{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:10:00Z","timestamp":1765545000909,"version":"3.41.0"},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T00:00:00Z","timestamp":1737158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2022YFC3303004"],"award-info":[{"award-number":["2022YFC3303004"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102234, 62272274, 62202271, 62072279, 62322111, 62271289, 62472261"],"award-info":[{"award-number":["62102234, 62272274, 62202271, 62072279, 62322111, 62271289, 62472261"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2021QF129, ZR2021MF104, ZR2021MF113"],"award-info":[{"award-number":["ZR2021QF129, ZR2021MF104, ZR2021MF113"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Fund for Outstanding Young Scholars of Shandong Province","award":["ZR2022YQ60"],"award-info":[{"award-number":["ZR2022YQ60"]}]},{"name":"Research Fund for the Taishan Scholar Project of Shandong Province","award":["tsqn202306064"],"award-info":[{"award-number":["tsqn202306064"]}]},{"name":"Jinan \u201c20 Terms of New Universities\u201d","award":["202333035"],"award-info":[{"award-number":["202333035"]}]},{"name":"China Scholarship Council, and the fundamental research support of Shandong University and Kyushu University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Sequential recommendation has attracted a lot of attention from both academia and industry, however the privacy risks associated with gathering and transferring users\u2019 personal interaction data are often underestimated or ignored. Existing privacy-preserving studies are mainly applied to traditional collaborative filtering or matrix factorization rather than sequential recommendation. Moreover, these studies are mostly based on differential privacy or federated learning, which often lead to significant performance degradation, or have high requirements for communication.<\/jats:p>\n          <jats:p>\n            In this work, we address privacy-preserving from a different perspective. Unlike existing research, we capture collaborative signals of neighbor interaction sequences and directly inject indistinguishable items into the target sequence before the recommendation process begins, thereby increasing the perplexity of the target sequence. Even if the target interaction sequence is obtained by attackers, it is difficult to discern which ones are the actual user interaction records. To achieve this goal, we introduce a novel sequential recommender system called\n            <jats:bold>CoLlaborative-cOnfusion seqUential recommenDer (CLOUD)<\/jats:bold>\n            , which incorporates a collaborative confusion mechanism to modify the raw interaction sequences before conducting recommendation. Specifically, CLOUD first calculates the similarity between the target interaction sequence and other neighbor sequences to find similar sequences. Then, CLOUD considers the shared representation of the target sequence and similar sequences to determine the operation to be performed: keep, delete, or insert. A copy mechanism is designed to make items from similar sequences have a higher probability to be inserted into the target sequence. Finally, the modified sequence is used to train the recommender and predict the next item.\n          <\/jats:p>\n          <jats:p>\n            We conduct extensive experiments on three benchmark datasets. The experimental results show that CLOUD achieves a maximum modification rate of 66.57% on interaction sequences and obtains over 99% recommendation accuracy compared to the state-of-the-art sequential recommendation methods. This proves that CLOUD can effectively protect user privacy at minimal recommendation performance cost, which provides a new solution for privacy-preserving for sequential recommendation. Our implementation is available at\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"https:\/\/github.com\/weiwang0927\/CLOUD\">https:\/\/github.com\/weiwang0927\/CLOUD<\/jats:ext-link>\n            .\n          <\/jats:p>","DOI":"10.1145\/3707204","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T11:02:21Z","timestamp":1733482941000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Sequential Recommendation with Collaborative Confusion"],"prefix":"10.1145","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7080-3381","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2146-0626","authenticated-orcid":false,"given":"Yujie","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang Lab, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2964-6422","authenticated-orcid":false,"given":"Pengjie","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4592-4074","authenticated-orcid":false,"given":"Zhumin","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7462-8074","authenticated-orcid":false,"given":"Tsunenori","family":"Mine","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7291-9003","authenticated-orcid":false,"given":"Jianli","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6923-0080","authenticated-orcid":false,"given":"Qiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6130-1286","authenticated-orcid":false,"given":"Moyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8083-3501","authenticated-orcid":false,"given":"Xianye","family":"Ben","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4455-5991","authenticated-orcid":false,"given":"Yujun","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, School of Information Science and Engineering, Qingdao, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,1,18]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_3_2","unstructured":"Muhammad Ammad-Ud-Din Elena Ivannikova Suleiman A Khan Were Oyomno Qiang Fu Kuan Eeik Tan and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv:1901.09888. Retrieved from https:\/\/arxiv.org\/abs\/1901.09888"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800173"},{"key":"e_1_3_2_5_2","first-page":"57","volume-title":"Proceedings of the RecTemp@ RecSys","author":"Bogina Veronika","year":"2017","unstructured":"Veronika Bogina and Tsvi Kuflik. 2017. Incorporating dwell time in session-based recommendations with recurrent neural networks. In Proceedings of the RecTemp@ RecSys, 57\u201359."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Aldo Gael Carranza Rezsa Farahani Natalia Ponomareva Alex Kurakin Matthew Jagielski and Milad Nasr. 2024. Synthetic query generation for privacy-preserving deep retrieval systems using differentially private language models. arXiv:2305.05973. Retrieved from https:\/\/arxiv.org\/abs\/2305.05973","DOI":"10.18653\/v1\/2024.naacl-long.217"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403344"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462968"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159668"},{"key":"e_1_3_2_11_2","first-page":"4171","volume-title":"Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT \u201919)","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT \u201919), Vol. 1, Long and Short Papers. Association for Computational Linguistics, 4171\u20134186."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"issue":"1","key":"e_1_3_2_13_2","first-page":"1046","article-title":"Deep learning for sequential recommendation: Algorithms, influential factors, and evaluations","volume":"39","author":"Fang Hui","year":"2020","unstructured":"Hui Fang, Danning Zhang, Yiheng Shu, and Guibing Guo. 2020. Deep learning for sequential recommendation: Algorithms, influential factors, and evaluations. ACM Transactions on Information Systems 39, 1 (Nov. 2020), Article 10, 42 pages. 1046\u20138188","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Florent Garcin Christos Dimitrakakis and Boi Faltings. 2013. Personalized news recommendation with context trees (RecSys \u201913). ACM New York NY 105\u2013112.","DOI":"10.1145\/2507157.2507166"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191561"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449942"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0030"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271761"},{"key":"e_1_3_2_19_2","volume-title":"Proceedings of the 4th International Conference on Learning Representations (ICLR \u201916)","author":"Hidasi Bal\u00e1zs","year":"2016","unstructured":"Bal\u00e1zs Hidasi, Alexandros Karatzoglou, Linas Baltrunas, and Domonkos Tikk. 2016. Session-based recommendations with recurrent neural networks. In Proceedings of the 4th International Conference on Learning Representations (ICLR \u201916). arXiv:1511.06939. Retrieved from http:\/\/arxiv.org\/abs\/1511.06939"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Jin Huang Wayne Xin Zhao Hongjian Dou Ji-Rong Wen and Edward Y. Chang. 2018. Improving sequential recommendation with knowledge-enhanced memory networks (SIGIR \u201918). ACM New York NY 505\u2013514.","DOI":"10.1145\/3209978.3210017"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00035"},{"key":"e_1_3_2_22_2","volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR \u201915)","author":"Kingma Diederik P.","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In Proceedings of the 3rd International Conference on Learning Representations (ICLR \u201915). arXiv:1412.6980. Retrieved from http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.3968"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Jing Li Pengjie Ren Zhumin Chen Zhaochun Ren Tao Lian and Jun Ma. 2017. Neural attentive Session-based recommendation (CIKM \u201917). ACM New York NY 1419\u20131428.","DOI":"10.1145\/3132847.3132926"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583479"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532044"},{"issue":"1","key":"e_1_3_2_28_2","first-page":"857","article-title":"Self-supervised learning: Generative or contrastive","volume":"35","author":"Liu Xiao","year":"2021","unstructured":"Xiao Liu, Fanjin Zhang, Zhenyu Hou, Li Mian, Zhaoyu Wang, Jing Zhang, and Jie Tang. 2021. Self-supervised learning: Generative or contrastive. IEEE Transactions on Knowledge and Data Engineering 35, 1 (2021), 857\u2013876.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_29_2","unstructured":"Zhiwei Liu Yongjun Chen Jia Li Philip S Yu Julian McAuley and Caiming Xiong. 2021. Contrastive Self-supervised sequential recommendation with robust augmentation. arXiv:2108.06479. Retrieved from https:\/\/arxiv.org\/abs\/2108.06479"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800191"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564282"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331200"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_2_34_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Mehta Sachin","year":"2020","unstructured":"Sachin Mehta, Marjan Ghazvininejad, Srinivasan Iyer, Luke Zettlemoyer, and Hannaneh Hajishirzi. 2020. DeLighT: Deep and light-weight transformer. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557320"},{"key":"e_1_3_2_36_2","first-page":"III\u20131310","volume-title":"Proceedings of the 30th International Conference on International Conference on Machine Learning","volume":"28","author":"Pascanu Razvan","year":"2013","unstructured":"Razvan Pascanu, Tomas Mikolov, and Yoshua Bengio. 2013. On the difficulty of training recurrent neural networks. In Proceedings of the 30th International Conference on International Conference on Machine Learning, Vol. 28, (ICML\u201913). JMLR.org, III\u20131310\u2013III\u20131318."},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.128"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462836"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498433"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014806"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2805356"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159656"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/220"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109900"},{"key":"e_1_3_2_47_2","first-page":"6000","article-title":"Attention is all you need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017), 6000\u20136010.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_31"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331210"},{"issue":"7","key":"e_1_3_2_50_2","first-page":"0360","article-title":"A survey on Session-based recommender systems","volume":"54","author":"Wang Shoujin","year":"2021","unstructured":"Shoujin Wang, Longbing Cao, Yan Wang, Quan Z. Sheng, Mehmet A. Orgun, and Defu Lian. 2021. A survey on Session-based recommender systems. ACM Computing Surveys 54, 7 (Jul. 2021), Article 154, 38 pages. 0360\u20130300.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/883"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119533"},{"key":"e_1_3_2_53_2","volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR \u201915)","author":"Weston Jason","year":"2015","unstructured":"Jason Weston, Sumit Chopra, and Antoine Bordes. 2015. Memory networks. In Proceedings of the 3rd International Conference on Learning Representations (ICLR \u201915)."},{"key":"e_1_3_2_54_2","unstructured":"Chuhan Wu Fangzhao Wu Yang Cao Yongfeng Huang and Xing Xie. 2021. FedGNN: Federated graph neural network for privacy-preserving recommendation. arXiv:2102.04925. Retrieved from https:\/\/arxiv.org\/abs\/2102.04925"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018689"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412258"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301346"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16578"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00099"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3282907"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290975"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700330"},{"issue":"4","key":"e_1_3_2_63_2","first-page":"1046","article-title":"LightFR: Lightweight federated recommendation with privacy-preserving Matrix factorization","volume":"41","author":"Zhang Honglei","year":"2023","unstructured":"Honglei Zhang, Fangyuan Luo, Jun Wu, Xiangnan He, and Yidong Li. 2023. LightFR: Lightweight federated recommendation with privacy-preserving Matrix factorization. ACM Transactions on Information Systems 41, 4 (Mar. 2023), Article 90, 28 pages. 1046\u20138188","journal-title":"ACM Transactions on Information Systems"},{"issue":"5","key":"e_1_3_2_64_2","first-page":"4741","article-title":"Dynamic graph neural networks for sequential recommendation","volume":"35","author":"Zhang Mengqi","year":"2022","unstructured":"Mengqi Zhang, Shu Wu, Xueli Yu, Qiang Liu, and Liang Wang. 2022. Dynamic graph neural networks for sequential recommendation. IEEE Transactions on Knowledge and Data Engineering 35, 5 (2022), 4741\u20134753.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106434"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512111"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3707204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3707204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:14Z","timestamp":1750295894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3707204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,18]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3707204"],"URL":"https:\/\/doi.org\/10.1145\/3707204","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"type":"print","value":"1046-8188"},{"type":"electronic","value":"1558-2868"}],"subject":[],"published":{"date-parts":[[2025,1,18]]},"assertion":[{"value":"2023-09-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}