{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T21:33:16Z","timestamp":1777584796600,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","funder":[{"name":"Shenzhen Science and Technology Major Special Project","award":["KJZD20230923114608017"],"award-info":[{"award-number":["KJZD20230923114608017"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72442029"],"award-info":[{"award-number":["72442029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HKU-SCF FinTech Academy and Shenzhen-Hong Kong-Macao Science and Technology Plan Project","award":["SGDX202108 23103537030"],"award-info":[{"award-number":["SGDX202108 23103537030"]}]},{"name":"Theme-based Research Scheme","award":["T35-710\/20-R"],"award-info":[{"award-number":["T35-710\/20-R"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,22]]},"DOI":"10.1145\/3705328.3748051","type":"proceedings-article","created":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T10:46:13Z","timestamp":1757155573000},"page":"391-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Social Recommendation: Privacy Leakage and Countermeasure"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9402-6477","authenticated-orcid":false,"given":"Yuyue","family":"Chen","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5233-2986","authenticated-orcid":false,"given":"Peng","family":"Yang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China and Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8944-7444","authenticated-orcid":false,"given":"Zoe Lin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China and Guangdong Key Laboratory of New Security and Intelligence Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8867-5662","authenticated-orcid":false,"given":"Wenhao","family":"Wu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0730-8732","authenticated-orcid":false,"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-0649","authenticated-orcid":false,"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0891-2544","authenticated-orcid":false,"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,7]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Dan Boneh and Victor Shoup. 2023. A graduate course in applied cryptography. Draft 0.6 (2023)."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA200132"},{"key":"e_1_3_3_2_4_2","unstructured":"Jinming Cui Chaochao Chen Lingjuan Lyu Carl Yang and Wang Li. 2021. Exploiting data sparsity in secure cross-platform social recommendation. Advances in Neural Information Processing Systems 34 (2021) 10524\u201310534."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et\u00a0al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_2_7_2","unstructured":"Daniel Escudero. 2022. An introduction to secret-sharing-based secure multiparty computation. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/2540128.2540506"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Reyhani\u00a0Masoud Hamedani Irfan Ali Jiwon Hong and Sang-Wook Kim. 2021. TrustRec: An effective approach to exploit implicit trust and distrust relationships along with explicitones for accurate recommendations. Computer Science and Information Systems 18 1 (2021) 93\u2013114.","DOI":"10.2298\/CSIS200608039H"},{"key":"e_1_3_3_2_12_2","volume-title":"Introduction to Modern Cryptography (3rd edition)","author":"Katz Jonathan","year":"2021","unstructured":"Jonathan Katz and Yehuda Lindell. 2021. Introduction to Modern Cryptography (3rd edition). CRC Press."},{"key":"e_1_3_3_2_13_2","first-page":"791","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kelkar Mahimna","year":"2022","unstructured":"Mahimna Kelkar, Phi\u00a0Hung Le, Mariana Raykova, and Karn Seth. 2022. Secure poisson regression. In 31st USENIX Security Symposium (USENIX Security 22). 791\u2013808."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. Computer 42 8 (2009) 30\u201337.","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488173"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Yehuda Lindell. 2017. How to simulate it\u2013a tutorial on the simulation proof technique. Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (2017) 277\u2013346.","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Hai Liu Chao Zheng Duantengchuan Li Xiaoxuan Shen Ke Lin Jiazhang Wang Zhen Zhang Zhaoli Zhang and Neal\u00a0N Xiong. 2021. EDMF: Efficient deep matrix factorization with review feature learning for industrial recommender system. IEEE Transactions on Industrial Informatics 18 7 (2021) 4361\u20134371.","DOI":"10.1109\/TII.2021.3128240"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Claude\u00a0Elwood Shannon. 1948. A mathematical theory of communication. The Bell system technical journal 27 3 (1948) 379\u2013423.","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Gilbert\u00a0S Vernam. 1926. Cipher printing telegraph systems: For secret wire and radio telegraphic communications. Journal of the AIEE 45 2 (1926) 109\u2013115.","DOI":"10.1109\/JAIEE.1926.6534724"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417276"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"RecSys '25: Nineteenth ACM Conference on Recommender Systems","location":"Prague Czech Republic","acronym":"RecSys '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGIR ACM Special Interest Group on Information Retrieval","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Nineteenth ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3705328.3748051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T11:45:24Z","timestamp":1757159124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705328.3748051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":22,"alternative-id":["10.1145\/3705328.3748051","10.1145\/3705328"],"URL":"https:\/\/doi.org\/10.1145\/3705328.3748051","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]},"assertion":[{"value":"2025-09-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}