{"id":"https://openalex.org/W3199975223","doi":"https://doi.org/10.1145/3460231.3478855","title":"FR-FMSS: Federated Recommendation via Fake Marks and Secret Sharing","display_name":"FR-FMSS: Federated Recommendation via Fake Marks and Secret Sharing","publication_year":2021,"publication_date":"2021-09-13","ids":{"openalex":"https://openalex.org/W3199975223","doi":"https://doi.org/10.1145/3460231.3478855","mag":"3199975223"},"language":"en","primary_location":{"id":"doi:10.1145/3460231.3478855","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460231.3478855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Fifteenth ACM Conference on Recommender Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072561019","display_name":"Zhaohao Lin","orcid":"https://orcid.org/0000-0002-1246-9688"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaohao Lin","raw_affiliation_strings":["Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073490832","display_name":"Weike Pan","orcid":"https://orcid.org/0000-0001-6326-9531"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weike Pan","raw_affiliation_strings":["Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100633979","display_name":"Zhong Ming","orcid":"https://orcid.org/0000-0002-6933-5760"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Ming","raw_affiliation_strings":["Shenzhen University, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072561019"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":6.8854,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.96930886,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"668","last_page":"673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8047130107879639},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5432388186454773},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4578098654747009},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3947378993034363},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19627922773361206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8047130107879639},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5432388186454773},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4578098654747009},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3947378993034363},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19627922773361206}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460231.3478855","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460231.3478855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Fifteenth ACM Conference on Recommender Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G2084453805","display_name":null,"funder_award_id":"61836005, 61872249","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1994389483","https://openalex.org/W2054141820","https://openalex.org/W2081909523","https://openalex.org/W2108920354","https://openalex.org/W2141420453","https://openalex.org/W2171279286","https://openalex.org/W2340502990","https://openalex.org/W2599241014","https://openalex.org/W2604443846","https://openalex.org/W2952303992","https://openalex.org/W2963085847","https://openalex.org/W2963130043","https://openalex.org/W2971641579","https://openalex.org/W3064112253","https://openalex.org/W3127173367","https://openalex.org/W3137510859","https://openalex.org/W3174074918"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"With":[0],"the":[1,63,71,76,86,92,132,165,169,172],"implementation":[2],"of":[3,45,57,89,97,110,135,180],"privacy":[4,90,177],"protection":[5],"laws":[6],"such":[7],"as":[8,194],"GDPR,":[9],"it":[10],"is":[11],"increasingly":[12],"difficult":[13],"for":[14,147],"organizations":[15],"to":[16,33,39,49,103,143,163,171,196,199,203],"legally":[17],"collect":[18],"user":[19,31,35,41,136,176],"data.":[20],"However,":[21,55],"a":[22,43,81,104,108,118,204],"typical":[23],"recommendation":[24,53,122,145,187],"algorithm":[25,106],"based":[26],"on":[27],"machine":[28],"learning":[29],"requires":[30],"data":[32,166],"learn":[34],"preferences.":[36],"In":[37,113],"order":[38],"protect":[40,62,70,85,131],"privacy,":[42,137],"lot":[44],"recent":[46],"works":[47,59,83],"turn":[48],"develop":[50],"federated":[51,121],"learning-based":[52],"algorithms.":[54,112],"some":[56,67],"these":[58],"can":[60,68,84,99,128,139],"only":[61,69,80,100,130],"users\u2019":[64,72],"rating":[65,73,148],"values,":[66],"behavior":[74],"(i.e.,":[75],"engaged":[77],"items),":[78],"and":[79,152,160,192],"few":[82],"both":[87],"types":[88,134],"at":[91],"same":[93],"time.":[94],"Moreover,":[95],"most":[96,144],"them":[98],"be":[101,141],"applied":[102,142],"specific":[105,205],"or":[107],"class":[109],"similar":[111],"this":[114],"paper,":[115],"we":[116,156],"propose":[117],"generic":[119],"cross-user":[120],"framework":[123],"called":[124],"FR-FMSS.":[125],"Our":[126],"FR-FMSS":[127,202],"not":[129],"two":[133],"but":[138],"also":[140],"algorithms":[146],"prediction,":[149],"item":[150],"ranking,":[151],"sequential":[153],"recommendation.":[154],"Specifically,":[155],"use":[157],"fake":[158],"marks":[159],"secret":[161],"sharing":[162],"modify":[164],"uploaded":[167],"by":[168],"clients":[170],"server,":[173],"which":[174],"protects":[175],"without":[178],"loss":[179],"model":[181],"accuracy.":[182],"We":[183],"take":[184],"three":[185],"representative":[186],"algorithms,":[188],"i.e.,":[189],"MF-MPC,":[190],"eALS,":[191],"Fossil,":[193],"examples":[195],"show":[197],"how":[198],"apply":[200],"our":[201],"algorithm.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
