一种面向位置感知推荐系统的隐私保框架

X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu - Science China Information …, 2017 - Springer
… for our privacy-preserving location-aware recommender system as … art privacypreserving
recommendation systems. The first is a privacy-preserving personalized tweet recommendation

支持隐私保护的端云协同训练

高祥云, 孟丹, 罗明凯, 王俊, 张丽平… - … 师范大学学报(自然科学版), 2023 - xblk.ecnu.edu.cn
… centralized recommendation methods infeasible. This study focuses on privacy-preserving
training in a decentralized manner for personalized recommender systems. To fully utilize the …

[PDF][PDF] 互联网推荐系统比较研究

许海玲, 吴潇, 李晓东, 阎保平[1 - 软件学报, 2009 - jos.org.cn
… Abstract: This paper makes a comprehensive survey of the recommender system research
Privacy-Preserving collaborative filtering using randomized perturbation techniques. In: Proc…

推荐系统的隐私保护研究综述.

冯晗, 伊华伟, 李晓会, 李锐 - Journal of Frontiers of …, 2023 - search.ebscohost.com
… This paper firstly summarizes the privacypreserving … and recommendation accuracy, the
privacy-preserving technologies … results of privacy-preserving in recommendation systems at …

位置服务隐私保护

康海燕, 朱万祥 - 《 山东大学学报(理学版)》, 2018 - lxbwk.njournal.sdu.edu.cn
… , but also the users' identities, interests, social habits, behavior patterns and privacy hidden
in these data. A review of privacy preserving for location-based services (LBS) is provided. …

三元空间大数据跨域可视化分析展望

陈为, 张天野, 朱海洋, 王叙萌… - 信息与电子工程前沿 …, 2022 - fitee.zjujournals.com
… Seeking privacy-preserving analysis for CPS big data, we design a new mechanism of
federated data representation that supports visual analysis. Specifically, in this new mechanism dif…

[PDF][PDF] 阁EasyChair Preprint

H Jonathan, E Frank - 2024 - easychair.org
recommendation systems are also utilized to suggest relevant datasets based on user
behavior and preferences, improving the efficiency and effectiveness of data … ): Privacy-preserving

联邦推荐系统综述

朱智韬, 司世景, 王健宗, 肖京 - 大数据, 2022 - infocomm-journal.com
privacy preserving in recommender systems[J]. Journal of Computer Research and
Development, 2019, 56(10): 2033-2048. [53] KIM S, KIM J, KOO D, et al. Efficient privacy-preserving

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… This section explores privacy-preserving techniques for mobile malware analysis, such as
data anonymization, differential privacy, and secure multi-party computation. It emphasizes …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… 116|| 2019 The authors proposed a blockchain-based privacy-preserving software update
protocol to perform secure and reliable updates with an incentive mechanism without …