{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:56:03Z","timestamp":1772121363075,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2517121"],"award-info":[{"award-number":["2517121"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,22]]},"DOI":"10.1145\/3705328.3748052","type":"proceedings-article","created":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T10:48:44Z","timestamp":1757155724000},"page":"432-440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["RecPS: Privacy Risk Scoring for Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7956-8355","authenticated-orcid":false,"given":"Jiajie","family":"He","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4945-7310","authenticated-orcid":false,"given":"Yuechun","family":"Gu","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9996-156X","authenticated-orcid":false,"given":"Keke","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,9,7]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"2018. California Consumer Privacy Act of 2018 (CCPA). Legislation enacted by the State of California. Available at https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_3_3_4_2","first-page":"13263","volume-title":"Advances in Neural Information Processing Systems","volume":"35","author":"Carlini Nicholas","year":"2022","unstructured":"Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, and Florian Tramer. 2022. The Privacy Onion Effect: Memorization is Relative. In Advances in Neural Information Processing Systems , S.\u00a0Koyejo, S.\u00a0Mohamed, A.\u00a0Agarwal, D.\u00a0Belgrave, K.\u00a0Cho, and A.\u00a0Oh (Eds.), Vol.\u00a035. Curran Associates, Inc., 13263\u201313276. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/564b5f8289ba846ebc498417e834c253-Paper-Conference.pdf"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511997"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Yashar Deldjoo Tommaso\u00a0Di Noia and Felice\u00a0Antonio Merra. 2021. A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. ACM Computing Surveys (CSUR) 54 2 (2021) 1\u201338.","DOI":"10.1145\/3439729"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Yingqiang Ge Shuchang Liu Zuohui Fu Juntao Tan Zelong Li Shuyuan Xu Yunqi Li Yikun Xian and Yongfeng Zhang. 2024. A survey on trustworthy recommender systems. ACM Transactions on Recommender Systems 3 2 (2024) 1\u201368.","DOI":"10.1145\/3652891"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3691366"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"F\u00a0Maxwell Harper and Joseph\u00a0A Konstan. 2015. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (tiis) 5 4 (2015) 1\u201319.","DOI":"10.1145\/2827872"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","unstructured":"F.\u00a0Maxwell Harper and Joseph\u00a0A. Konstan. 2015. The MovieLens Datasets: History and Context. ACM Trans. Interact. Intell. Syst. 5 4 Article 19 (Dec. 2015) 19\u00a0pages. 10.1145\/2827872","DOI":"10.1145\/2827872"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883037"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_3_3_14_2","first-page":"469","volume-title":"26th USENIX security symposium (USENIX security 17)","author":"Ho Grant","year":"2017","unstructured":"Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, and David Wagner. 2017. Detecting credential spearphishing in enterprise settings. In 26th USENIX security symposium (USENIX security 17). 469\u2013485."},{"key":"e_1_3_3_3_15_2","unstructured":"Matthew Jagielski Jonathan Ullman and Alina Oprea. 2020. Auditing differentially private machine learning: How private is private SGD? Advances in Neural Information Processing Systems 33 (2020) 22205\u201322216."},{"key":"e_1_3_3_3_16_2","first-page":"1376","volume-title":"International conference on machine learning","author":"Kairouz Peter","year":"2015","unstructured":"Peter Kairouz, Sewoong Oh, and Pramod Viswanath. 2015. The composition theorem for differential privacy. In International conference on machine learning. PMLR, 1376\u20131385."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808780"},{"key":"e_1_3_3_3_18_2","unstructured":"J\u00a0Zico Kolter and Marcus\u00a0A Maloof. 2006. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 12 (2006)."},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix Factorization Techniques for Recommender Systems. Computer 42 8 (2009) 30\u201337. 10.1109\/MC.2009.263","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Yuyuan Li Chaochao Chen Xiaolin Zheng Yizhao Zhang Biao Gong Jun Wang and Linxun Chen. 2023. Selective and collaborative influence function for efficient recommendation unlearning. Expert Systems with Applications 234 (2023) 121025.","DOI":"10.1016\/j.eswa.2023.121025"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Peter M\u00fcllner Elisabeth Lex Markus Schedl and Dominik Kowald. 2023. Differential privacy in collaborative filtering recommender systems: a review. Frontiers in big Data 6 (2023) 1249997.","DOI":"10.3389\/fdata.2023.1249997"},{"key":"e_1_3_3_3_23_2","first-page":"1631","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Nasr Milad","year":"2023","unstructured":"Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tram\u00e8r, Matthew Jagielski, Nicholas Carlini, and Andreas Terzis. 2023. Tight auditing of differentially private machine learning. In 32nd USENIX Security Symposium (USENIX Security 23). 1631\u20131648."},{"key":"e_1_3_3_3_24_2","unstructured":"Thanh\u00a0Tam Nguyen Thanh\u00a0Trung Huynh Zhao Ren Phi\u00a0Le Nguyen Alan Wee-Chung Liew Hongzhi Yin and Quoc Viet\u00a0Hung Nguyen. 2022. A survey of machine unlearning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2209.02299 (2022)."},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Rezaimehr and Chitra Dadkhah. 2021. A survey of attack detection approaches in collaborative filtering recommender systems. Artificial Intelligence Review 54 (2021) 2011\u20132066.","DOI":"10.1007\/s10462-020-09898-3"},{"key":"e_1_3_3_3_26_2","volume-title":"annual meeting of the Northeastern Educational Research Association, Kerhonkson, New York","author":"Smith Zachary\u00a0R","year":"2006","unstructured":"Zachary\u00a0R Smith and Craig\u00a0S Wells. 2006. Central limit theorem and sample size. In annual meeting of the Northeastern Educational Research Association, Kerhonkson, New York."},{"key":"e_1_3_3_3_27_2","first-page":"2615","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Song Liwei","year":"2021","unstructured":"Liwei Song and Prateek Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In 30th USENIX Security Symposium (USENIX Security 21). 2615\u20132632."},{"key":"e_1_3_3_3_28_2","unstructured":"Thomas Steinke Milad Nasr and Matthew Jagielski. 2024. Privacy auditing with one (1) training run. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365972"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Ayush\u00a0K Tarun Vikram\u00a0S Chundawat Murari Mandal and Mohan Kankanhalli. 2023. Fast yet effective machine unlearning. IEEE Transactions on Neural Networks and Learning Systems (2023).","DOI":"10.1109\/TNNLS.2023.3266233"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Paul Voigt and Axel Von\u00a0dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide 1st Ed. Cham: Springer International Publishing 10 3152676 (2017) 10\u20135555.","DOI":"10.1007\/978-3-319-57959-7_1"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Qinyong Wang Hongzhi Yin Tong Chen Junliang Yu Alexander Zhou and Xiangliang Zhang. 2022. Fast-adapting and privacy-preserving federated recommender system. The VLDB Journal 31 5 (2022) 877\u2013896.","DOI":"10.1007\/s00778-021-00700-6"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539392"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583359"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Haibo Zhang Toru Nakamura Takamasa Isohara and Kouichi Sakurai. 2023. A review on machine unlearning. SN Computer Science 4 4 (2023) 337.","DOI":"10.1007\/s42979-023-01767-4"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484770"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679804"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583447"}],"event":{"name":"RecSys '25: Nineteenth ACM Conference on Recommender Systems","location":"Prague Czech Republic","acronym":"RecSys '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGIR ACM Special Interest Group on Information Retrieval","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Nineteenth ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3705328.3748052","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3705328.3748052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T11:43:45Z","timestamp":1757159025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705328.3748052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":37,"alternative-id":["10.1145\/3705328.3748052","10.1145\/3705328"],"URL":"https:\/\/doi.org\/10.1145\/3705328.3748052","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]},"assertion":[{"value":"2025-09-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}