{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:21:48Z","timestamp":1773195708124,"version":"3.50.1"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T00:00:00Z","timestamp":1671580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61836005, 62172283"],"award-info":[{"award-number":["61836005, 62172283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2018AAA0101100"],"award-info":[{"award-number":["2018AAA0101100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2023,4,30]]},"abstract":"<jats:p>With the implementation of privacy protection laws such as GDPR, it is increasingly difficult for organizations to legally collect users\u2019 data. However, a typical machine learning-based recommendation algorithm requires the data to learn users\u2019 preferences. Some recent works thus turn to develop federated learning-based recommendation algorithms, but most of them either cannot protect the users\u2019 privacy well, or sacrifice the model accuracy. In this article, we propose a lossless and generic federated recommendation framework via fake marks and secret sharing (FMSS). Our FMSS can not only protect the two types of users\u2019 privacy, i.e., rating values and rating behaviors, without sacrificing the recommendation performance, but can also be applied to most recommendation algorithms for rating prediction, item ranking, and sequential recommendation. Specifically, we extend existing fake items to fake marks, and combine it with secret sharing to perturb the data uploaded by the clients to a server. We then apply our FMSS to six representative recommendation algorithms, i.e., MF-MPC and NeuMF for rating prediction, eALS and VAE-CF for item ranking, and Fossil and GRU4Rec for sequential recommendation. The experimental results demonstrate that our FMSS is a lossless and generic framework, which is able to federate a series of different recommendation algorithms in a lossless and privacy-aware manner.<\/jats:p>","DOI":"10.1145\/3548456","type":"journal-article","created":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T11:27:26Z","timestamp":1657538846000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["A Generic Federated Recommendation Framework via Fake Marks and Secret Sharing"],"prefix":"10.1145","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1246-9688","authenticated-orcid":false,"given":"Zhaohao","family":"Lin","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering and National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Nanshan District, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6326-9531","authenticated-orcid":false,"given":"Weike","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering and National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Nanshan District, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5059-8360","authenticated-orcid":false,"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6933-5760","authenticated-orcid":false,"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,21]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Muhammad Ammad-ud-din Elena Ivannikova Suleiman A. Khan Were Oyomno Qiang Fu Kuan Eeik Tan and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. Retrieved from http:\/\/arxiv.org\/abs\/1901.09888."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72113-8_3"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371832"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394138"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1080\/10670564.2017.1305488"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372408"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449942"},{"issue":"3","key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"234","DOI":"10.69554\/TCFN5165","article-title":"Understanding the scope and impact of the California consumer privacy act of 2018","volume":"2","author":"Harding Elizabeth Liz","year":"2019","unstructured":"Elizabeth Liz Harding, Jarno J. Vanto, Reece Clark, L. Hannah Ji, and Sara C. Ainsworth. 2019. Understanding the scope and impact of the California consumer privacy act of 2018. J. Data Protect. Privacy 2, 3 (2019), 234\u2013253.","journal-title":"J. Data Protect. Privacy"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0030"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911489"},{"key":"e_1_3_2_20_2","volume-title":"Proceedings of the 4th International Conference on Learning Representations (ICLR\u201916)","author":"Hidasi Bal\u00e1zs","year":"2016","unstructured":"Bal\u00e1zs Hidasi, Alexandros Karatzoglou, Linas Baltrunas, and Domonkos Tikk. 2016. Session-based recommendations with recurrent neural networks. In Proceedings of the 4th International Conference on Learning Representations (ICLR\u201916)."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.404"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.085"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487589"},{"key":"e_1_3_2_26_2","volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR\u201915)","author":"Kingma Diederik P.","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In Proceedings of the 3rd International Conference on Learning Representations (ICLR\u201915)."},{"key":"e_1_3_2_27_2","unstructured":"Jakub Kone\u010dn\u00fd H. Brendan McMahan Felix X. Yu Peter Richt\u00e1rik Ananda Theertha Suresh and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. Retrieved from http:\/\/arxiv.org\/abs\/1610.05492."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.003"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186150"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16546"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3017205"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401081"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3478855"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"issue":"1","key":"e_1_3_2_37_2","first-page":"59","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"Lindell Yehuda","year":"2009","unstructured":"Yehuda Lindell and Benny Pinkas. 2009. Secure multiparty computation for privacy-preserving data mining. IACR Cryptol. ePrint Arch. 1, 1 (2009), 59\u201398.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"e_1_3_2_39_2","first-page":"1273","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS\u201917)","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS\u201917). 1273\u20131282."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474262"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2009515"},{"key":"e_1_3_2_42_2","first-page":"2691","volume-title":"Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI\u201913)","author":"Pan Weike","year":"2013","unstructured":"Weike Pan and Li Chen. 2013. GBPR: Group preference based bayesian personalized ranking for one-class collaborative filtering. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI\u201913). 2691\u20132697."},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.30"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108441"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Tao Qi Fangzhao Wu Chuhan Wu Yongfeng Huang and Xing Xie. 2020. Privacy-preserving news recommendation model training via federated learning. Retrieved from https:\/\/arxiv.org\/abs\/2003.09592.","DOI":"10.18653\/v1\/2020.findings-emnlp.128"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.124"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2168752.2168771"},{"key":"e_1_3_2_48_2","first-page":"452","volume-title":"Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909)","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909). 452\u2013461."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_3_2_50_2","first-page":"1257","volume-title":"Proceedings of the 21st Annual Conference on Neural Information Processing Systems","author":"Salakhutdinov Ruslan","year":"2007","unstructured":"Ruslan Salakhutdinov and Andriy Mnih. 2007. Probabilistic matrix factorization. In Proceedings of the 21st Annual Conference on Neural Information Processing Systems. 1257\u20131264."},{"key":"e_1_3_2_51_2","first-page":"5638","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML\u201919)","author":"Schein Aaron","year":"2019","unstructured":"Aaron Schein, Zhiwei Steven Wu, Alexandra Schofield, Mingyuan Zhou, and Hanna M. Wallach. 2019. Locally private bayesian inference for count models. In Proceedings of the 36th International Conference on Machine Learning (ICML\u201919). 5638\u20135648."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2429117"},{"key":"e_1_3_2_54_2","first-page":"681","volume-title":"Proceedings of the 28th International Conference on Machine Learning (ICML\u201911)","author":"Welling Max","year":"2011","unstructured":"Max Welling and Yee Whye Teh. 2011. Bayesian learning via stochastic gradient langevin dynamics. In Proceedings of the 28th International Conference on Machine Learning (ICML\u201911). 681\u2013688."},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Chuhan Wu Fangzhao Wu Yang Cao Yongfeng Huang and Xing Xie. 2021. FedGNN: Federated graph neural network for privacy-preserving recommendation. Retrieved from https:\/\/arxiv.org\/abs\/2102.04925.","DOI":"10.21203\/rs.3.rs-1191595\/v1"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3506715"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29763-x"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106946"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.223"},{"key":"e_1_3_2_60_2","unstructured":"Senci Ying. 2020. Shared MF: A privacy-preserving recommendation system. Retrieved from https:\/\/arxiv.org\/abs\/2008.07759."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1137\/130943170"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03555-w"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_64_2","first-page":"14747","volume-title":"Proceedings of the Annual Conference on Neural Information Processing Systems (NeurIPS\u201919)","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. In Proceedings of the Annual Conference on Neural Information Processing Systems (NeurIPS\u201919). 14747\u201314756."}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:29Z","timestamp":1750272209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,21]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1145\/3548456"],"URL":"https:\/\/doi.org\/10.1145\/3548456","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,21]]},"assertion":[{"value":"2021-12-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}