{"id":"https://openalex.org/W4309675390","doi":"https://doi.org/10.1109/kse56063.2022.9953800","title":"An efficient Privacy-Preserving Recommender System","display_name":"An efficient Privacy-Preserving Recommender System","publication_year":2022,"publication_date":"2022-10-19","ids":{"openalex":"https://openalex.org/W4309675390","doi":"https://doi.org/10.1109/kse56063.2022.9953800"},"language":"en","primary_location":{"id":"doi:10.1109/kse56063.2022.9953800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044606631","display_name":"Thi Van Anh Vu","orcid":"https://orcid.org/0009-0009-8218-0685"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Van Vu-Thi","raw_affiliation_strings":["Academy of Cryptography Techniques,Hanoi,Vietnam","Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018342983","display_name":"Dung Luong-The","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Dung Luong-The","raw_affiliation_strings":["Academy of Cryptography Techniques,Hanoi,Vietnam","Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018511707","display_name":"Quan Hoang-Van","orcid":null},"institutions":[{"id":"https://openalex.org/I4210152602","display_name":"Ministry of Health","ror":"https://ror.org/055546q82","country_code":"VN","type":"government","lineage":["https://openalex.org/I4210152602"]},{"id":"https://openalex.org/I4210161417","display_name":"Ministry of Defense","ror":"https://ror.org/04wxm6g36","country_code":"IL","type":"government","lineage":["https://openalex.org/I4210161417"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB","IL","VN"],"is_corresponding":false,"raw_author_name":"Quan Hoang-Van","raw_affiliation_strings":["Staff General, Ministry of Defense,Hanoi,Vietnam","Staff General, Ministry of Defense, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Staff General, Ministry of Defense,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210152602","https://openalex.org/I4210161417","https://openalex.org/I1306956679"]},{"raw_affiliation_string":"Staff General, Ministry of Defense, Hanoi, Vietnam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044606631"],"corresponding_institution_ids":["https://openalex.org/I4210155035"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62101295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"7","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8574309349060059},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7585768103599548},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.745431661605835},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6762871742248535},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6175088286399841},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.521450936794281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4214790463447571},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42028772830963135},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4006028175354004},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3006412982940674},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12096929550170898}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8574309349060059},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7585768103599548},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.745431661605835},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6762871742248535},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6175088286399841},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.521450936794281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4214790463447571},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42028772830963135},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4006028175354004},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3006412982940674},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12096929550170898},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse56063.2022.9953800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1522266554","https://openalex.org/W1534388293","https://openalex.org/W2007605181","https://openalex.org/W2020915469","https://openalex.org/W2025605741","https://openalex.org/W2081909523","https://openalex.org/W2108834246","https://openalex.org/W2108954244","https://openalex.org/W2155106456","https://openalex.org/W2166939545","https://openalex.org/W2233233025","https://openalex.org/W2527113903","https://openalex.org/W2597846184","https://openalex.org/W2746530484","https://openalex.org/W2942900075","https://openalex.org/W2950332743","https://openalex.org/W6676522543","https://openalex.org/W6762269740"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W2170801710","https://openalex.org/W2952704802","https://openalex.org/W2741781807"],"abstract_inverted_index":{"The":[0,46,123],"popularity":[1],"of":[2,18,48,88,151],"online":[3],"recommender":[4,51,74],"systems":[5],"has":[6],"soared.":[7],"They":[8],"are":[9,22],"deployed":[10],"on":[11],"numerous":[12],"websites":[13],"and":[14,61,100,110,125,138,158],"gather":[15],"tremendous":[16],"amounts":[17],"user":[19,36,56,89],"data":[20,29],"that":[21,129],"necessary":[23],"for":[24],"recommendation":[25],"purposes.":[26],"However,":[27,102],"this":[28,103],"may":[30],"pose":[31],"a":[32,49,92],"severe":[33],"threat":[34],"to":[35,54,65,141,160],"privacy,":[37],"if":[38],"accessed":[39],"by":[40,77,97],"untrusted":[41],"parties":[42],"or":[43],"used":[44],"inappropriately.":[45],"goal":[47],"privacy-preserving":[50,73],"system":[52,60],"is":[53,71,133],"hide":[55],"ratings":[57,90],"from":[58],"the":[59,72,86,130,145,149,152,156],"yet":[62],"allow":[63],"them":[64],"make":[66],"recommendations.":[67],"A":[68],"recent":[69],"example":[70],"scheme":[75,83,104],"proposed":[76,131],"Pranav":[78],"Verma":[79],"et":[80],"al.":[81],"Their":[82],"can":[84],"ensure":[85],"privacy":[87,150],"against":[91,155],"malicious":[93],"server":[94],"as":[95],"shown":[96],"Mu,":[98],"Shao,":[99],"Miglani.":[101],"still":[105],"requires":[106],"quite":[107],"high":[108],"communication":[109,139],"computation":[111],"costs.":[112],"This":[113],"paper":[114],"proposes":[115],"an":[116],"improved":[117],"protocol":[118,147],"using":[119],"Secure":[120],"multi-party":[121],"computation.":[122],"theoretical":[124],"experimental":[126],"analysis":[127],"shows":[128],"method":[132],"effective":[134],"in":[135],"both":[136],"computing":[137],"compared":[140],"other":[142],"method.":[143],"Moreover,":[144],"new":[146],"preserves":[148],"honest":[153],"users":[154],"miner":[157],"up":[159],"n-2":[161],"corrupted":[162],"users.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
