2012
DOI: 10.1016/j.eswa.2011.09.094
|View full text |Cite
|
Sign up to set email alerts
|

An improved privacy-preserving DWT-based collaborative filtering scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 42 publications
0
13
0
Order By: Relevance
“…Amount of traditional privacy preserving methods have been developed in CF recommender systems [27], including cryptographic [9,19], obfuscation [20,25], perturbation [3,4] and probabilistic methods [1]. Erkin et al [9] applied homomorphic encryption and secure multi-party computation in privacy preserving recommender systems, which allows users to jointly compute their data to receive recommendation without sharing the true data with other parties.…”
Section: Traditional Privacy Preserving Cf Recommendationmentioning
confidence: 99%
See 1 more Smart Citation
“…Amount of traditional privacy preserving methods have been developed in CF recommender systems [27], including cryptographic [9,19], obfuscation [20,25], perturbation [3,4] and probabilistic methods [1]. Erkin et al [9] applied homomorphic encryption and secure multi-party computation in privacy preserving recommender systems, which allows users to jointly compute their data to receive recommendation without sharing the true data with other parties.…”
Section: Traditional Privacy Preserving Cf Recommendationmentioning
confidence: 99%
“…Among them, cryptographic methods [9,19] provide the most reliable security but the unnecessary computational cost cannot be ignored. Obfuscation methods [20,25] and Perturbation methods [3,4] introduce designed random noise into the original matrix to preserve customers' sensitive information; however the magnitude of noise is hard to calibrate in these two types of methods [7,27]. The naive probabilistic method [1] provides a similarity based weighted neighbour selection for the k neighbours.…”
mentioning
confidence: 99%
“…Due to privacy measures, performance might become worse. To enhance online performance in PPCF schemes on RPTs, Bilge and Polat [14] propose dimensionality reduction-based PPCF scheme. The authors apply data reduction on perturbed data and provide predictions from reduced masked data.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, cryptographic methods [11,21] provide the most reliable security but the unnecessary computational cost cannot be ignored. Obfuscation methods [22,27] and Perturbation methods [3,4] introduce designed random noise into the original matrix to preserve customers' sensitive information; however the magnitude of noise is hard to calibrate in these two types of methods [9,29]. The probabilistic methods [1] provided a similarity based weighted neighbour selection of the k nearest neighbours.…”
Section: Introductionmentioning
confidence: 99%