{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T01:34:45Z","timestamp":1726191285814},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031282409"},{"type":"electronic","value":"9783031282416"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28241-6_52","type":"book-chapter","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T01:02:20Z","timestamp":1678928540000},"page":"456-461","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["User Privacy in\u00a0Recommender Systems"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6581-1945","authenticated-orcid":false,"given":"Peter","family":"M\u00fcllner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,16]]},"reference":[{"key":"52_CR1","doi-asserted-by":"publisher","unstructured":"Beigi, G., Liu, H.: \u201cIdentifying novel privacy issues of online users on social media platforms\u201d by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. SIGWEB Newsl. (Winter) (2019). https:\/\/doi.org\/10.1145\/3293874.3293878","DOI":"10.1145\/3293874.3293878"},{"issue":"1","key":"52_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3343038","volume":"1","author":"G Beigi","year":"2020","unstructured":"Beigi, G., Liu, H.: A survey on privacy in social media: identification, mitigation, and applications. ACM Trans. Data Sci. 1(1), 1\u201338 (2020)","journal-title":"ACM Trans. Data Sci."},{"issue":"5","key":"52_CR3","doi-asserted-by":"publisher","first-page":"5033","DOI":"10.1016\/j.eswa.2011.11.037","volume":"39","author":"S Berkovsky","year":"2012","unstructured":"Berkovsky, S., Kuflik, T., Ricci, F.: The impact of data obfuscation on the accuracy of collaborative filtering. Expert Syst. Appl. 39(5), 5033\u20135042 (2012)","journal-title":"Expert Syst. Appl."},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Berlioz, A., Friedman, A., Kaafar, M.A., Boreli, R., Berkovsky, S.: Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM Conference on Recommender Systems, pp. 107\u2013114 (2015)","DOI":"10.1145\/2792838.2800173"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Biega, A.J., Potash, P., Daum\u00e9, H., Diaz, F., Finck, M.: Operationalizing the legal principle of data minimization for personalization. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 399\u2013408 (2020)","DOI":"10.1145\/3397271.3401034"},{"key":"52_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"52_CR7","unstructured":"Ekstrand, M.D., Joshaghani, R., Mehrpouyan, H.: Privacy for all: ensuring fair and equitable privacy protections. In: Conference on Fairness, Accountability and Transparency, pp. 35\u201347. PMLR (2018)"},{"issue":"5","key":"52_CR8","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s11257-016-9177-7","volume":"26","author":"A Friedman","year":"2016","unstructured":"Friedman, A., Berkovsky, S., Kaafar, M.A.: A differential privacy framework for matrix factorization recommender systems. User Model. User-Adap. Inter. 26(5), 425\u2013458 (2016). https:\/\/doi.org\/10.1007\/s11257-016-9177-7","journal-title":"User Model. User-Adap. Inter."},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Gao, C., Huang, C., Lin, D., Jin, D., Li, Y.: DPLCF: differentially private local collaborative filtering. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 961\u2013970 (2020)","DOI":"10.1145\/3397271.3401053"},{"key":"52_CR10","unstructured":"Gentry, C.: A Fully Homomorphic Encryption Scheme. Stanford University (2009)"},{"key":"52_CR11","unstructured":"Ha, D., Dai, A., Le, Q.V.: Hypernetworks. arXiv preprint arXiv:1609.09106 (2016)"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 230\u2013237 (1999)","DOI":"10.1145\/312624.312682"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Hou, D., Zhang, J., Ma, J., Zhu, X., Man, K.L.: Application of differential privacy for collaborative filtering based recommendation system: a survey. In: 2021 12th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 97\u2013101. IEEE (2021)","DOI":"10.1109\/PAAP54281.2021.9720452"},{"key":"52_CR14","doi-asserted-by":"publisher","unstructured":"Jeckmans, A.J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q.: Privacy in recommender systems. In: Ramzan, N., van Zwol, R., Lee, J.S., Cl\u00fcver, K., Hua, X.S. (eds.) Social Media Retrieval, pp. 263\u2013281. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4555-4_12","DOI":"10.1007\/978-1-4471-4555-4_12"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, J., Koo, D., Kim, Y., Yoon, H., Shin, J.: Efficient privacy-preserving matrix factorization via fully homomorphic encryption. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 617\u2013628 (2016)","DOI":"10.1145\/2897845.2897875"},{"issue":"1","key":"52_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-021-00268-9","volume":"10","author":"D Kowald","year":"2021","unstructured":"Kowald, D., Muellner, P., Zangerle, E., Bauer, C., Schedl, M., Lex, E.: Support the underground: characteristics of beyond-mainstream music listeners. EPJ Data Sci. 10(1), 1\u201326 (2021). https:\/\/doi.org\/10.1140\/epjds\/s13688-021-00268-9","journal-title":"EPJ Data Sci."},{"key":"52_CR17","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. (2021). https:\/\/ieeexplore.ieee.org\/document\/9599369"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Lin, Y., et al.: Meta matrix factorization for federated rating predictions. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 981\u2013990 (2020)","DOI":"10.1145\/3397271.3401081"},{"key":"52_CR19","volume":"71","author":"J Liu","year":"2022","unstructured":"Liu, J., Hu, Y., Guo, X., Liang, T., Jin, W.: Differential privacy performance evaluation under the condition of non-uniform noise distribution. J. Inf. Secur. Appl. 71, 103366 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"52_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-319-55753-3_36","volume-title":"Database Systems for Advanced Applications","author":"X Liu","year":"2017","unstructured":"Liu, X., et al.: When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10177, pp. 576\u2013591. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55753-3_36"},{"key":"52_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-030-72240-1_8","volume-title":"Advances in Information Retrieval","author":"P Muellner","year":"2021","unstructured":"Muellner, P., Kowald, D., Lex, E.: Robustness of meta matrix factorization against strict privacy constraints. In: Hiemstra, D., Moens, M.-F., Mothe, J., Perego, R., Potthast, M., Sebastiani, F. (eds.) ECIR 2021. LNCS, vol. 12657, pp. 107\u2013119. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72240-1_8"},{"key":"52_CR22","doi-asserted-by":"publisher","unstructured":"M\u00fcllner, P., Lex, E., Schedl, M., Kowald, D.: ReuseKNN: neighborhood reuse for differentially-private KNN-based recommendations (2022). https:\/\/doi.org\/10.48550\/ARXIV.2206.11561","DOI":"10.48550\/ARXIV.2206.11561"},{"key":"52_CR23","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, N., Keller, B.J., Mirza, B.J., Grama, A.Y., Karypis, G.: When being weak is brave: privacy in recommender systems. IEEE Internet Comput. 5(6), 54\u201362 (2001)","DOI":"10.1109\/4236.968832"},{"key":"52_CR24","unstructured":"Parliament Regulation: Regulation (EU) 2016\/679 of the European parliament and of the council. Regulation (EU) 679, 2016 (2016)"},{"key":"52_CR25","unstructured":"Strucks, C., Slokom, M., Larson, M.: BlurM(or)e: revisiting gender obfuscation in the user-item matrix (2019)"},{"issue":"1","key":"52_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.eng.2018.02.005","volume":"4","author":"C Wang","year":"2018","unstructured":"Wang, C., Zheng, Y., Jiang, J., Ren, K.: Toward privacy-preserving personalized recommendation services. Engineering 4(1), 21\u201328 (2018)","journal-title":"Engineering"},{"issue":"5","key":"52_CR27","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s00778-021-00700-6","volume":"31","author":"Q Wang","year":"2022","unstructured":"Wang, Q., Yin, H., Chen, T., Yu, J., Zhou, A., Zhang, X.: Fast-adapting and privacy-preserving federated recommender system. VLDB J. 31(5), 877\u2013896 (2022)","journal-title":"VLDB J."},{"key":"52_CR28","unstructured":"Xin, Y., Jaakkola, T.: Controlling privacy in recommender systems. In: Proceedings of the 27th International Conference on Neural Information Processing Systems, NIPS 2014, vol. 2, pp. 2618\u20132626. MIT Press, Cambridge, MA, USA (2014)"},{"key":"52_CR29","unstructured":"Zemel, R., Wu, Y., Swersky, K., Pitassi, T., Dwork, C.: Learning fair representations. In: International Conference on Machine Learning, pp. 325\u2013333. PMLR (2013)"},{"key":"52_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, M., et al.: Membership inference attacks against recommender systems. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 864\u2013879 (2021)","DOI":"10.1145\/3460120.3484770"},{"key":"52_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, T., Li, G., Ren, Y., Zhou, W., Xiong, P.: Differential privacy for neighborhood-based collaborative filtering. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 752\u2013759 (2013)","DOI":"10.1145\/2492517.2492519"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28241-6_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T13:08:13Z","timestamp":1709644093000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28241-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031282409","9783031282416"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28241-6_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Information Retrieval","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecir2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecir2023.org\/index.html?v=1.0","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"489","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"77","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}