{"id":"https://openalex.org/W2534826340","doi":"https://doi.org/10.1145/2976749.2978316","title":"EpicRec","display_name":"EpicRec","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2534826340","doi":"https://doi.org/10.1145/2976749.2978316","mag":"2534826340"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978316","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058974318","display_name":"Yilin Shen","orcid":"https://orcid.org/0000-0002-1955-1529"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yilin Shen","raw_affiliation_strings":["Samsung Research America, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Samsung Research America, Mountain View, CA, USA","institution_ids":["https://openalex.org/I4210101778"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044205212","display_name":"Hongxia Jin","orcid":"https://orcid.org/0009-0000-0222-4217"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxia Jin","raw_affiliation_strings":["Samsung Research America, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Samsung Research America, Mountain View, CA, USA","institution_ids":["https://openalex.org/I4210101778"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058974318"],"corresponding_institution_ids":["https://openalex.org/I4210101778"],"apc_list":null,"apc_paid":null,"fwci":11.5689,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.98459707,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"180","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8175676465034485},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6513940691947937},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.636210560798645},{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.5287601351737976},{"id":"https://openalex.org/keywords/server-side","display_name":"Server-side","score":0.5280939936637878},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48745083808898926},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44669976830482483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39545926451683044},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37194252014160156},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3263460695743561},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07175806164741516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8175676465034485},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6513940691947937},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.636210560798645},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.5287601351737976},{"id":"https://openalex.org/C14414571","wikidata":"https://www.wikidata.org/wiki/Q519081","display_name":"Server-side","level":2,"score":0.5280939936637878},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48745083808898926},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44669976830482483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39545926451683044},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37194252014160156},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3263460695743561},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07175806164741516}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978316","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W5855678","https://openalex.org/W17579607","https://openalex.org/W41409100","https://openalex.org/W568726942","https://openalex.org/W1873763122","https://openalex.org/W1981631259","https://openalex.org/W1993058867","https://openalex.org/W2022097286","https://openalex.org/W2030708634","https://openalex.org/W2050482694","https://openalex.org/W2057576485","https://openalex.org/W2101771965","https://openalex.org/W2104743167","https://openalex.org/W2109426455","https://openalex.org/W2117983043","https://openalex.org/W2122788739","https://openalex.org/W2123779242","https://openalex.org/W2124558600","https://openalex.org/W2139429031","https://openalex.org/W2142406320","https://openalex.org/W2150230313","https://openalex.org/W2160955670","https://openalex.org/W2167094273","https://openalex.org/W2169101582","https://openalex.org/W2170204206","https://openalex.org/W2170540710","https://openalex.org/W2249233550","https://openalex.org/W2290508257","https://openalex.org/W2296319761","https://openalex.org/W2400472666","https://openalex.org/W2950884216","https://openalex.org/W4255574744","https://openalex.org/W6676538461","https://openalex.org/W6677304377"],"related_works":["https://openalex.org/W2354118500","https://openalex.org/W2738452777","https://openalex.org/W2513219509","https://openalex.org/W132166919","https://openalex.org/W2883509087","https://openalex.org/W2774332981","https://openalex.org/W2514005337","https://openalex.org/W190032850","https://openalex.org/W2296817781","https://openalex.org/W2139251033"],"abstract_inverted_index":{"Recommender":[0],"systems":[1],"typically":[2],"require":[3],"users'":[4,79],"history":[5],"data":[6,27,71],"to":[7,28,34,43,77],"provide":[8,44],"a":[9],"list":[10],"of":[11,24,86],"recommendations":[12,15],"and":[13,89,100],"such":[14,25],"usually":[16],"reside":[17],"on":[18,73,92,96],"the":[19,22,29,58,70,74,93,97],"cloud/server.":[20],"However,":[21],"release":[23],"private":[26],"cloud":[30],"has":[31],"been":[32],"shown":[33],"put":[35],"users":[36,45],"at":[37],"risk.":[38],"It":[39],"is":[40],"highly":[41],"desirable":[42],"high-quality":[46],"personalized":[47],"services":[48],"while":[49],"respecting":[50],"their":[51,106],"privacy.":[52,80],"In":[53],"this":[54],"paper,":[55],"we":[56],"develop":[57],"first":[59],"Enhanced":[60],"Privacy-built-In":[61],"Client":[62],"for":[63],"Personalized":[64],"Recommendation":[65],"(EpicRec)":[66],"system":[67,82],"that":[68],"performs":[69],"perturbation":[72],"client":[75],"side":[76],"protect":[78],"Our":[81],"needs":[83,101],"no":[84,90],"assumption":[85],"trusted":[87],"server":[88,98],"change":[91],"recommendation":[94],"algorithms":[95],"side;":[99],"minimum":[102],"user":[103],"interaction":[104],"in":[105],"preferred":[107],"manner,":[108],"which":[109],"makes":[110],"our":[111],"solution":[112],"fit":[113],"very":[114],"well":[115],"into":[116],"real":[117],"world":[118],"practical":[119],"use.":[120]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
