{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:05:28Z","timestamp":1761807928771,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1115199"],"award-info":[{"award-number":["IIS-1115199"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Top. Signal Process."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/jstsp.2015.2426677","type":"journal-article","created":{"date-parts":[[2015,4,27]],"date-time":"2015-04-27T18:34:33Z","timestamp":1430159673000},"page":"1306-1318","source":"Crossref","is-referenced-by-count":15,"title":["A Belief Propagation Approach to Privacy-Preserving Item-Based Collaborative Filtering"],"prefix":"10.1109","volume":"9","author":[{"given":"Jun","family":"Zou","sequence":"first","affiliation":[]},{"given":"Faramarz","family":"Fekri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864751"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032513.120149"},{"key":"ref31","first-page":"22","article-title":"A hybrid strategy for privacy-preserving recommendations for mobile shopping","author":"pessemier","year":"2014","journal-title":"Proc Workshop New Trends in Content-Based Recommender Syst (CBRecSys'14)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297234"},{"key":"ref36","article-title":"Privacy-preserving belief propagation and sampling","author":"kearns","year":"2007","journal-title":"Proc 21st Annu Conf Neural Inf Process Syst (NIPS'07)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483287"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283648"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639741"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297233"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682707"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","year":"1988","author":"pearl","key":"ref16"},{"key":"ref17","article-title":"Residual belief propagation: Informed scheduling for asynchronous message passing","author":"elidan","year":"2006","journal-title":"Proc 22nd Conf Uncertainty in AI (UAI'06)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275830"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1010614.1010618"},{"key":"ref28","first-page":"801","article-title":"Privacy-preserving matrix factorization","author":"nikolaenko","year":"2013","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security (CCS'13)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2361407.2361420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365989"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.109"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"ref8","first-page":"2201","article-title":"Beyond data: From user information to business value through personalized recommendations and consumer science","author":"amatriain","year":"2013","journal-title":"Proc 22nd ACM Int Conf Inf Knowl Manage (CIKM'13)"},{"key":"ref7","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"journal-title":"Anonymity Privacy and Security Online","year":"2013","author":"rainie","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.191"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.140"}],"container-title":["IEEE Journal of Selected Topics in Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/4200690\/7265114\/7095527-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4200690\/7265114\/07095527.pdf?arnumber=7095527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:52:09Z","timestamp":1649443929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7095527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":36,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jstsp.2015.2426677","relation":{},"ISSN":["1932-4553","1941-0484"],"issn-type":[{"type":"print","value":"1932-4553"},{"type":"electronic","value":"1941-0484"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}