{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:57:06Z","timestamp":1767999426349,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971366"],"award-info":[{"award-number":["61971366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671396"],"award-info":[{"award-number":["61671396"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP180102828"],"award-info":[{"award-number":["DP180102828"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["ARC DP200101374"],"award-info":[{"award-number":["ARC DP200101374"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1908308"],"award-info":[{"award-number":["CCF-1908308"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,15]]},"DOI":"10.1109\/jiot.2020.3027586","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T21:48:23Z","timestamp":1601416103000},"page":"4560-4568","source":"Crossref","is-referenced-by-count":47,"title":["Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0717-7488","authenticated-orcid":false,"given":"Yilin","family":"Xiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2402-611X","authenticated-orcid":false,"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8247-0353","authenticated-orcid":false,"given":"Xiaozhen","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1550-4119","authenticated-orcid":false,"given":"Hailu","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-131X","authenticated-orcid":false,"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219886"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.04.041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014201"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"ref13","first-page":"2094","article-title":"Deep reinforcement learning with double Q-learning","author":"van hasselt","year":"2016","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900351"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2933867"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307697"},{"key":"ref19","first-page":"2618","article-title":"Controlling privacy in recommender systems","author":"xin","year":"2014","journal-title":"Proc Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486242"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2903658"},{"key":"ref27","first-page":"159","article-title":"Privacy concerns in online recommender systems: Influences of control and user data input","author":"zhang","year":"2014","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2840974"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800191"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844878"},{"key":"ref5","first-page":"862","article-title":"D2P: Distance-based differential privacy in recommenders","author":"guerraoui","year":"2015","journal-title":"Proc Int Conf Very Large Data Bases (VLDB) Endowment"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978316"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"ref2","first-page":"513","article-title":"Attriguard: A practical defense against attribute inference attacks via adversarial machine learning","author":"jia","year":"2018","journal-title":"Proc Usenix Security Symp"},{"key":"ref9","first-page":"3796","article-title":"Personalized privacy-preserving social recommendation","author":"meng","year":"2018","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847302"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2442227"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875926"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2537216"},{"key":"ref26","first-page":"1877","article-title":"Utility-optimized local differential privacy mechanisms for distribution estimation","author":"murakami","year":"2019","journal-title":"Proc Usenix Security Symp"},{"key":"ref25","first-page":"1052","article-title":"Generative adversarial user model for reinforcement learning based recommendation system","author":"chen","year":"2019","journal-title":"Proc Int Conf Mach Learn (ICML)"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9371274\/9209039-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9371274\/09209039.pdf?arnumber=9209039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:46Z","timestamp":1652194426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,15]]},"references-count":31,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3027586","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,15]]}}}