2016
DOI: 10.1007/s11257-016-9177-7
|View full text |Cite
|
Sign up to set email alerts
|

A differential privacy framework for matrix factorization recommender systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
44
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(49 citation statements)
references
References 38 publications
1
44
0
1
Order By: Relevance
“…In a specific discussion of recommender systems that use matrix factorization as an underlying technology, Friedman, Berkovsky, and Kaafar (2016) found that "of all the algorithms considered, input perturbation results in the best recommendation accuracy, while guaranteeing a solid level of privacy protection against attacks that aim to gain knowledge about either specific user ratings or even the existence of these ratings" (p. 425). In a specific discussion of recommender systems that use matrix factorization as an underlying technology, Friedman, Berkovsky, and Kaafar (2016) found that "of all the algorithms considered, input perturbation results in the best recommendation accuracy, while guaranteeing a solid level of privacy protection against attacks that aim to gain knowledge about either specific user ratings or even the existence of these ratings" (p. 425).…”
Section: Related Literature On Privacy and Overviewmentioning
confidence: 99%
“…In a specific discussion of recommender systems that use matrix factorization as an underlying technology, Friedman, Berkovsky, and Kaafar (2016) found that "of all the algorithms considered, input perturbation results in the best recommendation accuracy, while guaranteeing a solid level of privacy protection against attacks that aim to gain knowledge about either specific user ratings or even the existence of these ratings" (p. 425). In a specific discussion of recommender systems that use matrix factorization as an underlying technology, Friedman, Berkovsky, and Kaafar (2016) found that "of all the algorithms considered, input perturbation results in the best recommendation accuracy, while guaranteeing a solid level of privacy protection against attacks that aim to gain knowledge about either specific user ratings or even the existence of these ratings" (p. 425).…”
Section: Related Literature On Privacy and Overviewmentioning
confidence: 99%
“…However, applying LDP to matrix factorization is not trivial. Some existing works of differentially private matrix factorization [3], [21] assume DC is trusted; they do not fit the LDP model. [24], [42] apply LDP on matrix factorization.…”
Section: Our Solutions In a Nutshellmentioning
confidence: 99%
“…For recommendations purposes, the algorithm factorises the matrix R u * i into two latent matrices: (i) the user-factor matrix P ; and (ii) the item-factor matrix Q. Equation 5 represents this factorisation where each row p u of P or q i of Q represents the relation between the corresponding latent factor and the user u or item i, respectively, and λ regularises the learned factors (Friedman et al 2016).…”
Section: Rating Predictionmentioning
confidence: 99%