{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:43:37Z","timestamp":1775069017733,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Sci. Eng."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s41019-016-0020-2","type":"journal-article","created":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T03:37:30Z","timestamp":1475033850000},"page":"161-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["A Practical Privacy-Preserving Recommender System"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5289-4833","authenticated-orcid":false,"given":"Shahriar","family":"Badsha","sequence":"first","affiliation":[]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,28]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Resnick P, Iacovou N, Suchak M, Bergstrom P, Riedl J (1994) Grouplens: an open architecture for collaborative filtering of netnews. In: Proceedings of the 1994 ACM conference on computer supported cooperative work. ACM, pp 175\u2013186","DOI":"10.1145\/192844.192905"},{"issue":"08","key":"20_CR2","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1142\/S0218194013500320","volume":"23","author":"A Bilge","year":"2013","unstructured":"Bilge A, Kaleli C, Yakut I, Gunes I, Polat H (2013) A survey of privacy-preserving collaborative filtering schemes. Int J Softw Eng Knowl Eng 23(08):1085\u20131108","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Zhang S, Ford J, Makedon F (2006) Deriving private information from randomly perturbed ratings. In: SDM. SIAM, pp 59\u201369","DOI":"10.1137\/1.9781611972764.6"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2005) SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM symposium on applied computing. ACM, pp 791\u2013795","DOI":"10.1145\/1066677.1066860"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux J-P (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of the third ACM conference on recommender systems. ACM, pp 157\u2013164","DOI":"10.1145\/1639714.1639741"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"McSherry F, Mironov I (2009) Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 627\u2013636","DOI":"10.1145\/1557019.1557090"},{"issue":"7","key":"20_CR7","doi-asserted-by":"crossref","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endow 4(7):440\u2013450","journal-title":"Proc VLDB Endow"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Canny J (2002) Collaborative filtering with privacy. In: Security and privacy. Proceedings of the 2002 IEEE symposium on. IEEE, pp 45\u201357","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"20_CR9","unstructured":"Hofmann T, Hartmann D (2005) Collaborative filtering with privacy via factor analysis. In: Proceedings of the 2005 ACM symposium on applied computing, pp 791\u2013795"},{"key":"20_CR10","unstructured":"Erkin Z, Beye M, Veugen T, Lagendijk RL (2010) Privacy enhanced recommender system. In: IEEE Benelux information theory chapter"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Erkin Z, Veugen T, Lagendijk RL (2011) Generating private recommendations in a social trust network. In: Computational aspects of social networks (CASoN), 2011 international conference on. IEEE, pp 82\u201387","DOI":"10.1109\/CASON.2011.6085923"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kikuchi H, Kizawa H, Tada M (2009) Privacy-preserving collaborative filtering schemes. In: 2009 International conference on availability, reliability and security. IEEE, pp 911\u2013916","DOI":"10.1109\/ARES.2009.148"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Tada M, Kikuchi H, Puntheeranurak S (2010) Privacy-preserving collaborative filtering protocol based on similarity between items. In: Advanced information networking and applications (AINA), 2010 24th IEEE international conference on. IEEE, pp 573\u2013578","DOI":"10.1109\/AINA.2010.159"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Zhu T, Li G, Ren Y, Zhou W, Xiong P (2013) Differential privacy for neighborhood-based collaborative filtering. In: Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining. ACM, pp 752\u2013759","DOI":"10.1145\/2492517.2492519"},{"key":"20_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-12229-8","volume-title":"Homomorphic encryption and applications","author":"X Yi","year":"2014","unstructured":"Yi X, Paulet R, Bertino E (2014) Homomorphic encryption and applications. Springer, Berlin"},{"issue":"4","key":"20_CR16","first-page":"19","volume":"5","author":"FM Harper","year":"2015","unstructured":"Harper FM, Konstan JA (2015) The movielens datasets: history and context. ACM Trans Interact Intell Syst (TiiS) 5(4):19","journal-title":"ACM Trans Interact Intell Syst (TiiS)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. In: Data mining, 2003. ICDM 2003. Third IEEE international conference on. IEEE, pp 625\u2013628","DOI":"10.1109\/ICDM.2003.1250993"}],"container-title":["Data Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0020-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41019-016-0020-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0020-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T07:59:17Z","timestamp":1692518357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41019-016-0020-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["20"],"URL":"https:\/\/doi.org\/10.1007\/s41019-016-0020-2","relation":{},"ISSN":["2364-1185","2364-1541"],"issn-type":[{"value":"2364-1185","type":"print"},{"value":"2364-1541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}