{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T21:13:50Z","timestamp":1718399630433},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13278-014-0196-2","type":"journal-article","created":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T07:50:34Z","timestamp":1401522634000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy preserving collaborative filtering for KNN attack resisting"],"prefix":"10.1007","volume":"4","author":[{"given":"Tianqing","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Gang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yongli","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,1]]},"reference":[{"issue":"6","key":"196_CR1","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. Proc IEEE Trans Knowl Data Eng 17(6):734\u2013749","journal-title":"Proc IEEE Trans Knowl Data Eng"},{"key":"196_CR2","doi-asserted-by":"crossref","unstructured":"Banerjee S, Hegde N, Massouli\u00e9 L (2012) The price of privacy in untrusted recommendation engines. In: 50th annual allerton conference on communication, control, and computing (allerton). Monticello, IL, pp 920\u2013927","DOI":"10.1109\/Allerton.2012.6483317"},{"key":"196_CR3","doi-asserted-by":"crossref","unstructured":"Berkovsky S, Eytani Y, Kuflik T, Ricci F (2007) Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the 2007 ACM conference on recommender systems, RecSys \u201907, ACM, New York, NY, USA, 2007, pp 9\u201316","DOI":"10.1145\/1297231.1297234"},{"key":"196_CR4","doi-asserted-by":"crossref","unstructured":"Bhaskar R, Laxman S, Smith A, Thakurta A (2010) Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, (KDD \u201910), ACM, New York, NY, USA, 2010, pp. 503\u2013512","DOI":"10.1145\/1835804.1835869"},{"key":"196_CR5","unstructured":"Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V (2011) \u201cyou might also like: \u201d privacy risks of collaborative filtering. In: Proceedings of the 2011 IEEE symposium on security and privacy, SP \u201911, IEEE Computer Society, Washington, DC, USA, 2011, pp 231\u2013246"},{"key":"196_CR6","doi-asserted-by":"crossref","unstructured":"Canny J (2002) Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval, SIGIR \u201902, ACM, New York, NY, USA, 2002, pp 238\u2013245","DOI":"10.1145\/564376.564419"},{"key":"196_CR7","doi-asserted-by":"crossref","unstructured":"Chen R, Fung BC, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201912, ACM, New York, NY, USA, 2012, pp 213\u2013221","DOI":"10.1145\/2339530.2339564"},{"key":"196_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy, In: Proceedings of the 33rd international conference on automata, languages and programming, ICALP\u201906, Springer, Berlin, pp 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"196_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the 5th international conference on theory and applications of models of computation, TAMC\u201908, Springer, Berlin, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"196_CR10","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the third conference on theory of cryptography, TCC\u201906, Springer, Berlin, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"issue":"1","key":"196_CR11","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54(1):86\u201395","journal-title":"Commun ACM"},{"issue":"3","key":"196_CR12","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TKDE.2011.26","volume":"24","author":"M G\u00f6tz","year":"2012","unstructured":"G\u00f6tz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2012) Publishing search logs: a comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"196_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2012.02.006","volume":"519","author":"L Lu","year":"2012","unstructured":"Lu L, Medo M, Yeung CH, Zhang Y-C, Zhang Z-K, Zhou T (2012) Recommender systems. Phys Rep 519(1):1\u201349","journal-title":"Phys Rep"},{"issue":"7","key":"196_CR14","doi-asserted-by":"crossref","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala A, Korolova A, Sarma A (2011) Personalized social recommendations: accurate or private. Proc VLDB Endow 4(7):440\u2013450","journal-title":"Proc VLDB Endow"},{"key":"196_CR15","doi-asserted-by":"crossref","unstructured":"McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD \u201909, ACM, New York, NY, USA, 2009, pp 627\u2013636","DOI":"10.1145\/1557019.1557090"},{"key":"196_CR16","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science, FOCS \u201907, IEEE Computer Society, Washington, DC, USA, 2007, pp 94\u2013103","DOI":"10.1109\/FOCS.2007.66"},{"key":"196_CR17","doi-asserted-by":"crossref","DOI":"10.1145\/1851182.1851199","volume-title":"Differentially-private network trace analysis","author":"F McSherry","year":"2010","unstructured":"McSherry F, Mahajan R (2010) Differentially-private network trace analysis, vol 40. ACM, New York"},{"key":"196_CR19","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE symposium on security and privacy, SP \u201908, IEEE Computer Society, Washington, DC, USA, 2008, pp 111\u2013125","DOI":"10.1109\/SP.2008.33"},{"key":"196_CR20","doi-asserted-by":"crossref","unstructured":"Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. In: Proceedings of the thirty-ninth annual ACM symposium on theory of computing, STOC \u201907, ACM, New York, NY, USA, 2007, pp 75\u201384","DOI":"10.1145\/1250790.1250803"},{"key":"196_CR21","doi-asserted-by":"crossref","unstructured":"Parameswaran R, Blough D (2007) Privacy preserving collaborative filtering using data obfuscation. In: Proceedings of granular computing, GRC 2007, IEEE international conference on granular computing, 2007, p 380","DOI":"10.1109\/GrC.2007.133"},{"key":"196_CR22","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2006) Achieving private recommendations using randomized response techniques. In: Proceedings of the 10th Pacific\u2013Asia conference on advances in knowledge discovery and data mining, PAKDD\u201906, Springer, Berlin, pp 637\u2013646","DOI":"10.1007\/11731139_73"},{"key":"196_CR23","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Proceedings of data mining, ICDM 2003, Third IEEE international conference on 2003, pp 625\u2013628","DOI":"10.1109\/ICDM.2003.1250993"},{"issue":"6","key":"196_CR24","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/4236.968832","volume":"5","author":"N Ramakrishnan","year":"2001","unstructured":"Ramakrishnan N, Keller BJ, Mirza BJ, Grama AY, Karypis G (2001) Privacy risks in recommender systems. IEEE Internet Comput 5(6):54\u201362","journal-title":"IEEE Internet Comput"},{"key":"196_CR25","doi-asserted-by":"crossref","unstructured":"Ren Y, Li G, Zhang J, Zhou W (2012) The efficient imputation method for neighborhood-based collaborative filtering. In: Proceedings of CIKM, 2012, pp 684\u2013693","DOI":"10.1145\/2396761.2396849"},{"key":"196_CR26","first-page":"1","volume":"2013","author":"Y Ren","year":"2013","unstructured":"Ren Y, Li G, Zhou W (2013) A learning method for top- $$n$$ n recommendations with incomplete data. Soc Netw Anal Min 2013:1\u201314","journal-title":"Soc Netw Anal Min"},{"key":"196_CR27","doi-asserted-by":"crossref","unstructured":"Ren Y, Li G, Zhou W (2012) Learning rating patterns for top- $$n$$ n recommendations, In: Proceedings of ASONAM, 2012, pp 472\u2013479","DOI":"10.1109\/WI-IAT.2012.102"},{"issue":"4","key":"196_CR28","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/TSMCC.2010.2040275","volume":"40","author":"J Zhan","year":"2010","unstructured":"Zhan J, Hsieh C-L, Wang I-C, Sheng Hsu T, Liau C-J, Wang D-W (2010) Privacy-preserving collaborative recommender systems part C: applications and reviews. IEEE Trans Syst Man Cybern 40(4):472\u2013476","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"196_CR29","doi-asserted-by":"crossref","unstructured":"Zhu T, Li G, Zhou W, Xiong P, Yuan C (2014) Deferentially private tagging recommendation based on topic model. In: Tseng VS, Ho TB, Zhou Z, Chen ALP, Kao H (eds) Advances in knowledge discovery and data mining, vol 8443. Springer International Publishing, Switzerland, pp 557\u2013568","DOI":"10.1007\/978-3-319-06608-0_46"},{"key":"196_CR30","doi-asserted-by":"crossref","unstructured":"Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Privacy preserving for tagging recommender systems, web intelligence (WI) and intelligent agent technologies (IAT), (2013) IEEE\/WIC\/ACM international joint conferences on (WI \u201913) vol 2013, pp 81\u201388","DOI":"10.1109\/WI-IAT.2013.12"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0196-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0196-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0196-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T09:56:26Z","timestamp":1649152586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0196-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["196"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0196-2","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,1]]},"article-number":"196"}}