DeepRec: On-device Deep Learning for Privacy-Preserving Sequential Recommendation in Mobile Commerce

Sequential recommendation techniques are considered to be a promising way of providing better user experience in mobile commerce by learning sequential interests within user historical interaction behaviors. However, the recently increasing focus on privacy concerns, such as the General Data Protection Regulation (GDPR), can significantly affect the deployment of state-of-the-art sequential recommendation techniques, because user behavior data are no longer allowed to be arbitrarily used without the user’s explicit permission. To address the issue, this paper proposes DeepRec, an on-device deep learning framework of mining interaction behaviors for sequential recommendation without sending any raw data or intermediate results out of the device, preserving user privacy maximally. DeepRec constructs a global model using data collected before GDPR and fine-tunes a personal model continuously on individual mobile devices using data collected after GDPR. DeepRec employs the model pruning and embedding sparsity techniques to reduce the computation and network overhead, making the model training process practical on computation-constraint mobile devices. Evaluation results show that DeepRec can achieve comparable recommendation accuracy to existing centralized recommendation approaches with small computation overhead and up to 10x reduction in network overhead.

[1]  Huaimin Wang,et al.  Mixup Based Privacy Preserving Mixed Collaboration Learning , 2019, 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE).

[2]  Huan Liu,et al.  Personalized Privacy-Preserving Social Recommendation , 2018, AAAI.

[3]  Harald Steck,et al.  Gaussian Ranking by Matrix Factorization , 2015, RecSys.

[4]  Jeffrey Pennington,et al.  GloVe: Global Vectors for Word Representation , 2014, EMNLP.

[5]  Abdelouahid Derhab,et al.  A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.

[6]  Tsvi Kuflik,et al.  Incorporating Dwell Time in Session-Based Recommendations with Recurrent Neural Networks , 2017, RecTemp@RecSys.

[7]  Yunming Ye,et al.  DeepFM: A Factorization-Machine based Neural Network for CTR Prediction , 2017, IJCAI.

[8]  Dietmar Jannach,et al.  When Recurrent Neural Networks meet the Neighborhood for Session-Based Recommendation , 2017, RecSys.

[9]  John C. Tang,et al.  Mobile taskflow in context: a screenshot study of smartphone usage , 2010, CHI.

[10]  Yukihiro Tagami,et al.  Embedding-based News Recommendation for Millions of Users , 2017, KDD.

[11]  Yu He,et al.  The YouTube video recommendation system , 2010, RecSys '10.

[12]  Yanjiao Chen,et al.  Privacy-Preserving Collaborative Deep Learning With Unreliable Participants , 2020, IEEE Transactions on Information Forensics and Security.

[13]  Zhifei Zhang,et al.  Analyzing User-Level Privacy Attack Against Federated Learning , 2020, IEEE Journal on Selected Areas in Communications.

[14]  Rossano Schifanella,et al.  The WWW (and an H) of Mobile Application Usage in the City: The What, Where, When, and How , 2018, WWW.

[15]  Nino Vincenzo Verde,et al.  Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[17]  Wenbo He,et al.  I know what you did on your smartphone: Inferring app usage over encrypted data traffic , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[18]  Lars Schmidt-Thieme,et al.  BPR: Bayesian Personalized Ranking from Implicit Feedback , 2009, UAI.

[19]  Jing Wu,et al.  Temporal-Spatial Mobile Application Usage Understanding and Popularity Prediction for Edge Caching , 2018, IEEE Wireless Communications.

[20]  Ming-Wei Chang,et al.  BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.

[21]  Hui Xiong,et al.  Recurrent Convolutional Neural Network for Sequential Recommendation , 2019, WWW.

[22]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[23]  Suyog Gupta,et al.  To prune, or not to prune: exploring the efficacy of pruning for model compression , 2017, ICLR.

[24]  Xiangnan He,et al.  Future Data Helps Training: Modeling Future Contexts for Session-based Recommendation , 2020, WWW.

[25]  Martha Larson,et al.  CLiMF: learning to maximize reciprocal rank with collaborative less-is-more filtering , 2012, RecSys.

[26]  Davide Anguita,et al.  Differential privacy and generalization: Sharper bounds with applications , 2017, Pattern Recognit. Lett..

[27]  Hao Dong,et al.  Comments on “Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security” , 2018 .

[28]  Douglas B. Terry,et al.  Using collaborative filtering to weave an information tapestry , 1992, CACM.

[29]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[30]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[31]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning: Revisited and Enhanced , 2017, ATIS.

[32]  Martin Wattenberg,et al.  TensorFlow.js: Machine Learning for the Web and Beyond , 2019, MLSys.

[33]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[34]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[35]  Alexandros Karatzoglou,et al.  Parallel Recurrent Neural Network Architectures for Feature-rich Session-based Recommendations , 2016, RecSys.

[36]  Jing Cai,et al.  Enlister: baidu's recommender system for the biggest chinese Q&A website , 2012, RecSys.

[37]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[38]  Vitaly Shmatikov,et al.  Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[39]  Stratis Ioannidis,et al.  Privacy-preserving matrix factorization , 2013, CCS.

[40]  Sandra Servia Rodríguez,et al.  Privacy-Preserving Personal Model Training , 2017, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[41]  Marina Blanton,et al.  Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.

[42]  Yang Song,et al.  Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[43]  Jesús Téllez Isaac,et al.  Mobile CoMMerCe , 2014 .

[44]  Jürgen Schmidhuber,et al.  Framewise phoneme classification with bidirectional LSTM and other neural network architectures , 2005, Neural Networks.

[45]  Shaojie Tang,et al.  Billion-scale federated learning on mobile clients: a submodel design with tunable privacy , 2020, MobiCom.

[46]  Peng Jiang,et al.  BERT4Rec: Sequential Recommendation with Bidirectional Encoder Representations from Transformer , 2019, CIKM.

[47]  Jürgen Ziegler,et al.  Sequential User-based Recurrent Neural Network Recommendations , 2017, RecSys.

[48]  Xuanzhe Liu,et al.  A First Look at Deep Learning Apps on Smartphones , 2018, WWW.

[49]  DuchiJohn,et al.  Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011 .

[50]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[51]  Jason Weston,et al.  Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..

[52]  Bracha Shapira,et al.  Recommender Systems Handbook , 2015, Springer US.

[53]  Kun Gai,et al.  Learning Tree-based Deep Model for Recommender Systems , 2018, KDD.

[54]  Alexandros Karatzoglou,et al.  Session-based Recommendations with Recurrent Neural Networks , 2015, ICLR.

[55]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[56]  Geoffrey E. Hinton,et al.  Distilling the Knowledge in a Neural Network , 2015, ArXiv.

[57]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[58]  Yoshua Bengio,et al.  On the Properties of Neural Machine Translation: Encoder–Decoder Approaches , 2014, SSST@EMNLP.

[59]  Pengtao Xie,et al.  Crypto-Nets: Neural Networks over Encrypted Data , 2014, ArXiv.

[60]  Tao Xie,et al.  A comprehensive study on challenges in deploying deep learning based software , 2020, ESEC/SIGSOFT FSE.

[61]  Alexandros Karatzoglou,et al.  Personalizing Session-based Recommendations with Hierarchical Recurrent Neural Networks , 2017, RecSys.

[62]  Zaiqiao Meng,et al.  Hierarchical Neural Variational Model for Personalized Sequential Recommendation , 2019, WWW.

[63]  BottouLéon,et al.  Natural Language Processing (Almost) from Scratch , 2011 .

[64]  Natalia Gimelshein,et al.  PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.

[65]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, SysML.

[66]  Alex Beutel,et al.  Recurrent Recommender Networks , 2017, WSDM.

[67]  Yoram Singer,et al.  Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..

[68]  Amir Houmansadr,et al.  Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[69]  Xuanzhe Liu,et al.  Moving Deep Learning into Web Browser: How Far Can We Go? , 2019, WWW.

[70]  Chao Liu,et al.  Recommender systems with social regularization , 2011, WSDM '11.

[71]  Fei Wang,et al.  A Federated Multi-View Deep Learning Framework for Privacy-Preserving Recommendations , 2020, ArXiv.