{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:10:09Z","timestamp":1775553009505,"version":"3.50.1"},"reference-count":205,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Foreign Expert Project of China","award":["Y20240264"],"award-info":[{"award-number":["Y20240264"]}]},{"name":"Sichuan Science and Technology Program","award":["2022YFWZ0006"],"award-info":[{"award-number":["2022YFWZ0006"]}]},{"name":"Wenzhou-Kean University Internal Start-up Research","award":["ISRG2024005"],"award-info":[{"award-number":["ISRG2024005"]}]},{"DOI":"10.13039\/501100000923","name":"The Australian Research Council","doi-asserted-by":"crossref","award":["DP240100356"],"award-info":[{"award-number":["DP240100356"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>Recommender systems (RS) play an integral role in many online platforms. Exponential growth and potential commercial interests are raising significant concerns around privacy, security, fairness, and overall responsibility. The existing literature around responsible recommendation services is diverse and multidisciplinary. Most literature reviews cover a specific aspect or a single technology for responsible behavior, such as federated learning or blockchain. This study integrates relevant concepts across disciplines to provide a broader representation of the landscape. We review the latest advancements toward building privacy-preserved and responsible recommendation services for the e-commerce industry. The survey summarizes recent, high-impact works on diverse aspects and technologies that ensure responsible behavior in RS through an interconnected taxonomy. We contextualize potential privacy threats, practical significance, industrial expectations, and research remedies. From the technical viewpoint, we analyze conventional privacy defenses and provide an overview of emerging technologies including differential privacy, federated learning, and blockchain. The methods and concepts across technologies are linked based on their objectives, challenges, and future directions. In addition, we also develop an open source repository that summarizes a wide range of evaluation benchmarks, codebases, and toolkits to aid the further research. The survey offers a holistic perspective on this rapidly evolving landscape by synthesizing insights from both RS and responsible AI literature.<\/jats:p>","DOI":"10.1145\/3708982","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T11:12:16Z","timestamp":1734606736000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0846-7281","authenticated-orcid":false,"given":"Waqar","family":"Ali","sequence":"first","affiliation":[{"name":"Wenzhou-Kean University, Wenzhou, China"},{"name":"Sichuan Artificial Intelligence Research Institute, Yibin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1302-818X","authenticated-orcid":false,"given":"Xiangmin","family":"Zhou","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2615-1555","authenticated-orcid":false,"given":"Jie","family":"Shao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,1,9]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/BESC57393.2022.9995357"},{"issue":"7","key":"e_1_3_2_3_2","first-page":"1104","article-title":"A survey of privacy solutions using blockchain for recommender systems: Current status, classification and open issues","volume":"64","author":"Abduljabbar Tamara Abdulmunim","year":"2021","unstructured":"Tamara Abdulmunim Abduljabbar, Xiaohui Tao, Ji Zhang, Xujuan Zhou, Lin Li, and Yi Cai. 2021. A survey of privacy solutions using blockchain for recommender systems: Current status, classification and open issues. Comput. J. 64, 7 (2021), 1104\u20131129.","journal-title":"Comput. J."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543846"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10989-8_28"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10986-7_42"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03644-w"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2022.102113"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3527449"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxab025"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3633520"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3651168"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89432-0_22"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijguc.2021.117882"},{"key":"e_1_3_2_15_2","article-title":"Federated collaborative filtering for privacy-preserving personalized recommendation system","volume":"1901","author":"Ammad-ud-din Muhammad","year":"2019","unstructured":"Muhammad Ammad-ud-din, Elena Ivannikova, Suleiman A. Khan, Were Oyomno, Qiang Fu, Kuan Eeik Tan, and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. CoRR abs\/1901.09888 (2019).","journal-title":"CoRR"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Vito Walter Anelli Yashar Deldjoo Tommaso Di Noia Antonio Ferrara and Fedelucio Narducci. 2021. FedeRank: User controlled feedback with federated recommender systems. In Advances in Information Retrieval. Lecture Notes in Computer Science Vol. 12656. Springer 32\u201347.","DOI":"10.1007\/978-3-030-72113-8_3"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-021-00688-z"},{"issue":"6","key":"e_1_3_2_18_2","first-page":"472","article-title":"Blockchain-based data sharing for decentralized tourism destinations recommendation system","volume":"13","author":"Arif Yunifa Miftachul","year":"2020","unstructured":"Yunifa Miftachul Arif, Hani Nurhayati, Fachrul Kurniawan, Supeno Mardi Susiki Nugroho, and Mochamad Hariadi. 2020. Blockchain-based data sharing for decentralized tourism destinations recommendation system. Int. J. Intell. Eng. Syst. 13, 6 (2020), 472\u2013486.","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3108463"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-021-09302-x"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Ludovico Boratto Gianni Fenu Mirko Marras and Giacomo Medda. 2022. Consumer fairness in recommender systems: Contextualizing definitions and mitigations. In Advances in Information Retrieval. Lecture Notes in Computer Science Vol. 13185. Springer 552\u2013566.","DOI":"10.1007\/978-3-030-99736-6_37"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3031179"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511047.3538032"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422562"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.005"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00383"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2944279"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.060"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3501812"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512192"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564284"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110335"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3245101"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.05.012"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1847379"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639412"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116963"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3604915.3610646"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102749"},{"issue":"2","key":"e_1_3_2_43_2","first-page":"Article 35, 38","article-title":"A survey on adversarial recommender systems: From attack\/defense strategies to generative adversarial networks","volume":"54","author":"Deldjoo Yashar","year":"2021","unstructured":"Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2021. A survey on adversarial recommender systems: From attack\/defense strategies to generative adversarial networks. ACM Comput. Surv. 54, 2 (2021), Article 35, 38 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10365-3"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30637-2_44"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108954"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892943"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4352-3"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00107-7"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118823"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00140"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2019.00079"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109044"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijcse.2022.126252"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/766"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.3390\/a16010058"},{"key":"e_1_3_2_58_2","article-title":"Understanding how differentially private generative models spend their privacy budget","volume":"2305","author":"Ganev Georgi","year":"2023","unstructured":"Georgi Ganev, Kai Xu, and Emiliano De Cristofaro. 2023. Understanding how differentially private generative models spend their privacy budget. CoRR abs\/2305.10994 (2023).","journal-title":"CoRR"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04531-x"},{"key":"e_1_3_2_60_2","article-title":"Chat-REC: Towards interactive and explainable LLMs-augmented recommender system","volume":"2303","author":"Gao Yunfan","year":"2023","unstructured":"Yunfan Gao, Tao Sheng, Youlin Xiang, Yun Xiong, Haofen Wang, and Jiawei Zhang. 2023. Chat-REC: Towards interactive and explainable LLMs-augmented recommender system. CoRR abs\/2303.14524 (2023).","journal-title":"CoRR"},{"issue":"2","key":"e_1_3_2_61_2","first-page":"Article 13, 68","article-title":"A survey on trustworthy recommender systems","volume":"3","author":"Ge Yingqiang","year":"2024","unstructured":"Yingqiang Ge, Shuchang Liu, Zuohui Fu, Juntao Tan, Zelong Li, Shuyuan Xu, Yunqi Li, Yikun Xian, and Yongfeng Zhang. 2024. A survey on trustworthy recommender systems. Trans. Recomm. Syst. 3, 2 (2024), Article 13, 68 pages.","journal-title":"Trans. Recomm. Syst."},{"key":"e_1_3_2_62_2","volume-title":"Responsible AI Practices","year":"2022","unstructured":"Google. 2022. Responsible AI Practices. Google."},{"key":"e_1_3_2_63_2","volume-title":"Recommendation Engine Market Report","author":"Research Grand View","year":"2021","unstructured":"Grand View Research. 2021. Recommendation Engine Market Report. Grand View Research."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448099"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00294-6"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2022.102154"},{"key":"e_1_3_2_68_2","volume-title":"Proceedings of the 31st European Conference on Information Systems (ECIS \u201923)","author":"Haque A. K. M. Bahalul","year":"2023","unstructured":"A. K. M. Bahalul Haque, A. K. M. Najmul Islam, and Patrick Mikalef. 2023. To explain or not to explain: An empirical investigation of AI-based recommendations on social media platforms. In Proceedings of the 31st European Conference on Information Systems (ECIS \u201923)."},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.002"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100439"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102746"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/PAAP54281.2021.9720452"},{"issue":"1","key":"e_1_3_2_73_2","first-page":"469","article-title":"FinGAT: Financial graph attention networks for recommending top-K profitable stocks","volume":"35","author":"Hsu Yi-Ling","year":"2023","unstructured":"Yi-Ling Hsu, Yu-Che Tsai, and Cheng-Te Li. 2023. FinGAT: Financial graph attention networks for recommending top-K profitable stocks. IEEE Trans. Knowl. Data Eng. 35, 1 (2023), 469\u2013481.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6233"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109441"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118943"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560486"},{"issue":"1","key":"e_1_3_2_78_2","first-page":"108","article-title":"Applications of differential privacy in social network analysis: A survey","volume":"35","author":"Jiang Honglu","year":"2023","unstructured":"Honglu Jiang, Jian Pei, Dongxiao Yu, Jiguo Yu, Bei Gong, and Xiuzhen Cheng. 2023. Applications of differential privacy in social network analysis: A survey. IEEE Trans. Knowl. Data Eng. 35, 1 (2023), 108\u2013127.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2941650"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892909"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00026"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3177222"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03709-z"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474257"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546068"},{"key":"e_1_3_2_86_2","first-page":"485","volume-title":"Proceedings of the International Symposium on Information Theory and Its Applications (ISITA \u201920)","author":"Kono Kazuhiro","year":"2020","unstructured":"Kazuhiro Kono and Noboru Babaguchi. 2020. Data anonymization for service strategy development and information recommendation to users based on TF-IDF method. In Proceedings of the International Symposium on Information Theory and Its Applications (ISITA \u201920). 485\u2013489."},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-210668"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220076"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555803"},{"key":"e_1_3_2_90_2","volume-title":"Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS \u201922)","author":"Li Haoyang","year":"2022","unstructured":"Haoyang Li, Shimin Di, and Lei Chen. 2022. Revisiting injective attacks on recommender systems. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS \u201922)."},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3124599"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3142374"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174297"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3144690"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3187013"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132855"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3203395"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503598"},{"key":"e_1_3_2_99_2","volume-title":"Proceedings of the 12th International Conference on Learning Representations (ICLR \u201924)","author":"Li Zhiwei","year":"2024","unstructured":"Zhiwei Li, Guodong Long, and Tianyi Zhou. 2024. Federated recommendation with additive personalization. In Proceedings of the 12th International Conference on Learning Representations (ICLR \u201924)."},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16546"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3017205"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357604"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3478855"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548456"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446983.3446993"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.003"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101648"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532044"},{"key":"e_1_3_2_110_2","article-title":"Is ChatGPT a good recommender? A preliminary study","volume":"2304","author":"Liu Junling","year":"2023","unstructured":"Junling Liu, Chao Liu, Renjie Lv, Kang Zhou, and Yan Zhang. 2023. Is ChatGPT a good recommender? A preliminary study. CoRR abs\/2304.10149 (2023).","journal-title":"CoRR"},{"key":"e_1_3_2_111_2","article-title":"A first look at LLM-powered generative news recommendation","volume":"2305","author":"Liu Qijiong","year":"2023","unstructured":"Qijiong Liu, Nuo Chen, Tetsuya Sakai, and Xiao-Ming Wu. 2023. A first look at LLM-powered generative news recommendation. CoRR abs\/2305.06566 (2023).","journal-title":"CoRR"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546771"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462825"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2023.3263896"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564286"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3501815"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555374"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664927"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546759"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3240700"},{"key":"e_1_3_2_121_2","volume-title":"Recommendation Engine Market","year":"2021","unstructured":"MarketsandMarkets. 2021. Recommendation Engine Market. MarketsandMarkets."},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-021-00271-1"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.01.020"},{"key":"e_1_3_2_124_2","volume-title":"Responsible AI","year":"2022","unstructured":"Microsoft. 2022. Responsible AI. Microsoft."},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-00950-y"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103006"},{"key":"e_1_3_2_127_2","doi-asserted-by":"crossref","unstructured":"Khalil Muhammad Qinqin Wang Diarmuid O\u2019Reilly-Morgan Elias Z. Tragos Barry Smyth Neil Hurley James Geraci and Aonghus Lawlor. 2020. FedFast: Going beyond average for faster training of federated recommender systems. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD \u201920). 1234\u20131242.","DOI":"10.1145\/3394486.3403176"},{"key":"e_1_3_2_128_2","doi-asserted-by":"crossref","unstructured":"Peter M\u00fcllner. 2023. User privacy in recommender systems. In Advances in Information Retrieval. Lecture Notes in Computer Science Vol. 13982. Springer 456\u2013461.","DOI":"10.1007\/978-3-031-28241-6_52"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3126577"},{"issue":"3","key":"e_1_3_2_130_2","first-page":"Article 58, 24","article-title":"Poisoning GNN-based recommender systems with generative surrogate-based attacks","volume":"41","author":"Nguyen Thanh Toan","year":"2023","unstructured":"Thanh Toan Nguyen, Nguyen Duc Khang Quach, Thanh Tam Nguyen, Thanh Trung Huynh, Viet Hung Vu, Phi Le Nguyen, Jun Jo, and Quoc Viet Hung Nguyen. 2023. Poisoning GNN-based recommender systems with generative surrogate-based attacks. ACM Trans. Inf. Syst. 41, 3 (2023), Article 58, 24 pages.","journal-title":"ACM Trans. Inf. Syst."},{"key":"e_1_3_2_131_2","article-title":"Learning federated representations and recommendations with limited negatives","volume":"2108","author":"Ning Lin","year":"2021","unstructured":"Lin Ning, Karan Singhal, Ellie X. Zhou, and Sushant Prakash. 2021. Learning federated representations and recommendations with limited negatives. CoRR abs\/2108.07931 (2021).","journal-title":"CoRR"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3005678"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3411452"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.024"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108441"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533358"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1108\/DTA-02-2022-0083"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02854-1"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583337"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524104"},{"issue":"12","key":"e_1_3_2_141_2","first-page":"172","article-title":"Protecting trajectory from semantic attack considering k-anonymity, l-diversity, and t-closeness","volume":"17","author":"Rajendran Keerthana","year":"2017","unstructured":"Keerthana Rajendran, Manoj Jayabalan, and Muhammad Ehsan Rana. 2017. Protecting trajectory from semantic attack considering k-anonymity, l-diversity, and t-closeness. Int. J. Comput. Netw. Inf. Secur. 17, 12 (2017), 172\u2013177.","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.01.050"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.02.051"},{"key":"e_1_3_2_144_2","volume-title":"10 Breakthrough Technologies 2023","author":"Review MIT Technology","year":"2023","unstructured":"MIT Technology Review. 2023. 10 Breakthrough Technologies 2023. MIT Technology Review."},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/306"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00243"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510409"},{"key":"e_1_3_2_148_2","first-page":"348","volume-title":"Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV \u201923)","author":"Sandoussi Rima","year":"2023","unstructured":"Rima Sandoussi, Meriem Hnida, Najima Daoudi, and Rachida Ajhoun. 2023. Toward a generative chatbot for an OER recommender system designed for the teaching community: General architecture and technical components. In Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV \u201923). 348\u2013357."},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546789"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103638"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12564-1"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108508"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2023.10087251"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3235443"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3354924"},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2022.2081935"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101469"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2631533"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020501"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877790"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.04.027"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109193"},{"key":"e_1_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106196"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3542916"},{"key":"e_1_3_2_165_2","article-title":"Generative recommendation: Towards next-generation recommender paradigm","volume":"2304","author":"Wang Wenjie","year":"2023","unstructured":"Wenjie Wang, Xinyu Lin, Fuli Feng, Xiangnan He, and Tat-Seng Chua. 2023. Generative recommendation: Towards next-generation recommender paradigm. CoRR abs\/2304.03516 (2023).","journal-title":"CoRR"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119457"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1145\/3547333"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539392"},{"issue":"1","key":"e_1_3_2_169_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3579515","article-title":"Privacy legislation as business risks: How GDPR and CCPA are represented in technology companies\u2019 investment risk disclosures","volume":"7","author":"Wong Richmond Y.","year":"2023","unstructured":"Richmond Y. Wong, Andrew Chong, and R. Cooper Aspegren. 2023. Privacy legislation as business risks: How GDPR and CCPA are represented in technology companies\u2019 investment risk disclosures. Proc. ACM Hum. Comput. Interact. 7, CSCW1 (2023), 1\u201326.","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"e_1_3_2_170_2","article-title":"FedGNN: Federated graph neural network for privacy-preserving recommendation","volume":"2102","author":"Wu Chuhan","year":"2021","unstructured":"Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. FedGNN: Federated graph neural network for privacy-preserving recommendation. CoRR abs\/2102.04925 (2021).","journal-title":"CoRR"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539119"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564285"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449926"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108578"},{"issue":"3","key":"e_1_3_2_175_2","first-page":"102","article-title":"Unveiling security, privacy, and ethical concerns of ChatGPT","volume":"2","author":"Wu Xiaodong","year":"2024","unstructured":"Xiaodong Wu, Ran Duan, and Jianbing Ni. 2024. Unveiling security, privacy, and ethical concerns of ChatGPT. J. Inf. Intell. 2, 3 (2024), 102\u2013115.","journal-title":"J. Inf. Intell."},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3295894"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3147785"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119064"},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065001"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106946"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA53684.2021.00061"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02751-7"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583306"},{"key":"e_1_3_2_184_2","doi-asserted-by":"crossref","unstructured":"Yang Yu Qi Liu Likang Wu Runlong Yu Sanshi Lei Yu and Zaixi Zhang. 2023. Untargeted attack against federated recommendation systems via poisonous item embeddings and the defense. In Proceedings of the 37th AAAI Conference on Artificial Intelligence (AAAI \u201923). 4854\u20134863.","DOI":"10.1609\/aaai.v37i4.25611"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591722"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583359"},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570463"},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1145\/3556536"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533380"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12549"},{"issue":"4","key":"e_1_3_2_191_2","first-page":"Article 90, 28","article-title":"LightFR: Lightweight federated recommendation with privacy-preserving matrix factorization","volume":"41","author":"Zhang Honglei","year":"2023","unstructured":"Honglei Zhang, Fangyuan Luo, Jun Wu, Xiangnan He, and Yidong Li. 2023. LightFR: Lightweight federated recommendation with privacy-preserving matrix factorization. ACM Trans. Inf. Syst. 41, 4 (2023), Article 90, 28 pages.","journal-title":"ACM Trans. Inf. Syst."},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3145845"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3224731"},{"issue":"1","key":"e_1_3_2_194_2","first-page":"Article 5, 38 p","article-title":"Deep learning based recommender system: A survey and new perspectives","volume":"52","author":"Zhang Shuai","year":"2019","unstructured":"Shuai Zhang, Lina Yao, Aixin Sun, and Yi Tay. 2019. Deep learning based recommender system: A survey and new perspectives. ACM Comput. Surv. 52, 1 (2019), Article 5, 38 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498386"},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3295601"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591688"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","DOI":"10.1561\/1500000066"},{"key":"e_1_3_2_199_2","volume-title":"Proceedings of the NeurIPS 2021 Workshop on I (Still) Can\u2019t Believe It\u2019s Not Better! (ICBINB@NeurIPS \u201921)","author":"Zhang Yuhui","year":"2021","unstructured":"Yuhui Zhang, Hao Ding, Zeren Shui, Yifei Ma, James Zou, Anoop Deoras, and Hao Wang. 2021. Language models as recommender systems: Evaluations and limitations. In Proceedings of the NeurIPS 2021 Workshop on I (Still) Can\u2019t Believe It\u2019s Not Better! (ICBINB@NeurIPS \u201921)."},{"key":"e_1_3_2_200_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3587681"},{"key":"e_1_3_2_201_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"},{"key":"e_1_3_2_202_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"e_1_3_2_203_2","article-title":"Fairness and diversity in recommender systems: A survey","volume":"2307","author":"Zhao Yuying","year":"2023","unstructured":"Yuying Zhao, Yu Wang, Yunchao Liu, Xueqi Cheng, Charu C. Aggarwal, and Tyler Derr. 2023. Fairness and diversity in recommender systems: A survey. CoRR abs\/2307.04644 (2023).","journal-title":"CoRR"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3170691"},{"key":"e_1_3_2_205_2","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA53684.2021.00086"},{"key":"e_1_3_2_206_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892624"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,9]]},"references-count":205,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3708982"],"URL":"https:\/\/doi.org\/10.1145\/3708982","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,9]]},"assertion":[{"value":"2023-10-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}