A privacy-preserving mobile application recommender system based on trust evaluation
暂无分享,去创建一个
Zheng Yan | Weidong Zhang | Kun Xu | Kun Xu | Zheng Yan | Weidong Zhang
[1] Vijay Varadharajan,et al. MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.
[2] Bracha Shapira,et al. Recommender Systems Handbook , 2015, Springer US.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Hui Xiong,et al. Structural Analysis of User Choices for Mobile App Recommendation , 2016, ACM Trans. Knowl. Discov. Data.
[5] Michelle X. Zhou,et al. Introduction to the Special Issue on Recommender System Benchmarking , 2016, ACM Trans. Intell. Syst. Technol..
[6] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[7] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[8] Robert H. Deng,et al. Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..
[9] Lei Xue,et al. Toward Automatically Generating Privacy Policy for Android Apps , 2017, IEEE Transactions on Information Forensics and Security.
[10] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[11] Enhong Chen,et al. Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis , 2018, IEEE Transactions on Mobile Computing.
[12] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[13] Yuguang Fang,et al. A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[14] Jiannong Cao,et al. AppBooster: Boosting the Performance of Interactive Mobile Applications with Computation Offloading and Parameter Tuning , 2017, IEEE Transactions on Parallel and Distributed Systems.
[15] Zheng Yan,et al. Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature , 2017, IEEE Access.
[16] Begoña García Zapirain,et al. Security Recommendations for mHealth Apps: Elaboration of a Developer’s Guide , 2016, Journal of Medical Systems.
[17] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[18] Cong Wang,et al. An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.
[19] Hongyan Liu,et al. Mining Exploratory Behavior to Improve Mobile App Recommendations , 2017, ACM Trans. Inf. Syst..
[20] George Angelos Papadopoulos,et al. Ubiquitous recommender systems , 2013, Computing.
[21] Di Wu,et al. Recommender system for mobile users , 2017, Multimedia Tools and Applications.
[22] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[23] Bing Wu,et al. A Survey of Collaborative Filtering-Based Recommender Systems for Mobile Internet Applications , 2016, IEEE Access.
[24] Bin Guo,et al. A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection , 2019, Multimedia Tools and Applications.
[25] Robert H. Deng,et al. TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications , 2011, Personal and Ubiquitous Computing.
[26] Zekeriya Erkin,et al. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.
[27] Lin Zhang,et al. Learning Geographical and Mobility Factors for Mobile Application Recommendation , 2017, IEEE Intelligent Systems.
[28] Hengrun Zhang,et al. A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.
[29] Isabel de la Torre Díez,et al. Privacy and Security in Mobile Health Apps: A Review and Recommendations , 2014, Journal of Medical Systems.
[30] Bo Cheng,et al. MobiGemini: sensitive-based data and resource protection framework for mobile device , 2017, China Communications.
[31] Elisa Bertino,et al. Android User Privacy Preserving Through Crowdsourcing , 2018, IEEE Transactions on Information Forensics and Security.
[32] Pallapa Venkataram,et al. Performance Analysis of Privacy Protection System During Data Transfer in MANETs , 2018, Int. J. Wirel. Inf. Networks.
[33] Jianqiang Li,et al. Enforcing Differential Privacy for Shared Collaborative Filtering , 2017, IEEE Access.
[34] Athanasios V. Vasilakos,et al. Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..
[35] Shin-Yan Chiou,et al. A trustworthy online recommendation system based on social connections in a privacy-preserving manner , 2017, Multimedia Tools and Applications.
[36] Jun Zou,et al. A Belief Propagation Approach to Privacy-Preserving Item-Based Collaborative Filtering , 2015, IEEE Journal of Selected Topics in Signal Processing.
[37] Seungmin Rho,et al. Privacy aware group based recommender system in multimedia services , 2017, Multimedia Tools and Applications.
[38] Elio Masciari,et al. Discovering User Behavioral Features to Enhance Information Search on Big Data , 2017, ACM Trans. Interact. Intell. Syst..
[39] Ibrahim Khalil,et al. A Practical Privacy-Preserving Recommender System , 2016, Data Science and Engineering.
[40] Robert H. Deng,et al. Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.
[41] Lei Cen,et al. Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference , 2015, WSDM.
[42] Aleksandr Ometov,et al. Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges , 2017, IEEE Access.
[43] Shunxiang Wu,et al. Cross-Platform App Recommendation by Jointly Modeling Ratings and Texts , 2017, ACM Trans. Inf. Syst..
[44] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[45] Raimo Kantola,et al. A Review of Homomorphic Encryption and its Applications , 2016, MobiMedia.
[46] Lei Zou,et al. Context-Aware Recommendation Using Role-Based Trust Network , 2015, ACM Trans. Knowl. Discov. Data.
[47] Isabela Gasparini,et al. A systematic mapping on adaptive recommender approaches for ubiquitous environments , 2018, Computing.
[48] Francesco Ricci,et al. Mobile Recommender Systems , 2010, J. Inf. Technol. Tour..
[49] Avi Arampatzis,et al. Suggesting Points-of-Interest via Content-Based, Collaborative, and Hybrid Fusion Methods in Mobile Devices , 2017, ACM Trans. Inf. Syst..
[50] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..