暂无分享,去创建一个
Qiang Tang | Peter Y. A. Ryan | Afonso Arriaga | Jun Wang | P. Ryan | Qiang Tang | Jun Wang | Afonso Arriaga
[1] Yehuda Koren,et al. Factorization meets the neighborhood: a multifaceted collaborative filtering model , 2008, KDD.
[2] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[3] Eric Horvitz,et al. Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach , 2000, UAI.
[4] Paolo Cremonesi,et al. Cross-Domain Recommender Systems , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[5] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[6] Alexander J. Smola,et al. Fast Differentially Private Matrix Factorization , 2015, RecSys.
[7] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[8] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[9] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[10] João Gama,et al. Fast Incremental Matrix Factorization for Recommendation with Positive-Only Feedback , 2014, UMAP.
[11] Stratis Ioannidis,et al. Privacy-preserving matrix factorization , 2013, CCS.
[12] Martin Ester,et al. Collaborative Denoising Auto-Encoders for Top-N Recommender Systems , 2016, WSDM.
[13] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[14] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[15] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[16] Patrick Seemann,et al. Matrix Factorization Techniques for Recommender Systems , 2014 .
[17] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[18] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[19] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[20] Yijun Wang,et al. Incremental Matrix Factorization: A Linear Feature Transformation Perspective , 2017, IJCAI.
[21] Qiang Yang,et al. Transfer Learning in Collaborative Filtering for Sparsity Reduction , 2010, AAAI.
[22] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[23] Peter Glöckner,et al. Why Does Unsupervised Pre-training Help Deep Learning? , 2013 .
[24] Stratis Ioannidis,et al. GraphSC: Parallel Secure Computation Made Easy , 2015, 2015 IEEE Symposium on Security and Privacy.
[25] Hanqing Lu,et al. Incremental Matrix Factorization via Feature Space Re-learning for Recommender System , 2015, RecSys.
[26] Qiang Yang,et al. Transfer learning for collaborative filtering via a rating-matrix generative model , 2009, ICML '09.
[27] Qingsheng Zhu,et al. Incremental Collaborative Filtering recommender based on Regularized Matrix Factorization , 2012, Knowl. Based Syst..
[28] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[29] Sebastian Thrun,et al. Dermatologist-level classification of skin cancer with deep neural networks , 2017, Nature.
[30] Hao Chen,et al. Simple Encrypted Arithmetic Library - SEAL v2.1 , 2016, Financial Cryptography Workshops.
[31] Lina Yao,et al. Deep Learning Based Recommender System , 2017, ACM Comput. Surv..
[32] Dimitris Plexousakis,et al. Incremental Collaborative Filtering for Highly-Scalable Recommendation Algorithms , 2005, ISMIS.
[33] Anat Paskin-Cherniavsky,et al. Maliciously Circuit-Private FHE , 2014, CRYPTO.
[34] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[35] George Karypis,et al. A Comprehensive Survey of Neighborhood-based Recommendation Methods , 2011, Recommender Systems Handbook.
[36] Scott Sanner,et al. AutoRec: Autoencoders Meet Collaborative Filtering , 2015, WWW.
[37] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[38] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[39] Elena Vlahu-Gjorgievska,et al. Personal Healthcare System Model using Collaborative Filtering Techniques , 2011 .
[40] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[41] Lina Yao,et al. AutoSVD++: An Efficient Hybrid Collaborative Filtering Model via Contractive Auto-encoders , 2017, SIGIR.
[42] Taghi M. Khoshgoftaar,et al. A Survey of Collaborative Filtering Techniques , 2009, Adv. Artif. Intell..