{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:59Z","timestamp":1774946579549,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371832","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"page":"34-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning"],"prefix":"10.1145","author":[{"given":"Ghazaleh","family":"Beigi","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ahmadreza","family":"Mosallanezhad","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ruocheng","family":"Guo","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Hamidreza","family":"Alvari","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Alexander","family":"Nou","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Detection of Violent Extremists in Social Media. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 43--47","author":"Alvari Hamidreza","year":"2019","unstructured":"Hamidreza Alvari , Soumajyoti Sarkar , and Paulo Shakarian . 2019 a. Detection of Violent Extremists in Social Media. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 43--47 . Hamidreza Alvari, Soumajyoti Sarkar, and Paulo Shakarian. 2019a. Detection of Violent Extremists in Social Media. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 43--47."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316500"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587339"},{"key":"e_1_3_2_1_4_1","volume-title":"Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 36--42","author":"Alvari Hamidreza","year":"2019","unstructured":"Hamidreza Alvari and Paulo Shakarian . 2019 . Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 36--42 . Hamidreza Alvari and Paulo Shakarian. 2019. Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). 36--42."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291026"},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191","author":"Beigi Ghazaleh","year":"2018","unstructured":"Ghazaleh Beigi and Huan Liu . 2018a. Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191 ( 2018 ). Ghazaleh Beigi and Huan Liu. 2018a. Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_15"},{"key":"e_1_3_2_1_9_1","volume-title":"Identifying novel privacy issues of online users on social media platforms by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. ACM SIGWEB Newsletter Winter","author":"Beigi Ghazaleh","year":"2019","unstructured":"Ghazaleh Beigi and Huan Liu . 2019. Identifying novel privacy issues of online users on social media platforms by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. ACM SIGWEB Newsletter Winter ( 2019 ), 4. Ghazaleh Beigi and Huan Liu. 2019. Identifying novel privacy issues of online users on social media platforms by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. ACM SIGWEB Newsletter Winter (2019), 4."},{"key":"e_1_3_2_1_10_1","volume-title":"I Am Not What I Write: Privacy Preserving Text Representation Learning. arXiv preprint arXiv:1907.03189","author":"Beigi Ghazaleh","year":"2019","unstructured":"Ghazaleh Beigi , Kai Shu , Ruocheng Guo , Suhang Wang , and Huan Liu . 2019b. I Am Not What I Write: Privacy Preserving Text Representation Learning. arXiv preprint arXiv:1907.03189 ( 2019 ). Ghazaleh Beigi, Kai Shu, Ruocheng Guo, Suhang Wang, and Huan Liu. 2019b. I Am Not What I Write: Privacy Preserving Text Representation Learning. arXiv preprint arXiv:1907.03189 (2019)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342220.3344925"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132941"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_15_1","volume-title":"An introduction to ROC analysis. Pattern recognition letters","author":"Fawcett Tom","year":"2006","unstructured":"Tom Fawcett . 2006. An introduction to ROC analysis. Pattern recognition letters , Vol. 27 , 8 ( 2006 ), 861--874. Tom Fawcett. 2006. An introduction to ROC analysis. Pattern recognition letters, Vol. 27, 8 (2006), 861--874."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium. 979--995","author":"Gong Neil Zhenqiang","year":"2016","unstructured":"Neil Zhenqiang Gong and Bin Liu . 2016 . You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors .. In USENIX Security Symposium. 979--995 . Neil Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors.. In USENIX Security Symposium. 979--995."},{"key":"e_1_3_2_1_17_1","article-title":"Attribute Inference Attacks in Online Social Networks","volume":"21","author":"Gong Neil Zhenqiang","year":"2018","unstructured":"Neil Zhenqiang Gong and Bin Liu . 2018 . Attribute Inference Attacks in Online Social Networks . ACM Transactions on Privacy and Security (TOPS) , Vol. 21 , 1 (2018). Neil Zhenqiang Gong and Bin Liu. 2018. Attribute Inference Attacks in Online Social Networks. ACM Transactions on Privacy and Security (TOPS), Vol. 21, 1 (2018).","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_18_1","article-title":"Joint link prediction and attribute inference using a social-attribute network","volume":"5","author":"Gong Neil Zhenqiang","year":"2014","unstructured":"Neil Zhenqiang Gong , Ameet Talwalkar , Lester Mackey , Ling Huang , Eui Chul Richard Shin , Emil Stefanov , Elaine Runting Shi , and Dawn Song . 2014 . Joint link prediction and attribute inference using a social-attribute network . ACM Transactions on Intelligent Systems and Technology (TIST) , Vol. 5 , 2 (2014). Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Runting Shi, and Dawn Song. 2014. Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology (TIST), Vol. 5, 2 (2014).","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_19_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_1_20_1","volume-title":"The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis)","author":"Maxwell Harper F","year":"2016","unstructured":"F Maxwell Harper and Joseph A Konstan . 2016. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis) , Vol. 5 , 4 ( 2016 ). F Maxwell Harper and Joseph A Konstan. 2016. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis), Vol. 5, 4 (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-2079"},{"key":"e_1_3_2_1_23_1","unstructured":"Jingyu Hua Chang Xia and Sheng Zhong. 2015. Differentially Private Matrix Factorization.. In IJCAI. 1763--1770.  Jingyu Hua Chang Xia and Sheng Zhong. 2015. Differentially Private Matrix Factorization.. In IJCAI. 1763--1770."},{"key":"e_1_3_2_1_24_1","volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18)","author":"Jia J","unstructured":"J Jia and Gong N Zhenqiang . 2018. AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning . In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18) . USENIX Association . J Jia and Gong NZhenqiang. 2018. AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). USENIX Association."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_3_2_1_26_1","volume-title":"Social Recommendations. EDBT","volume":"582","author":"Jorgensen Zach","year":"2014","unstructured":"Zach Jorgensen and Ting Yu . 2014 . A Privacy-Preserving Framework for Personalized , Social Recommendations. EDBT , Vol. 582 . Zach Jorgensen and Ting Yu. 2014. A Privacy-Preserving Framework for Personalized, Social Recommendations. EDBT, Vol. 582."},{"key":"e_1_3_2_1_27_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_28_1","volume-title":"Recommender systems: from algorithms to user experience. User modeling and user-adapted interaction","author":"Konstan Joseph A","year":"2012","unstructured":"Joseph A Konstan and John Riedl . 2012. Recommender systems: from algorithms to user experience. User modeling and user-adapted interaction , Vol. 22 , 1--2 ( 2012 ). Joseph A Konstan and John Riedl. 2012. Recommender systems: from algorithms to user experience. User modeling and user-adapted interaction, Vol. 22, 1--2 (2012)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557072"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2014.26"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159728"},{"key":"e_1_3_2_1_36_1","volume-title":"25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16)","author":"Zhenqiang Gong","unstructured":"Gong N Zhenqiang and B Liu . 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors . In 25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16) . USENIX Association . Gong NZhenqiang and B Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors. In 25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). USENIX Association."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/e16031586"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/502716.502737"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27189-2_16"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the twenty-fifth conference on uncertainty in artificial intelligence. AUAI Press.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2009 . BPR: Bayesian personalized ranking from implicit feedback . In Proceedings of the twenty-fifth conference on uncertainty in artificial intelligence. AUAI Press. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In Proceedings of the twenty-fifth conference on uncertainty in artificial intelligence. AUAI Press."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365989"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875483"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060754"}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","location":"Houston TX USA","acronym":"WSDM '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371832","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:14Z","timestamp":1750202594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":46,"alternative-id":["10.1145\/3336191.3371832","10.1145\/3336191"],"URL":"https:\/\/doi.org\/10.1145\/3336191.3371832","relation":{},"subject":[],"published":{"date-parts":[[2020,1,20]]},"assertion":[{"value":"2020-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}