Exploiting Dynamic Privacy in Socially Regularized Recommenders

被引:2
|
作者
Bunea, Ramona [1 ]
Mokarizadeh, Shahab [1 ]
Dokoohaki, Nima [1 ]
Matskin, Mihhail [1 ]
机构
[1] Royal Inst Technol KTH, ICT Sch, Stockholm, Sweden
关键词
social network; recommender systems; privacy; privacy inference; trust; matrix factorization; TRUST;
D O I
10.1109/ICDMW.2012.112
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we introduce a privacy-aware collaborative filtering recommender framework which aims to address the privacy concern of profile owners in the context of social trust sparsity. While sparsity in social trust is mitigated by similarity driven trust using a probabilistic matrix factorization technique, the privacy issue is addressed by employing a dynamic privacy inference model. The privacy inference model exploits the underlying inter-entity trust information to obtain a personalized privacy view for each individual in the social network. We evaluate the proposed framework by employing an off-the-shelf collaborative filtering recommender method to make predictions using this personalized view. Experimental results show that our method offers better performance than similar non-privacy aware approaches, while at the same time meeting user privacy concerns.
引用
收藏
页码:539 / 546
页数:8
相关论文
共 50 条
  • [1] The Effect of Privacy Concerns on Privacy Recommenders
    Zhao, Yuchen
    Ye, Juan
    Henderson, Tristan
    [J]. PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES (IUI'16), 2016, : 218 - 227
  • [2] Exploiting Multiple Recommenders to Improve Group Recommendation
    Oliveira, Samuel
    Brum, Pedro
    Pappa, Gisele
    Lacerda, Ansio
    [J]. 2018 7TH BRAZILIAN CONFERENCE ON INTELLIGENT SYSTEMS (BRACIS), 2018, : 324 - 329
  • [3] On Privacy of Socially Contagious Attributes
    Rezaei, Aria
    Gao, Jie
    [J]. 2019 19TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2019), 2019, : 1294 - 1299
  • [4] Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption
    Yoon, Hyundo
    Yu, Muncheon
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (06):
  • [5] Discovering and exploiting causal dependencies for robust mobile context-aware recommenders
    Yap, Ghim-Eng
    Tan, Ah-Hwee
    Pang, Hwee-Hwa
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (07) : 977 - 992
  • [6] Exploiting Autocorrect to Attack Privacy
    Kidney, Brian J.
    Anderson, Jonathan
    [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 103 - 109
  • [7] Robustness of privacy-preserving collaborative recommenders against popularity bias problem
    Gulsoy, Mert
    Yalcin, Emre
    Bilge, Alper
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [8] D2P: Distance-Based Differential Privacy in Recommenders
    Guerraoui, Rachid
    Kermarrec, Anne-Marie
    Patra, Rhicheek
    Taziki, Mahsa
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2015, 8 (08): : 862 - 873
  • [9] Exploiting NOMA into Socially Enabled Computation Offloading
    Ai, Yutong
    Wang, Li
    Jiao, Bingli
    Chen, Kwang-Cheng
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [10] Socially negotiating privacy boundaries and academic identities
    Kayas, Oliver G.
    Matikonis, Karl
    Cranmer, Eleanor E.
    Campos, Jorge Pereira
    [J]. STUDIES IN HIGHER EDUCATION, 2023,