{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:06:22Z","timestamp":1768705582733,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing Natural Science Foundation","award":["L182038"],"award-info":[{"award-number":["L182038"]}]},{"name":"National Nature Science Foundation of China","award":["U1936217,61971267,61972223,61941117,61861136003,U19A2079"],"award-info":[{"award-number":["U1936217,61971267,61972223,61941117,61861136003,U19A2079"]}]},{"name":"Tsinghua University-Tencent Joint Laboratory for Internet Innovation Technology"},{"name":"Beijing National Research Center for Information Science and Technology","award":["20031887521"],"award-info":[{"award-number":["20031887521"]}]},{"name":"The National Key Research and Development Program of China","award":["2018YFB1800804"],"award-info":[{"award-number":["2018YFB1800804"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401053","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"961-970","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["DPLCF"],"prefix":"10.1145","author":[{"given":"Chen","family":"Gao","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chao","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Dongsheng","family":"Lin","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Depeng","family":"Jin","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0049-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_3_1","volume-title":"Roksana Boreli, and Shlomo Berkovsky.","author":"Berlioz Arnaud","year":"2015","unstructured":"Arnaud Berlioz , Arik Friedman , Mohamed Ali Kaafar , Roksana Boreli, and Shlomo Berkovsky. 2015 . Applying differential privacy to matrix factorization. In RecSys . 107--114. Arnaud Berlioz, Arik Friedman, Mohamed Ali Kaafar, Roksana Boreli, and Shlomo Berkovsky. 2015. Applying differential privacy to matrix factorization. In RecSys. 107--114."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Joseph A Calandrino Ann Kilzer Arvind Narayanan Edward W Felten and Vitaly Shmatikov. 2011. \"You Might Also Like:\" Privacy Risks of Collaborative Filtering. In IEEE S&P. 231--246.  Joseph A Calandrino Ann Kilzer Arvind Narayanan Edward W Felten and Vitaly Shmatikov. 2011. \"You Might Also Like:\" Privacy Risks of Collaborative Filtering. In IEEE S&P. 231--246.","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00153"},{"key":"e_1_3_2_1_6_1","volume-title":"Quantifying differential privacy in continuous data release under temporal correlations","author":"Cao Yang","year":"2018","unstructured":"Yang Cao , Masatoshi Yoshikawa , Yonghui Xiao , and Li Xiong . 2018. Quantifying differential privacy in continuous data release under temporal correlations . IEEE Transactions on Knowledge and Data Engineering ( 2018 ). Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, and Li Xiong. 2018. Quantifying differential privacy in continuous data release under temporal correlations. IEEE Transactions on Knowledge and Data Engineering (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Chaochao Chen Ziqi Liu Peilin Zhao Zhou Jun and Li Xiaolong. 2018b. Privacy Preserving Point-of-Interest Recommendation Using Decentralized Matrix Factorization. In AAAI.  Chaochao Chen Ziqi Liu Peilin Zhao Zhou Jun and Li Xiaolong. 2018b. Privacy Preserving Point-of-Interest Recommendation Using Decentralized Matrix Factorization. In AAAI.","DOI":"10.1609\/aaai.v32i1.11244"},{"key":"e_1_3_2_1_8_1","volume-title":"Federated meta-learning for recommendation. arXiv preprint arXiv:1802.07876","author":"Chen Fei","year":"2018","unstructured":"Fei Chen , Zhenhua Dong , Zhenguo Li , and Xiuqiang He. 2018a. Federated meta-learning for recommendation. arXiv preprint arXiv:1802.07876 ( 2018 ). Fei Chen, Zhenhua Dong, Zhenguo Li, and Xiuqiang He. 2018a. Federated meta-learning for recommendation. arXiv preprint arXiv:1802.07876 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402744"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2008. Differential privacy: A survey of results. In TAMC. 1--19.  Cynthia Dwork. 2008. Differential privacy: A survey of results. In TAMC. 1--19.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_1_12_1","volume-title":"et almbox","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , et almbox . 2014 . The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science , Vol. 9 , 3--4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et almbox. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_14_1","volume-title":"Cross-domain Recommendation Without Sharing User-relevant Data. In The World Wide Web Conference. 491--502","author":"Gao Chen","year":"2019","unstructured":"Chen Gao , Xiangning Chen , Fuli Feng , Kai Zhao , Xiangnan He , Yong Li , and Depeng Jin . 2019 a . Cross-domain Recommendation Without Sharing User-relevant Data. In The World Wide Web Conference. 491--502 . Chen Gao, Xiangning Chen, Fuli Feng, Kai Zhao, Xiangnan He, Yong Li, and Depeng Jin. 2019 a. Cross-domain Recommendation Without Sharing User-relevant Data. In The World Wide Web Conference. 491--502."},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"b. Privacy-preserving Cross-domain Location Recommendation","volume":"3","author":"Gao Chen","year":"2019","unstructured":"Chen Gao , Chao Huang , Yue Yu , Huandong Wang , Yong Li , and Depeng Jin . 2019 b. Privacy-preserving Cross-domain Location Recommendation . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , Vol. 3 , 1 (2019), 1 -- 21 . Chen Gao, Chao Huang, Yue Yu, Huandong Wang, Yong Li, and Depeng Jin. 2019 b. Privacy-preserving Cross-domain Location Recommendation. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 3, 1 (2019), 1--21.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020426"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/2757807.2757811"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00034"},{"key":"e_1_3_2_1_19_1","unstructured":"Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182.  Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182."},{"key":"e_1_3_2_1_20_1","first-page":"62","article-title":"Robust decentralized low-rank matrix decomposition","volume":"7","author":"Istv\u00e1n","year":"2016","unstructured":"Istv\u00e1n HegedHu s, \u00c1rp\u00e1d Berta , Levente Kocsis , Andr\u00e1s A Bencz\u00far , and M\u00e1rk Jelasity . 2016 . Robust decentralized low-rank matrix decomposition . ACM Transactions on Intelligent Systems and Technology (TIST) , Vol. 7 , 4 (2016), 62 . Istv\u00e1n HegedHu s, \u00c1rp\u00e1d Berta, Levente Kocsis, Andr\u00e1s A Bencz\u00far, and M\u00e1rk Jelasity. 2016. Robust decentralized low-rank matrix decomposition. ACM Transactions on Intelligent Systems and Technology (TIST), Vol. 7, 4 (2016), 62.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832415.2832494"},{"key":"e_1_3_2_1_22_1","unstructured":"Peter Kairouz Sewoong Oh and Pramod Viswanath. 2014. Extremal mechanisms for local differential privacy. In Advances in neural information processing systems. 2879--2887.  Peter Kairouz Sewoong Oh and Pramod Viswanath. 2014. Extremal mechanisms for local differential privacy. In Advances in neural information processing systems. 2879--2887."},{"key":"e_1_3_2_1_23_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3, H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 . Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016). Jakub Konevc n\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"Computer","volume":"42","author":"Koren Yehuda","year":"2009","unstructured":"Yehuda Koren , Robert Bell , and Chris Volinsky . 2009 . Matrix factorization techniques for recommender systems . Computer , Vol. 42 , 8 (2009). Yehuda Koren, Robert Bell, and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. Computer, Vol. 42, 8 (2009)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.16"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2600258"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288528"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In SIGKDD. 627--636.  Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In SIGKDD. 627--636.","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_29_1","unstructured":"Huseyin Polat and Wenliang Du. 2005 a. Privacy-preserving top-n recommendation on horizontally partitioned data. In WI. 725--731.  Huseyin Polat and Wenliang Du. 2005 a. Privacy-preserving top-n recommendation on horizontally partitioned data. In WI. 725--731."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066860"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_32_1","unstructured":"Arun Rajkumar and Shivani Agarwal. 2012. A differentially private stochastic gradient descent algorithm for multiparty classification. In Artificial Intelligence and Statistics. 933--941.  Arun Rajkumar and Shivani Agarwal. 2012. A differentially private stochastic gradient descent algorithm for multiparty classification. In Artificial Intelligence and Statistics. 933--941."},{"key":"e_1_3_2_1_33_1","volume-title":"BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2009 . BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197582"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Badrul Sarwar George Karypis Joseph Konstan and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In WWW. 285--295.  Badrul Sarwar George Karypis Joseph Konstan and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In WWW. 285--295.","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_37_1","unstructured":"Virginia Smith Chao-Kai Chiang Maziar Sanjabi and Ameet S Talwalkar. 2017. Federated multi-task learning. In Advances in Neural Information Processing Systems. 4424--4434.  Virginia Smith Chao-Kai Chiang Maziar Sanjabi and Ameet S Talwalkar. 2017. Federated multi-task learning. In Advances in Neural Information Processing Systems. 4424--4434."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.43"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498241"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"e_1_3_2_1_41_1","unstructured":"Yu Xin and Tommi Jaakkola. 2014. Controlling privacy in recommender systems. In Advances in Neural Information Processing Systems. 2618--2626.  Yu Xin and Tommi Jaakkola. 2014. Controlling privacy in recommender systems. In Advances in Neural Information Processing Systems. 2618--2626."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498243"},{"key":"e_1_3_2_1_43_1","volume-title":"Collecting Preference Rankings Under Local Differential Privacy. In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 1598--1601","author":"Yang Jianyu","year":"2019","unstructured":"Jianyu Yang , Xiang Cheng , Sen Su , Rui Chen , Qiyu Ren , and Yuhan Liu . 2019 . Collecting Preference Rankings Under Local Differential Privacy. In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 1598--1601 . Jianyu Yang, Xiang Cheng, Sen Su, Rui Chen, Qiyu Ren, and Yuhan Liu. 2019. Collecting Preference Rankings Under Local Differential Privacy. In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 1598--1601."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161413"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484126"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492519"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875483"}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","location":"Virtual Event China","acronym":"SIGIR '20","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:38Z","timestamp":1750195898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401053"}},"subtitle":["Differentially Private Local Collaborative Filtering"],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":47,"alternative-id":["10.1145\/3397271.3401053","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401053","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}