Privacy preserving collaborative filtering for SaaS enabling PaaS clouds
暂无分享,去创建一个
Jaideep Vaidya | Anirban Basu | Srijith Krishnan Nair | Hiroaki Kikuchi | Theodosis Dimitrakos | Jaideep Vaidya | T. Dimitrakos | H. Kikuchi | A. Basu | S. Nair
[1] Hiroaki Kikuchi,et al. Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[2] Daniel Lemire,et al. Slope One Predictors for Online Rating-Based Collaborative Filtering , 2007, SDM.
[3] Jaideep Vaidya,et al. Privacy-preserving Collaborative Filtering for the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[4] Waseem Ahmad,et al. An Architecture for Privacy Preserving Collaborative Filtering on Web Portals , 2007 .
[5] Philip S. Yu,et al. Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[6] Ian Wakeman,et al. Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership , 2007, MPAC '07.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[9] Syr Hui,et al. US Patent Application , 2013 .
[10] Songjie Gong,et al. Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation , 2011 .
[11] Tsvi Kuflik,et al. Enhancing privacy and preserving accuracy of a distributed collaborative filtering , 2007, RecSys '07.
[12] Hannes Federrath,et al. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability , 2001 .
[13] Wenliang Du,et al. SVD-based collaborative filtering with privacy , 2005, SAC '05.
[14] Wenliang Du,et al. Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data , 2005, PKDD.
[15] John F. Canny,et al. Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.
[16] L. C. Smith. Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques , 2013 .
[17] Jaideep Vaidya,et al. Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering , 2011 .
[18] Sotirios Terzis,et al. Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference , 2007 .
[19] Eli Biham,et al. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques , 2003 .
[20] Wenliang Du,et al. Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[21] Wenliang Du,et al. Achieving Private Recommendations Using Randomized Response Techniques , 2006, PAKDD.
[22] Rosario Gennaro,et al. Fully non-interactive onion routing with forward secrecy , 2013, International Journal of Information Security.
[23] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[24] Huseyin Polat,et al. P2P collaborative filtering with privacy , 2010, Turkish Journal of Electrical Engineering and Computer Sciences.
[25] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[26] George Danezis. Mix-Networks with Restricted Routes , 2003, Privacy Enhancing Technologies.
[27] Luís Torgo,et al. Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings , 2005, PKDD.
[28] Rosario Gennaro,et al. Fully non-interactive onion routing with forward secrecy , 2011, International Journal of Information Security.
[29] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[30] Johanna D. Moore,et al. Evaluating information presentation strategies for spoken recommendations , 2007, RecSys '07.
[31] Boonserm Kijsirikul,et al. Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining , 2003, KDD 2003.
[32] John Riedl,et al. Recommender systems in e-commerce , 1999, EC '99.
[33] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[34] Sahin Albayrak,et al. An agent-based approach for privacy-preserving recommender systems , 2007, AAMAS '07.
[35] Gene Tsudik,et al. Proceedings of the 9th international conference on Applied cryptography and network security , 2011 .