{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:53:35Z","timestamp":1766087615774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1145\/3383313.3412254","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:28:22Z","timestamp":1600482502000},"page":"150-159","source":"Crossref","is-referenced-by-count":18,"title":["Global and Local Differential Privacy for Collaborative Bandits"],"prefix":"10.1145","author":[{"given":"Huazheng","family":"Wang","sequence":"first","affiliation":[{"name":"University of Virginia, United States"}]},{"given":"Qian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Bloomberg L.P., United States"}]},{"given":"Qingyun","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Virginia, United States"}]},{"given":"Shubham","family":"Chopra","sequence":"additional","affiliation":[{"name":"Bloomberg L.P., United States"}]},{"given":"Abhinav","family":"Khaitan","sequence":"additional","affiliation":[{"name":"Bloomberg L.P., United States"}]},{"given":"Hongning","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Viriginia, United States"}]}],"member":"320","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Yasin Abbasi-yadkori D\u00e1vid P\u00e1l and Csaba Szepesv\u00e1ri. 2011. Improved Algorithms for Linear Stochastic Bandits. In NIPS. 2312\u20132320.  Yasin Abbasi-yadkori D\u00e1vid P\u00e1l and Csaba Szepesv\u00e1ri. 2011. Improved Algorithms for Linear Stochastic Bandits. In NIPS. 2312\u20132320."},{"key":"e_1_3_2_2_2_1","unstructured":"Jacob Abernethy Chansoo Lee Audra McMillan and Ambuj Tewari. 2017. Online learning via differential privacy. arXiv preprint arXiv:1711.10019(2017).  Jacob Abernethy Chansoo Lee Audra McMillan and Ambuj Tewari. 2017. Online learning via differential privacy. arXiv preprint arXiv:1711.10019(2017)."},{"volume-title":"ICML","year":"2017","author":"Agarwal Naman","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","first-page":"397","article-title":"Using Confidence Bounds for Exploitation-Exploration Trade-offs","volume":"3","author":"Auer Peter","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_2_6_1","unstructured":"Nicolo Cesa-Bianchi Claudio Gentile and Giovanni Zappella. 2013. A gang of bandits. In Advances in Neural Information Processing Systems. 737\u2013745.  Nicolo Cesa-Bianchi Claudio Gentile and Giovanni Zappella. 2013. A gang of bandits. In Advances in Neural Information Processing Systems. 737\u2013745."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"volume-title":"Journal of Machine Learning Research","year":"2011","author":"Chaudhuri Kamalika","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2007.1115","volume-title":"Weighted graph cuts without eigenvectors a multilevel approach","author":"Dhillon S","year":"2007"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134(2014) 211\u2013407.  Cynthia Dwork Aaron Roth 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134(2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_15_1","unstructured":"Sarah Filippi Olivier Cappe Aur\u00e9lien Garivier and Csaba Szepesv\u00e1ri. 2010. Parametric bandits: The generalized linear case. In NIPS. 586\u2013594.  Sarah Filippi Olivier Cappe Aur\u00e9lien Garivier and Csaba Szepesv\u00e1ri. 2010. Parametric bandits: The generalized linear case. In NIPS. 586\u2013594."},{"volume-title":"ICML","year":"2017","author":"Gentile Claudio","key":"e_1_3_2_2_16_1"},{"volume-title":"International Conference on Machine Learning. 757\u2013765","year":"2014","author":"Gentile Claudio","key":"e_1_3_2_2_17_1"},{"volume-title":"Conference on Learning Theory. 24\u20131.","year":"2012","author":"Jain Prateek","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","unstructured":"Prateek Jain Om\u00a0Dipakbhai Thakkar and Abhradeep Thakurta. 2018. Differentially Private Matrix Completion Revisited. In ICML. 2215\u20132224.  Prateek Jain Om\u00a0Dipakbhai Thakkar and Abhradeep Thakurta. 2018. Differentially Private Matrix Completion Revisited. In ICML. 2215\u20132224."},{"key":"e_1_3_2_2_20_1","unstructured":"Jaya Kawale Hung\u00a0H Bui Branislav Kveton Long Tran-Thanh and Sanjay Chawla. 2015. Efficient Thompson Sampling for Online Matrix-Factorization Recommendation. In NIPS. 1297\u20131305.  Jaya Kawale Hung\u00a0H Bui Branislav Kveton Long Tran-Thanh and Sanjay Chawla. 2015. Efficient Thompson Sampling for Online Matrix-Factorization Recommendation. In NIPS. 1297\u20131305."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. Computer8(2009) 30\u201337.  Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. Computer8(2009) 30\u201337.","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.137"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911548"},{"volume-title":"com recommendations: Item-to-item collaborative filtering","year":"2003","author":"Linden Greg","key":"e_1_3_2_2_25_1"},{"volume-title":"RecSys","year":"2015","author":"Liu Ziqi","key":"e_1_3_2_2_26_1"},{"volume-title":"Proceedings of the 15th ACM SIGKDD. ACM, 627\u2013636","year":"2009","author":"McSherry Frank","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3020847.3020909"},{"key":"e_1_3_2_2_29_1","unstructured":"Seth Neel and Aaron Roth. 2018. Mitigating bias in adaptive data gathering via differential privacy. arXiv preprint arXiv:1806.02329(2018).  Seth Neel and Aaron Roth. 2018. Mitigating bias in adaptive data gathering via differential privacy. arXiv preprint arXiv:1806.02329(2018)."},{"key":"e_1_3_2_2_30_1","unstructured":"Roshan Shariff and Or Sheffet. 2018. Differentially Private Contextual Linear Bandits. In Advances in Neural Information Processing Systems. 4296\u20134306.  Roshan Shariff and Or Sheffet. 2018. Differentially Private Contextual Linear Bandits. In Advances in Neural Information Processing Systems. 4296\u20134306."},{"volume-title":"A survey of collaborative filtering techniques. Advances in artificial intelligence 2009","year":"2009","author":"Su Xiaoyuan","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","unstructured":"Jun Tang Aleksandra Korolova Xiaolong Bai Xueqiang Wang and Xiaofeng Wang. 2017. Privacy loss in apple\u2019s implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753(2017).  Jun Tang Aleksandra Korolova Xiaolong Bai Xueqiang Wang and Xiaofeng Wang. 2017. Privacy loss in apple\u2019s implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753(2017)."},{"key":"e_1_3_2_2_33_1","unstructured":"Abhradeep\u00a0Guha Thakurta and Adam Smith. 2013. (Nearly) optimal algorithms for private online learning in full-information and bandit settings. In Advances in Neural Information Processing Systems. 2733\u20132741.  Abhradeep\u00a0Guha Thakurta and Adam Smith. 2013. (Nearly) optimal algorithms for private online learning in full-information and bandit settings. In Advances in Neural Information Processing Systems. 2733\u20132741."},{"volume-title":"AAAI","year":"2017","author":"Charles\u00a0Yedia Tossou Aristide","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983847"},{"volume-title":"AAAI","year":"2017","author":"Wang Huazheng","key":"e_1_3_2_2_36_1"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911528"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492519"}],"event":{"name":"RecSys '20: Fourteenth ACM Conference on Recommender Systems","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGecom Special Interest Group on Economics and Computation"],"location":"Virtual Event Brazil","acronym":"RecSys '20"},"container-title":["Fourteenth ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383313.3412254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383313.3412254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:21Z","timestamp":1750199601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383313.3412254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":38,"alternative-id":["10.1145\/3383313.3412254","10.1145\/3383313"],"URL":"https:\/\/doi.org\/10.1145\/3383313.3412254","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]}}}