1 |
A. Koschmider, T. Hornung, and A. Oberweis, "Recommendation-based editor for business process modeling," Data & Knowledge Engineering, vol. 70, no.6, pp. 483-503, June, 2011.
DOI
ScienceOn
|
2 |
J.H. Park, "A recommender system for device sharing based on context-aware and personalization," KSII Transaction on Internet and Information Systems, vol. 4, no. 2, pp. 174-190, April 2010.
|
3 |
J.L. Herlocker, J.A. Konstan, A. Borcher, and J.T. Riedl, "An algorithmic framework for performing collaborative filtering," in Proc. of 22nd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 230-237, August 15-19, 1999.
|
4 |
J.A. Calandrino, A. Kilzer, A. Narayanan, E.W. Felten, and V. Shmatikov, "You might also like: Privacy risks of collaborative filtering," in Proc. of 2011 IEEE Symposium on Security and Privacy, pp. 231-246, May 22-25, 2011.
|
5 |
I. Yakut and H. Polat, "Arbitrarily distributed data-based recommendations with privacy," Data & Knowledge Engineering, February 2012, vol. 72, pp. 239-256, February 2012.
DOI
ScienceOn
|
6 |
J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, J. Ma, "PRIAM: Privacy preserving identity and access management scheme in cloud," KSII Transaction on Internet and Information Systems, vol. 8, no. 1, pp. 282-304, January 2014.
DOI
ScienceOn
|
7 |
I. Gunes, A. Bilge, and H. Polat, "Shilling attacks against memory-based privacy-preserving Recommendation Algorithms," KSII Transaction on Internet and Information Systems, vol. 7, no. 5, pp. 1272-1290, May 2013.
DOI
ScienceOn
|
8 |
N. Lathia, S. Hailes, and L. Capra, "Private distributed collaborative filtering using estimated concordance measures," in Proc. of 1st ACM conference on Recommender Systems, pp. 1-8, October 19-20, 2007.
|
9 |
A. Basu, J. Vaidya, and H. Kikuchi, "Efficient privacy-preserving collaborative filtering based on the weighted Slope One predictor," Journal of Internet Services and Information Security, vol. 1, no. 4, pp. 26-46, November 2011.
|
10 |
Su, X. and T.M. Khoshgoftaar, "A survey of collaborative filtering techniques," Advances in Artificial Intelligence, vol. 2009, p. 2-21, January 2009.
|
11 |
B. Sarwar, G. Karypis, J. Konstan, and J. Reidl, "Item-based collaborative filtering recommendation algorithms," in Proc. of 10th international conference on World Wide Web, pp. 285-295, May 1-5, 2001.
|
12 |
D. Lemire and A. Maclachlan, "Slope one predictor for online rating-based collaborative filtering," in Proc of 2005 SIAM International Conference on Data Mining, pp. 471-475, April 21-23, 2005.
|
13 |
M. Papagelis and D. Plexousakis, "Qualitative analysis of user-based and item-based prediction algorithms for recommendation agents," Engineering Applications of Artifical Intelligence, vol. 18, no. 7, pp. 781-789, October 2005.
DOI
ScienceOn
|
14 |
H. Polat and W. Du, "Privacy-preserving top-N recommendation on horizontally partitioned Data," in Proc. of 2005 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 725-731, September 19-22, 2005.
|
15 |
I. Yakut and H. Polat, "Estimating NBC-based recommendations on arbitrarily partitioned data with privacy," Knowledge-based Systems, vol. 36, pp. 353-362, December 2012.
DOI
ScienceOn
|
16 |
J. Kim, C. Park, J. Hwang, and H. J. Kim, "Privacy Level Indicating Data Leakage Prevention System," KSII Transaction on Internet and Information Systems, vol. 7, no. 3, pp. 558-575, March 2013.
DOI
ScienceOn
|
17 |
C. Kaleli and H. Polat, "Providing naïve Bayesian classifier-based private recommendations on partitioned data," Lecture Notes in Computer Science, vol. 4702, pp. 515-522, September 2007.
|
18 |
P.K. Prasad and C.P. Rangan, "Privacy preserving BIRCH algorithm for clustering over arbitrarily partitioned databases," Lecture Notes on Computer Science, vol. 4632, pp. 146-157, August 2007.
|
19 |
H. Polat and W. Du, "Privacy-preserving collaborative filtering on vertically partitioned data," Lecture Notes on Computer Science, vol. 3721, pp. 651-658, October 2005.
|
20 |
I. Yakut and H. Polat, "Privacy-preserving SVD-based collaborative filtering on partitioned data," International Journal of Information Technology and Decision Making, vol. 9, no. 3, pp. 473-502, May 2010.
DOI
ScienceOn
|
21 |
C.L. Hsieh, J. Zhan, D. Zeng, and F. Wang, "Preserving privacy in joining recommender systems," in Proc. of International Conference on Information Security and Assurance, pp. 561-566, April 24-26, 2008.
|
22 |
J. Zhan, I.C. Wang, C.L. Hsieh, T.S. Hsu, C.J. Liau, and D.W. Wang, "Towards efficient privacy-preserving collaborative recommender systems," in Proc. of IEEE International Conference on Granular Computing, . 2008.
|
23 |
C. Kaleli and H. Polat, "SOM-based recommendations with privacy on multi-party vertically distributed data," Journal of Operational Research, vol. 63, pp. 826-838. June 2012.
DOI
|
24 |
M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?," in Proc. of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113-124, October 21, 2011.
|
25 |
C. Kaleli and H. Polat, "Privacy-preserving trust-based recommendations on vertically distributed data," in Proc. of Fifth IEEE International Conference on Semantic Computing,pp. 376-379, September 18-21, 2011.
|
26 |
Y. Zhao, X. Feng, J. Li, and B. Liu, "Shared collaborative filtering," in Proc. of the fifth ACM conference on Recommender systems, pp. 29-36, October 23-27, 2011.
|
27 |
G. Jagannathan and R.N. Wright, "Privacy-preserving distributed k-means clustering over arbitrarily partitioned data," in Proc. of 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593-599, August 21-24, 2005.
|
28 |
A. Bilge, C. Kaleli, I. Yakut, I. Gunes, and H. Polat, "A survey of privacy-preserving collaborative filtering schemes," International Journal of Software Engineering and Knowledge Engineering, vol. 23, no. 8, pp. 1085-1108, October 2013.
DOI
ScienceOn
|
29 |
P. Paillier, "Public key cryptosystems based on composite degree residuosity classes," Lecture Notes in Computer Science, vol. 1592, pp. 223-238, May 1999.
|
30 |
M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," Lecture Notes in Computer Science, vol. 3027, pp. 1-19, May 2004.
|