by":"publisher","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: Accurate or private. Proc. VLDB Endow. 4(7), 440\u2013450 (2011)","journal-title":"Proc. VLDB Endow."},{"issue":"9","key":"620_CR25","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1810891.1810916","volume":"53","author":"F McSherry","year":"2010","unstructured":"McSherry, F.: Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Commun. ACM 53(9), 89\u201397 (2010). https:\/\/doi.org\/10.1145\/1810891.1810916","journal-title":"Commun. ACM"},{"key":"620_CR26","doi-asserted-by":"crossref","unstructured":"Meng, X., Xu, Z., Chen, B., Zhang, Y.: Privacy-preserving query log sharing based on prior n-word aggregation. In: Trustcom, pp. 722\u2013729 (2016)","DOI":"10.1109\/TrustCom.2016.0131"},{"key":"620_CR27","doi-asserted-by":"crossref","unstructured":"Meng, X., Wang, S., Liu, H., Zhang, Y.: Exploiting emotion on reviews for recommender systems. In: AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11685"},{"key":"620_CR28","doi-asserted-by":"crossref","unstructured":"Minkus, T., Liu, K., Ross, K.W.: Children seen but not heard: When parents compromise children\u2019s online privacy. In: International Conference on World Wide Web, pp. 776\u2013786 (2015)","DOI":"10.1145\/2736277.2741124"},{"key":"620_CR29","doi-asserted-by":"publisher","unstructured":"Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201913. Berlin, Germany, November 4-8, 2013, pp. 801\u2013812. https:\/\/doi.org\/10.1145\/2508859.2516751 (2013)","DOI":"10.1145\/2508859.2516751"},{"key":"620_CR30","unstructured":"Rajkumar, A., Agarwal, S.: A differentially private stochastic gradient descent algorithm for multiparty classification. Jmlr (2012)"},{"key":"620_CR31","unstructured":"Rendle, S., Freudenthaler, C., Gantner, Z., Schmidt-Thieme, L.: BPR: Bayesian personalized ranking from implicit feedback. In: UAI 2009, pp. 452\u2013461 (2009)"},{"key":"620_CR32","unstructured":"Salakhutdinov, R., Mnih, A.: Probabilistic matrix factorization. In: Advances in Neural Information Processing Systems 20, Proceedings of the Twenty-First Annual Conference on Neural Information Processing Systems. Vancouver, British Columbia, Canada, December 3-6, 2007, pp. 1257\u20131264. http:\/\/papers.nips.cc\/paper\/3208-probabilistic-matrix-factorization (2007)"},{"key":"620_CR33","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Shmatikov, V.: Membership inference attacks against machine learning models (2016)","DOI":"10.1109\/SP.2017.41"},{"key":"620_CR34","doi-asserted-by":"crossref","unstructured":"Shu, K., Wang, S., Tang, J., Wang, Y., Liu, H.: Crossfire: Cross media joint friend and item recommendations. In: WSDM (2018)","DOI":"10.1145\/3159652.3159692"},{"key":"620_CR35","doi-asserted-by":"publisher","unstructured":"Song, D., Meyer, D.A., Tao, D.: Top-k link recommendation in social networks. In: 2015 IEEE International Conference on Data Mining, ICDM 2015. Atlantic City, NJ, USA, November 14-17, 2015, pp. 389\u2013398. https:\/\/doi.org\/10.1109\/ICDM.2015.136 (2015)","DOI":"10.1109\/ICDM.2015.136"},{"key":"620_CR36","doi-asserted-by":"publisher","unstructured":"Song, S., Wang, Y., Chaudhuri, K.: Pufferfish privacy mechanisms for correlated data. In: Proceedings of the 2017 ACM International Conference on Management of Data, SIGMOD Conference 2017. Chicago, IL, USA, May 14-19, 2017, pp. 1291\u20131306. https:\/\/doi.org\/10.1145\/3035918.3064025 (2017)","DOI":"10.1145\/3035918.3064025"},{"issue":"4","key":"620_CR37","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s13278-013-0141-9","volume":"3","author":"J Tang","year":"2013","unstructured":"Tang, J., Hu, X., Liu, H.: Social recommendation: A review. Social Netw. Analys. Mining 3(4), 1113\u20131133 (2013). https:\/\/doi.org\/10.1007\/s13278-013-0141-9","journal-title":"Social Netw. Analys. Mining"},{"issue":"99","key":"620_CR38","first-page":"1","volume":"PP","author":"Q Tang","year":"2016","unstructured":"Tang, Q., Wang, J.: Privacy-preserving friendship-based recommender systems. IEEE Trans. Depend. Secur. Comput. PP(99), 1\u20131 (2016)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"620_CR39","unstructured":"Twitter data analysis: An investor\u2019s perspective. https:\/\/techcrunch.com\/2009\/10\/05\/twitter-data-analysis-an-investors-perspective-2"},{"key":"620_CR40","doi-asserted-by":"crossref","unstructured":"Wang, S., Tang, J., Liu, H.: Toward dual roles of users in recommender systems. In: CIKM (2015)","DOI":"10.1145\/2806416.2806520"},{"key":"620_CR41","unstructured":"Wang, Y., Si, C., Wu, X.: Regression model fitting under differential privacy and model inversion attack. In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015, pp. 1003\u20131009. http:\/\/ijcai.org\/Abstract\/15\/146 (2015)"},{"key":"620_CR42","doi-asserted-by":"crossref","unstructured":"Wang, X., Lu, W., Ester, M., Wang, C., Chen, C.: Social recommendation with strong and weak ties. In: ACM International on Conference on Information and Knowledge Management, pp. 5\u201314 (2016)","DOI":"10.1145\/2983323.2983701"},{"key":"620_CR43","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, Y., Tang, J., Shu, K., Ranganath, S., Liu, H.: What your images reveal: Exploiting visual contents for point-of-interest recommendation. In: Proceedings of WWW, pp. 391\u2013400 (2017)","DOI":"10.1145\/3038912.3052638"},{"key":"620_CR44","doi-asserted-by":"crossref","unstructured":"Wang, S., Tang, J., Wang, Y., Liu, H.: Exploring hierarchical structures for recommender systems. IEEE Transactions on Knowledge and Data Engineering (2018)","DOI":"10.1109\/TKDE.2018.2789443"},{"key":"620_CR45","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-319-12637-1_62","volume-title":"Neural Information Processing","author":"Xin Xin","year":"2014","unstructured":"Xin, Y., Jaakkola, T.: Controlling privacy in recommender systems. In: Advances in Neural Information Processing Systems, pp. 2618\u20132626 (2014)"},{"key":"620_CR46","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-37456-2_30","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Xiaowei Ying","year":"2013","unstructured":"Ying, X., Wu, X., Wang, Y.: On linear refinement of differential privacy-preserving query answering. In: Advances in Knowledge Discovery and Data Mining, 17th Pacific-Asia Conference, PAKDD 2013, Gold Coast, Australia, April 14-17, 2013, Proceedings, Part II, pp. 353\u2013364 (2013)"},{"issue":"11","key":"620_CR47","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.14778\/2350229.2350253","volume":"5","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: Regression analysis under differential privacy. Proc. Vldb Endow. 5(11), 1364\u20131375 (2012)","journal-title":"Proc. Vldb Endow."},{"key":"620_CR48","unstructured":"Zhao, T., McAuley, J.J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2014. Shanghai, China, November 3-7, 2014, pp. 261\u2013270 (2014)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-018-0620-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T15:19:38Z","timestamp":1661613578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-018-0620-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,14]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["620"],"URL":"https:\/\/doi.org\/10.1007\/s11280-018-0620-z","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,14]]},"assertion":[{"value":"18 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}