JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 9-18.doi: 10.6040/j.issn.1671-9352.2.2019.171
Previous Articles Next Articles
Chao ZHANG(),Ying LIANG*(),Hao-shan FANG
CLC Number:
1 |
GOLDBERG D , NICHOLS D , OKI B M , et al. Using collaborative filtering to weave an information tapestry[J]. Communications of the ACM, 1992, 35 (12): 61- 70.
doi: 10.1145/138859.138867 |
2 |
KAUTZ H , SELMAN B , SHAH M . Referral Web: combining social networks and collaborative filtering[J]. Communications of the ACM, 1997, 40 (3): 63- 65.
doi: 10.1145/245108.245123 |
3 | XU C H . A novel recommendation method based on social network using matrix factorization technique[J]. Information Processing & Management, 2018, 54 (3): 463- 474. |
4 | SAMARATI P, SWEENEY L. Generalizing data to provide anonymity when disclosing information (abstract)[C]//Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems-PODS ′98, June 1-4, 1998. New York: ACM Press, 1998: 188. |
5 | CASINO F, DOMINGO-FERRER J, PATSAKIS C, et al. Privacy preserving collaborative filtering with k-anonymity through microaggregation[C]//2013 IEEE 10th International Conference on e-Business Engineering, September 11-13, 2013. Coventry: IEEE, 2013: 490-497. |
6 |
WEI R X , TIAN H , SHEN H . Improving k -anonymity based privacy preservation for collaborative filtering[J]. Computers and Electrical Engineering, 2018, 67: 509- 519.
doi: 10.1016/j.compeleceng.2018.02.017 |
7 | DWORK C . Differential privacy[M]. Berlin: Springer, 2006: 1- 12. |
8 |
SHIN H , KIM S , SHIN J , et al. Privacy enhanced matrix factorization for recommendation with local differential privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2018, 30 (9): 1770- 1782.
doi: 10.1109/TKDE.2018.2805356 |
9 |
WANG P , YANG J , ZHANG J P . A strategy toward collaborative filter recommended location service for privacy protection[J]. Sensors, 2018, 18 (5): 1522.
doi: 10.3390/s18051522 |
10 |
VIEJO A , CASTELL À-ROCA J . Using social networks to distort users' profiles generated by web search engines[J]. Computer Networks, 2010, 54 (9): 1343- 1357.
doi: 10.1016/j.comnet.2009.11.003 |
11 | BADSHA S, YI X, KHALIL I, et al. Privacy preserving user-based recommender system[C]//2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Atlanta: IEEE, 2017: 1074-1083. |
12 |
BADSHA S , YI X , KHALIL I . A practical privacy-preserving recommender system[J]. Data Science and Engineering, 2016, 1 (3): 161- 177.
doi: 10.1007/s41019-016-0020-2 |
13 | 高枫, 何泾沙. 基于信任和信息流模型的隐私保护方法[J]. 山东大学学报(理学版), 2011, 46 (5): 39- 43. |
GAO Feng , HE Jingsha . A privacy protection method based on a trust and information flow model[J]. Journal of Shandong University(Natural Science), 2011, 46 (5): 39- 43. | |
14 |
MCPHERSON M , SMITH-LOVIN L , COOK J M . Birds of a feather: homophily in social networks[J]. Annual Review of Sociology, 2001, 27 (1): 415- 444.
doi: 10.1146/annurev.soc.27.1.415 |
15 | 梁芷铭. 基于新浪微博的网络信息生命周期实证研究[J]. 新闻界, 2014, (3): 60- 64. |
LIANG Zhiming . Empirical research on network information life cycle based on Sina Weibo[J]. Journalism, 2014, (3): 60- 64. | |
16 | PAGE L, BRIN S, MOTWANI R, et al. The PageRank citation ranking: bringing order to the web[R].[S.l.]: [s.n.], Stanford InfoLab, 1999. |
17 | 高昂.支持隐私保护的社交网络信息传播方法研究[D].北京:中国科学院大学, 2019. |
GAO Ang. Research on social network information dissemination methods that support privacy protection [D]. Beijing: University of Chinese Academy of Sciences, 2019. |
[1] | Xiao-jie XIE,Ying LIANG,Xiang-xiang DONG. Sensitive attribute iterative inference method for social network users [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 10-17, 27. |
[2] | Tian-tian CHANG,Xing-shu CHEN,Yong-gang LUO,Xiao LAN. Security domain-based data isolation protection framework for Hive [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 1-9. |
[3] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[4] | SUI Yun-xian, LIU Yong. Mining algorithm of E-burt structural hole based on two-step neighbor [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 59-68. |
[5] | ZHANG Zhong-jun, ZHANG Wen-juan, YU Lai-hang, LI Run-chuan. A community division method based on network distance and content similarity in micro-blog social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 97-103. |
[6] | BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84. |
[7] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[8] | DENG Xiao-fang, ZHONG Yuan-sheng, L(¨overU)Lin-yuan, WANG Ming-wen, XIONG Nai-xue. Mass diffusion on coupled social networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 51-59. |
[9] | YANG Zhen, SI Shu-yong, LI Chao-yang. Information recommendation based on users interest model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(1): 15-22. |
[10] | LIU Xin, XU Qiu-liang, ZHANG Bo. Cooperative group signature scheme with controllable linkability [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 18-35. |
[11] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
[12] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[13] | . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67. |
[14] | GUO Hua-long, REN Xue-fang, ZHANG Ling. Relationships between dynamic data mining and P-augmented matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 105-110. |
[15] | TANG Qian, YANG Fei, HUANG Qi, LIN Guo-yuan. Security transfer model of access control information based on TCB subsets [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 98-106. |
|