{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:22:26Z","timestamp":1768008146489,"version":"3.49.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172283, 62272315"],"award-info":[{"award-number":["62172283, 62272315"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["2024A1515010122"],"award-info":[{"award-number":["2024A1515010122"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2023YFF0725100"],"award-info":[{"award-number":["2023YFF0725100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2024,9,30]]},"abstract":"<jats:p>Recently, federated recommendation has become a research hotspot mainly because of users\u2019 awareness of privacy in data. As a recent and important recommendation problem, in heterogeneous one-class collaborative filtering (HOCCF), each user may involve of two different types of implicit feedback, that is, examinations and purchases. So far, privacy-preserving HOCCF has received relatively little attention. Existing federated recommendation works often overlook the fact that some privacy sensitive behaviors such as purchases should be collected to ensure the basic business imperatives in e-commerce for example. Hence, the user privacy constraints can and should be relaxed while deploying a recommendation system in real scenarios. In this article, we study the federated multi-behavior recommendation problem under the assumption that purchase behaviors can be collected. Moreover, there are two additional challenges that need to be addressed when deploying federated recommendation. One is the low storage capacity for users\u2019 devices to store all the item vectors, and the other is the low computational power for users to participate in federated learning. To release the potential of privacy-preserving HOCCF, we propose a novel framework, named discrete federated multi-behavior recommendation (DFMR), which allows the collection of the business necessary behaviors (i.e., purchases) by the server. As to reduce the storage overhead, we use discrete hashing techniques, which can compress the parameters down to 1.56% of the real-valued parameters. To further improve the computation-efficiency, we design a memorization strategy in the cache updating module to accelerate the training process. Extensive experiments on four public datasets show the superiority of our DFMR in terms of both accuracy and efficiency.<\/jats:p>","DOI":"10.1145\/3652853","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T14:27:50Z","timestamp":1710772070000},"page":"1-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Discrete Federated Multi-behavior Recommendation for Privacy-Preserving Heterogeneous One-Class Collaborative Filtering"],"prefix":"10.1145","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0522-2654","authenticated-orcid":false,"given":"Enyue","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6326-9531","authenticated-orcid":false,"given":"Weike","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5059-8360","authenticated-orcid":false,"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6933-5760","authenticated-orcid":false,"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen Technology University, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,29]]},"reference":[{"key":"e_1_3_4_2_2","unstructured":"Muhammad Ammad-ud-din Elena Ivannikova Suleiman A. Khan Were Oyomno Qiang Fu Kuan Eeik Tan and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv:1901.09888. Retrieved from https:\/\/arxiv.org\/abs\/1901.09888"},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72113-8_3"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442010"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3547139"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539402"},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511997"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3402521"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559389"},{"key":"e_1_3_4_11_2","first-page":"143","volume-title":"ACM Transactions on Information Systems","volume":"22","author":"Deshpande Mukund","year":"2004","unstructured":"Mukund Deshpande and George Karypis. 2004. Item-based Top-N recommendation algorithms. ACM Transactions on Information Systems 22, 1 (2004), 143\u2013177."},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304232"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283201"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00140"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449942"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911489"},{"key":"e_1_3_4_19_2","volume-title":"Proceedings of the 4th International Conference on Learning Representations","author":"Hidasi Bal\u00e1zs","year":"2016","unstructured":"Bal\u00e1zs Hidasi, Alexandros Karatzoglou, Linas Baltrunas, and Domonkos Tikk. 2016. Session-based recommendations with recurrent neural networks. In Proceedings of the 4th International Conference on Learning Representations."},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401072"},{"key":"e_1_3_4_21_2","first-page":"1","volume-title":"Advances in Neural Information Processing Systems","volume":"27","year":"2014","unstructured":"Johnson and Christopher C. 2014. Logistic matrix factorization for implicit feedback data. Advances in Neural Information Processing Systems 27, 78 (2014), 1\u20139."},{"key":"e_1_3_4_22_2","first-page":"2961","volume-title":"IEEE Transactions on Knowledge and Data Engineering","volume":"35","author":"Jumonji Seiya","year":"2023","unstructured":"Seiya Jumonji, Kazuya Sakai, Min-Te Sun, and Wei-Shinn Ku. 2023. Privacy-preserving collaborative filtering using fully homomorphic encryption. IEEE Transactions on Knowledge and Data Engineering 35, 3 (2023), 2961\u20132974."},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487589"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"e_1_3_4_25_2","unstructured":"Jakub Kone\u010dn\u00fd H. Brendan McMahan Felix X. Yu Peter Richt\u00e1rik Ananda Theertha Suresh and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv:1610.05492. Retrieved from https:\/\/arxiv.org\/abs\/1610.05492"},{"key":"e_1_3_4_26_2","unstructured":"Daliang Li and Junpu Wang. 2019. FedMD: Heterogenous federated learning via model distillation. arXiv:1910.03581. Retrieved from https:\/\/arxiv.org\/abs\/1910.03581"},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3542631"},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186150"},{"key":"e_1_3_4_29_2","first-page":"4224","volume-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence","author":"Liang Feng","unstructured":"Feng Liang, Weike Pan, and Zhong Ming. FedRec++: Lossless federated recommendation with explicit feedback. In Proceedings of the 35th AAAI Conference on Artificial Intelligence. 4224\u20134231."},{"key":"e_1_3_4_30_2","first-page":"713","volume-title":"Scientia Sinica Informationis","volume":"52","author":"Liang Feng","year":"2022","unstructured":"Feng Liang, Enyue Yang, Weike Pan, Qiang Yang, and Zhong Ming. 2022. Survey of recommender systems based on federated learning. Scientia Sinica Informationis 52, 5 (2022), 713\u2013741."},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401081"},{"key":"e_1_3_4_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3478855"},{"key":"e_1_3_4_33_2","first-page":"1","volume-title":"ACM Transactions on Information Systems","volume":"41","author":"Lin Zhaohao","year":"2022","unstructured":"Zhaohao Lin, Weike Pan, Qiang Yang, and Zhong Ming. 2022. A generic federated recommendation framework via fake marks and secret sharing. ACM Transactions on Information Systems 41, 2 (2022), 1\u201337."},{"key":"e_1_3_4_34_2","first-page":"2106","volume-title":"Electronics","volume":"12","author":"Lu Huitong","year":"2023","unstructured":"Huitong Lu, Xiaolong Deng, and Junwen Lu. 2023. Research on efficient multi-behavior recommendation method fused with graph neural network. Electronics 12, 9 (2023), 2106."},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15937-4_9"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498436"},{"key":"e_1_3_4_37_2","first-page":"1273","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","volume":"54","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, Vol. 54. 1273\u20131282."},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474262"},{"key":"e_1_3_4_39_2","unstructured":"Nicole Mitchell Johannes Ball\u00e9 Zachary Charles and Jakub Kone\u010dn\u00fd. 2022. Optimizing the communication-accuracy trade-off in federated learning with rate-distortion theory. arXiv:2201.02664. Retrieved from https:\/\/arxiv.org\/abs\/2201.02664"},{"key":"e_1_3_4_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419188"},{"key":"e_1_3_4_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.16"},{"key":"e_1_3_4_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243652"},{"key":"e_1_3_4_43_2","first-page":"173","volume-title":"Knowledge-Based Systems","volume":"73","author":"Pan Weike","year":"2015","unstructured":"Weike Pan, Hao Zhong, Congfu Xu, and Zhong Ming. 2015. Adaptive Bayesian personalized ranking for heterogeneous implicit feedbacks. Knowledge-Based Systems 73 (2015), 173\u2013180."},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533358"},{"key":"e_1_3_4_45_2","doi-asserted-by":"publisher","DOI":"10.14428\/esann\/2021.ES2021-152"},{"key":"e_1_3_4_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3604915.3608781"},{"key":"e_1_3_4_47_2","first-page":"452","volume-title":"Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence. 452\u2013461."},{"key":"e_1_3_4_48_2","first-page":"1257","volume-title":"Proceedings of the 21st Annual Conference on Neural Information Processing Systems","author":"Salakhutdinov Ruslan","year":"2007","unstructured":"Ruslan Salakhutdinov and Andriy Mnih. 2007. Probabilistic matrix factorization. In Proceedings of the 21st Annual Conference on Neural Information Processing Systems. 1257\u20131264."},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC53654.2022.9945195"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3411528"},{"key":"e_1_3_4_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3542950"},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532081"},{"key":"e_1_3_4_54_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29763-x"},{"key":"e_1_3_4_55_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-30714-9"},{"key":"e_1_3_4_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835837"},{"key":"e_1_3_4_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-00126-0_11"},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462972"},{"key":"e_1_3_4_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_4_60_2","unstructured":"Senci Ying. 2020. Shared MF: A privacy-preserving recommendation system. arXiv:2008.07759. Retrieved from https:\/\/arxiv.org\/abs\/2008.07759"},{"key":"e_1_3_4_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570463"},{"key":"e_1_3_4_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3578361"},{"key":"e_1_3_4_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911502"},{"key":"e_1_3_4_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609578"},{"key":"e_1_3_4_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339611"},{"key":"e_1_3_4_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2974065"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:56Z","timestamp":1750287236000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":65,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,30]]}},"alternative-id":["10.1145\/3652853"],"URL":"https:\/\/doi.org\/10.1145\/3652853","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,29]]},"assertion":[{"value":"2023-03-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}