Hide & Share: Landmark-Based Similarity for Private KNN Computation
暂无分享,去创建一个
Anne-Marie Kermarrec | Rachid Guerraoui | Davide Frey | Jingjing Wang | François Taïani | Antoine Rault
[1] Brighten Godfrey,et al. OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.
[2] Maarten van Steen,et al. Epidemic-Style Management of Semantic Overlays for Content-Based Searching , 2005, Euro-Par.
[3] Anne-Marie Kermarrec,et al. FreeRec: an anonymous and distributed personalization architecture , 2015, Computing.
[4] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[5] Fatma Ozcan. Proceedings of the 2005 ACM SIGMOD international conference on Management of data , 2005, SIGMOD 2005.
[6] Anne-Marie Kermarrec,et al. Toward personalized query expansion , 2009, SNS '09.
[7] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[8] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[9] Mehrbakhsh Nilashi,et al. Collaborative filtering recommender systems , 2013 .
[10] Jennifer Golbeck,et al. SUNNY: A New Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models , 2007, AAAI.
[11] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[12] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[13] Anne-Marie Kermarrec,et al. WHATSUP: A Decentralized Instant News Recommender , 2013, 2013 IEEE 27th International Symposium on Parallel and Distributed Processing.
[14] Márk Jelasity,et al. T-Man: Gossip-Based Overlay Topology Management , 2005, Engineering Self-Organising Systems.
[15] Laura Ricci,et al. A peer-to-peer recommender system for self-emerging user communities based on gossip overlays , 2013, J. Comput. Syst. Sci..
[16] Anne-Marie Kermarrec,et al. The Gossple Anonymous Social Network , 2010, Middleware.
[17] Francesco Bonchi,et al. Cold start link prediction , 2010, KDD.
[18] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[19] Xiaohui Liang,et al. Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.
[20] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[21] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[22] Tianqing Zhu,et al. Differential privacy for neighborhood-based Collaborative Filtering , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[23] John Riedl,et al. An algorithmic framework for performing collaborative filtering , 1999, SIGIR '99.
[24] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[25] Anne-Marie Kermarrec,et al. Gossiping personalized queries , 2010, EDBT '10.
[26] Kai Li,et al. Efficient k-nearest neighbor graph construction for generic similarity measures , 2011, WWW.
[27] Pierre L'Ecuyer,et al. Good Parameters and Implementations for Combined Multiple Recursive Random Number Generators , 1999, Oper. Res..
[28] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[29] Anne-Marie Kermarrec,et al. Author manuscript, published in "International Symposium on Stabilization, Safety, and Security of Distributed Systems (2011)" Social Market: Combining Explicit and Implicit Social Networks , 2011 .
[30] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[31] Wenliang Du,et al. SVD-based collaborative filtering with privacy , 2005, SAC '05.
[32] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[33] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[34] Kenneth Y. Goldberg,et al. Eigentaste: A Constant Time Collaborative Filtering Algorithm , 2001, Information Retrieval.
[35] Chris Clifton,et al. Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.
[36] Pim Theo Tuyls,et al. PRIVATE PROFILE MATCHING , 2006 .
[37] Guanhua Yan,et al. Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.
[38] Alfred Menezes,et al. Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.