DOI: 10.3990/1.9789036535939
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographically-enhanced privacy for recommender systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 97 publications
0
5
0
Order By: Relevance
“…80 percent data is used for training and 20 percent is used for testing. The computed RMSE score for RDT-P, Homo-S, and Homo-3bit datasets along with few existing schemes [42]- [45] are shown in Figure 8. The Homomorphic encryption [42] and k-anonymized rating [43] schemes perform almost similar to original dataset where random perturbation [45] and multi-level [44] perform worst but better than Homo-3bit scheme.…”
Section: E Rdt Application In Recommendation Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…80 percent data is used for training and 20 percent is used for testing. The computed RMSE score for RDT-P, Homo-S, and Homo-3bit datasets along with few existing schemes [42]- [45] are shown in Figure 8. The Homomorphic encryption [42] and k-anonymized rating [43] schemes perform almost similar to original dataset where random perturbation [45] and multi-level [44] perform worst but better than Homo-3bit scheme.…”
Section: E Rdt Application In Recommendation Domainmentioning
confidence: 99%
“…The computed RMSE score for RDT-P, Homo-S, and Homo-3bit datasets along with few existing schemes [42]- [45] are shown in Figure 8. The Homomorphic encryption [42] and k-anonymized rating [43] schemes perform almost similar to original dataset where random perturbation [45] and multi-level [44] perform worst but better than Homo-3bit scheme. The RDT-P perform better in terms of RMSE even from the original dataset because it create dataset in the range of 1 − 3 with low variance.…”
Section: E Rdt Application In Recommendation Domainmentioning
confidence: 99%
“…In Refs , the authors survey and review CF and PPCF schemes. Practical issues in different partitioning cases and various partitioning scenarios are discussed in Refs . Ref introduces the CF concept, while Ref proposes a new measure for privacy evaluation.…”
Section: Dimensions For Classifying Ppcf Schemesmentioning
confidence: 99%
“…Thus, the method is able to efficiently provide recommendations. Ref investigates how to use secure computation in such a way that privacy is achieved while making the computations as efficient as possible. To achieve this goal, the author develops specialized secure computation protocols based on secure multiparty computation and HE.…”
Section: Existing Trends In Ppcfmentioning
confidence: 99%
“…However, achieving such goal is not always possible for some e-companies, especially the newly established ones, due to lack of necessary and sufficient data, and it turns out to be a challenge [8], [9]. Companies overcome such shortage by collaborating with other companies with the aim of providing more meaningful recommendations based on the aggregated data [10]. However, there are risks and obstacles in establishing such cooperation.…”
mentioning
confidence: 99%