Collaborative filtering with privacy via factor analysis
SIGIR '02 Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Spectral Analysis of Random Graphs with Skewed Degree Distributions
FOCS '04 Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Factorization meets the neighborhood: a multifaceted collaborative filtering model
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Alambic: a privacy-preserving recommender system for electronic commerce
International Journal of Information Security
Scalable Collaborative Filtering with Jointly Derived Neighborhood Interpolation Weights
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
Privacy: Theory meets Practice on the Map
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Our data, ourselves: privacy via distributed noise generation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
Data mining with differential privacy
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially-private network trace analysis
Proceedings of the ACM SIGCOMM 2010 conference
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
Private and continual release of statistics
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Reliable medical recommendation systems with patient privacy
Proceedings of the 1st ACM International Health Informatics Symposium
Differentially private data release through multidimensional partitioning
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Shopping for products you don't know you need
Proceedings of the fourth ACM international conference on Web search and data mining
Personalized social recommendations: accurate or private
Proceedings of the VLDB Endowment
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
iReduct: differential privacy with reduced relative errors
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Personal privacy vs population privacy: learning to attack anonymization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differential privacy under fire
SEC'11 Proceedings of the 20th USENIX conference on Security
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC)
Shared collaborative filtering
Proceedings of the fifth ACM conference on Recommender systems
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Pistis: A Privacy-Preserving Content Recommender System for Online Social Communities
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Differential privacy for location pattern mining
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
An adaptive mechanism for accurate query answering under differential privacy
Proceedings of the VLDB Endowment
Private similarity computation in distributed systems: from cryptography to differential privacy
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
Recommender systems: from algorithms to user experience
User Modeling and User-Adapted Interaction
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Beating randomized response on incoherent matrices
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Unconditional differentially private mechanisms for linear queries
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Differentially private search log sanitization with optimal output utility
Proceedings of the 15th International Conference on Extending Database Technology
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Keeping information safe from social networking apps
Proceedings of the 2012 ACM workshop on Workshop on online social networks
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Low-rank mechanism: optimizing batch queries under differential privacy
Proceedings of the VLDB Endowment
Functional mechanism: regression analysis under differential privacy
Proceedings of the VLDB Endowment
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
Privacy-preserving content-based recommender system
Proceedings of the on Multimedia and security
BlurMe: inferring and obfuscating user gender based on ratings
Proceedings of the sixth ACM conference on Recommender systems
On significance of the least significant bits for differential privacy
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy auctions for recommender systems
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Optimal error of query sets under the differentially-private matrix mechanism
Proceedings of the 16th International Conference on Database Theory
Analyzing graphs with node differential privacy
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
Multi-agent based middleware for protecting privacy in IPTV content recommender services
Multimedia Tools and Applications
Knowledge-Based Systems
Mining frequent graph patterns with differential privacy
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving data exploration in genome-wide association studies
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Differential privacy for neighborhood-based collaborative filtering
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Differential privacy for functions and functional data
The Journal of Machine Learning Research
UMicS: from anonymized data to usable microdata
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Reliable medical recommendation systems with patient privacy
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
Privacy-preserving matrix factorization
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the use of decentralization to enable privacy in web-scale recommendation services
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Differential privacy based on importance weighting
Machine Learning
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Hi-index | 0.00 |
We consider the problem of producing recommendations from collective user behavior while simultaneously providing guarantees of privacy for these users. Specifically, we consider the Netflix Prize data set, and its leading algorithms, adapted to the framework of differential privacy. Unlike prior privacy work concerned with cryptographically securing the computation of recommendations, differential privacy constrains a computation in a way that precludes any inference about the underlying records from its output. Such algorithms necessarily introduce uncertainty--i.e., noise--to computations, trading accuracy for privacy. We find that several of the leading approaches in the Netflix Prize competition can be adapted to provide differential privacy, without significantly degrading their accuracy. To adapt these algorithms, we explicitly factor them into two parts, an aggregation/learning phase that can be performed with differential privacy guarantees, and an individual recommendation phase that uses the learned correlations and an individual's data to provide personalized recommendations. The adaptations are non-trivial, and involve both careful analysis of the per-record sensitivity of the algorithms to calibrate noise, as well as new post-processing steps to mitigate the impact of this noise. We measure the empirical trade-off between accuracy and privacy in these adaptations, and find that we can provide non-trivial formal privacy guarantees while still outperforming the Cinematch baseline Netflix provides.