Journal on Communications ›› 2019, Vol. 40 ›› Issue (9): 106-115.doi: 10.11959/j.issn.1000-436x.2019183
• Papers • Previous Articles Next Articles
Haiyan WANG1,2,Jinxiang LU1
Revised:
2019-07-04
Online:
2019-09-25
Published:
2019-09-28
Supported by:
CLC Number:
Haiyan WANG,Jinxiang LU. Personalized privacy protection method for group recommendation[J]. Journal on Communications, 2019, 40(9): 106-115.
"
群组大小 | GSPPM | 随机扰动方法 | |||||
性别划分 | 年龄划分 | 职业划分 | 性别划分 | 年龄划分 | 职业划分 | ||
1 | 0.997 54 | 0.984 51 | 0.983 56 | 0.998 51 | 0.985 56 | 0.985 47 | |
20 | 0.950 17 | 0.940 25 | 0.938 87 | 0.968 19 | 0.950 12 | 0.937 95 | |
30 | 0.938 63 | 0.938 71 | 0.926 84 | 0.941 02 | 0.940 19 | 0.929 76 | |
40 | 0.934 09 | 0.930 19 | 0.921 16 | 0.940 01 | 0.939 17 | 0.924 87 | |
50 | 0.935 08 | 0.924 54 | 0.920 61 | 0.937 86 | 0.932 97 | 0.922 16 |
[1] | SWEENEY L . k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570. |
[2] | KAPLAN E , GURSOY M E , NERGIZ M E ,et al. Known sample attacks on relation preserving data transformations[J]. IEEE Transactions on Dependable and Secure Computing, 2017,1(32): 101-108. |
[3] | AHMED K W , MOURI I J , ZAMAN R ,et al. A privacy preserving personalized group recommendation framework[C]// International Conference on Advanced Computing. IEEE, 2016: 594-598. |
[4] | LU Z , SHEN H . A security-assured accuracy-maximised privacy preserving collaborative filtering recommendation algorithm[C]// International Database Engineering and Applications Symposium. ACM, 2015: 72-80. |
[5] | LI C , PALANISAMY B , JOSHI J . SocialMix:supporting privacy-aware trusted social networking services[C]// IEEE International Conference on Web Services. IEEE, 2016: 115-122. |
[6] | LIU P , LI Y , SANG Y ,et al. Anonymity-based privacy preserving network data publication[C]// Trustcom/BigDataSE/ISPA. IEEE, 2017: 823-828. |
[7] | TANG Q , WANG J . Privacy-preserving friendship-based recommender systems[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(5): 784-796. |
[8] | AHMADI M , GHAHFAROKHI B S . Preserving privacy in location based mobile coupon systems using anonymous authentication scheme[C]// International Iranian Society of Cryptology Conference on Information Security and Cryptology. IEEE, 2016: 60-65. |
[9] | GUO L , ZHANG C , FANG Y . A trust-based privacy-preserving friend recommendation scheme for online social networks[J]. IEEE Transactions on Dependable & Secure Computing, 2015,12(4): 413-427. |
[10] | PENG T , LIU Q , WANG G . Enhanced location privacy preserving scheme in location-based services[J]. IEEE Systems Journal, 2014,11(1): 219-230. |
[11] | ZHU J , HE P , ZHENG Z ,et al. A privacy-preserving QoS prediction framework for Web service recommendation[C]// IEEE International Conference on Web Services. IEEE, 2015: 241-248. |
[12] | GAI K , QIU M , ZHAO H ,et al. Privacy-aware adaptive data encryption strategy of big data in cloud computing[C]// IEEE International Conference on Cyber Security and Cloud Computing. IEEE, 2016: 273-278. |
[13] | 何明, 常盟盟, 吴小飞 . 一种基于差分隐私保护的协同过滤推荐方法[J]. 计算机研究与发展, 2017,54(7): 1439-1451. |
HE M , CHANG M M , WU X F . A collaborative filtering recommen-dation method based on differential privacy protection[J]. Computer Research and Development, 2017,54(7): 1439-1451. | |
[14] | 张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949. |
ZHANG X J , MENG X F . Differential privacy protection for data Release and analysis[J]. Journal of Computer Science, 2014,37(4): 927-949. | |
[15] | 熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122. |
XIONG P , ZHU T Q , WANG X F . Differential privacy protection and its application[J]. Journal of Computer Science, 2014,37(1): 101-122. | |
[16] | 马鑫迪, 李辉, 马建峰 ,等. 轻量级位置感知推荐系统隐私保护框架[J]. 计算机学报, 2017,40(5): 1017-1030. |
MA X D , LI H , MA J F ,et al. Privacy protection framework of light-weight location-aware recommendation system[J]. Journal of Com-puter Science, 2017,40(5): 1017-1030. | |
[17] | 姜火文, 曾国荪, 马海英 . 面向表数据发布隐私保护的贪心聚类匿名方法[J]. 软件学报, 2017,28(2): 341-351. |
JIANG H W , ZENG G S , MA H Y . Greedy clustering anonymous method for privacy protection of tabular data release[J]. Journal of Software, 2017,28(2): 341-351. | |
[18] | YANG M , ZHU T , MA L ,et al. Privacy preserving collaborative filtering via the Johnson-Lindenstrauss transform[C]// Trustcom/BigDataSE/ICESS. IEEE, 2017: 417-424. |
[19] | 刘海, 李兴华, 雒彬 ,等. 基于区块链的分布式 K 匿名位置隐私保护方案[J]. 计算机学报, 2019,42(5): 942-960. |
LIU H , LI X H , LUO B ,et al. Distributed K anonymous location privacy protection scheme based on block chain[J]. Journal of Com-puter Science, 2019,42(5): 942-960. | |
[20] | 林荣智, 苗耀锋 . 基于用户项目特征分组的隐私保护算法[J]. 沈阳工业大学学报, 2018,40(6): 670-675. |
LIN R Z , MIAO Y F . Privacy protection algorithm based on user project feature grouping[J]. Journal of Shenyang University of Tech-nology, 2008,40(6): 670-675. | |
[21] | WANG P , YANG J , ZHANG J . A strategy toward collaborative filter recommended location service for privacy protection[J]. Sensors, 2018,18(5): 1522-1541. |
[22] | LUO Z , CHEN Z . A privacy preserving group recommender based on cooperative perturbation[C]// International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE Computer Society, 2014: 106-111. |
[23] | SHANG S , HUI Y , HUI P ,et al. Privacy preserving recommendation system based on groups[J]. Computer Science, 2013,5(1): 219-246. |
[24] | WU Z , LI G , LIU Q ,et al. Covering the sensitive subjects to protect personal privacy in personalized recommendation[J]. IEEE Transactions on Services Computing, 2016,11(3): 493-506. |
[25] | 张玉洁, 杜雨露, 孟祥武 . 组推荐系统及其应用研究[J]. 计算机学报, 2016,39(4): 746-760. |
ZHANG Y J , DU Y L , MENG X W . Group recommendation system and its application research[J]. Journal of Computer Science, 2016,39(4): 746-760. | |
[26] | HE Y , ZHANG K , WANG H ,et al. Impact factor-based group recommendation scheme with privacy preservation in MSNs[C]// 2017 IEEE International Conference on Communications. IEEE, 2017. |
[27] | YIN C , SHI L , SUN R ,et al. Improved collaborative filtering recommendation algorithm based on differential privacy protection[J]. The Journal of Super Computing, 2019(7): 1-14. |
[28] | 耿魁, 万盛, 李凤华 ,等. 基于隐私匹配的服务代理发现方法[J]. 通信学报, 2016,37(8): 136-143. |
GENG K , WAN S , LI F H ,et al. Service agent discovery method based on privacy matching[J]. Journal on Communications, 2016,37(8): 136-143. | |
[29] | 张少波, 刘琴, 王国军 . 基于位置混淆的轨迹隐私保护方法[J]. 通信学报, 2018,39(7): 85-95. |
ZHANG S B , LIU Q , WANG G J . Trajectory privacy protection method based on location confusion[J]. Journal on Communications, 2018,39(7): 85-95. | |
[30] | 王涛春, 刘盈, 金鑫 ,等. 群智感知中基于 k-匿名的位置及数据隐私保护方法研究[J]. 通信学报, 2018,39(S1): 176-184. |
WANG T C , LIU Y , JIN X ,et al. Research on k-anonymise-based location and data privacy protection methods in swarm intelligence perception[J]. Journal on Communications, 2018,39(S1): 176-184. |
[1] | Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG. Container escape detection method based on heterogeneous observation chain [J]. Journal on Communications, 2023, 44(1): 49-63. |
[2] | Ru HUO, Xiangfeng CHENG, Chuang SUN, Shuo WANG, Tao HUANG, Yu F.Richard. Topology optimization and forwarding strategy design for blockchain network [J]. Journal on Communications, 2022, 43(12): 89-100. |
[3] | Hang QIU, Hongbo TANG, Wei YOU, Yu ZHAO, Yi BAI. QGA-based network service extension algorithm in NFV [J]. Journal on Communications, 2022, 43(11): 44-52. |
[4] | Jinyin CHEN, Shulong HU, Changyou XING, Guomin ZHANG. Deception defense method against intelligent penetration attack [J]. Journal on Communications, 2022, 43(10): 106-120. |
[5] | Hongyong JIA, Yunfei PAN, Wenhe LIU, Junjie ZENG, Jianhui ZHANG. Executive dynamic scheduling algorithm based on high-order heterogeneity [J]. Journal on Communications, 2022, 43(3): 233-245. |
[6] | Hongyu YANG, Haihang YUAN, Liang ZHANG. Host security assessment method based on attack graph [J]. Journal on Communications, 2022, 43(2): 89-99. |
[7] | Xiang GONG, Tao FENG, Jinze DU. Formal modeling and security analysis method of security protocol based on CPN [J]. Journal on Communications, 2021, 42(9): 240-253. |
[8] | Xiaoyan LIANG, Ruizhong DU. Semantic representation and interval roughness analysis of IoT CapBAC rules [J]. Journal on Communications, 2021, 42(9): 43-53. |
[9] | Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG. Botnet detection based on generative adversarial network [J]. Journal on Communications, 2021, 42(7): 95-106. |
[10] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[11] | Ru HUO, Dong NI, Hua LU, Yunfeng XIA, Shuo WANG, Tao HUANG, Yunjie LIU. Efficient routing strategy of blockchain-based payment channel network [J]. Journal on Communications, 2021, 42(6): 30-40. |
[12] | Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU. Network security situational awareness model based on threat intelligence [J]. Journal on Communications, 2021, 42(6): 182-194. |
[13] | Wengang MA, Yadong ZHANG, Jin GUO. Abnormal traffic detection method based on LSTM and improved residual neural network optimization [J]. Journal on Communications, 2021, 42(5): 23-40. |
[14] | Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI. Method against process control-flow hijacking based on mimic defense [J]. Journal on Communications, 2021, 42(1): 37-47. |
[15] | Zhuo CHEN,Gang FENG,Yijing LIU,Yang ZHOU. Virtual network function deployment strategy based on improved genetic simulated annealing algorithm in MEC [J]. Journal on Communications, 2020, 41(4): 70-80. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|