{"id":"https://openalex.org/W4280588960","doi":"https://doi.org/10.1145/3501812","title":"Efficient Federated Matrix Factorization Against Inference Attacks","display_name":"Efficient Federated Matrix Factorization Against Inference Attacks","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4280588960","doi":"https://doi.org/10.1145/3501812"},"language":"en","primary_location":{"id":"doi:10.1145/3501812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3501812","pdf_url":null,"source":{"id":"https://openalex.org/S2492086750","display_name":"ACM Transactions on Intelligent Systems and Technology","issn_l":"2157-6904","issn":["2157-6904","2157-6912"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Intelligent Systems and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057997406","display_name":"Di Chai","orcid":"https://orcid.org/0000-0003-4810-0644"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Di Chai","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055087680","display_name":"Leye Wang","orcid":"https://orcid.org/0000-0002-7627-8485"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leye Wang","raw_affiliation_strings":["MOE Key Lab of High Confidence Software Technologies, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab of High Confidence Software Technologies, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438001","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0003-2587-6028"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100636286","display_name":"Qiang Yang","orcid":"https://orcid.org/0000-0001-5059-8360"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qiang Yang","raw_affiliation_strings":["WeBank AI Lab, China and Hong Kong University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"WeBank AI Lab, China and Hong Kong University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057997406"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":2.5206,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90648512,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"13","issue":"4","first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9021505117416382},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.758558452129364},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7145395278930664},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.7111340165138245},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6297183036804199},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5601805448532104},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.5188851952552795},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5163891911506653},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49407652020454407},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4558786451816559},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4372740685939789},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.36620670557022095},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33165520429611206},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27188050746917725}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9021505117416382},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.758558452129364},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7145395278930664},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.7111340165138245},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6297183036804199},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5601805448532104},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.5188851952552795},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5163891911506653},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49407652020454407},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4558786451816559},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4372740685939789},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.36620670557022095},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33165520429611206},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27188050746917725},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3501812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3501812","pdf_url":null,"source":{"id":"https://openalex.org/S2492086750","display_name":"ACM Transactions on Intelligent Systems and Technology","issn_l":"2157-6904","issn":["2157-6904","2157-6912"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Intelligent Systems and Technology","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-118572","is_oa":false,"landing_page_url":"http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2022&rft.spage=&rft.aulast=Chai&rft.aufirst=Di&rft.atitle=Efficient+Federated+Matrix+Factorization+Against+Inference+Attacks&rft.title=ACM+Transactions+on+Intelligent+Systems+and+Technology+%28TIST%29","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.5799999833106995,"display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G7469815063","display_name":null,"funder_award_id":"61972008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W574900623","https://openalex.org/W1981631259","https://openalex.org/W1994389483","https://openalex.org/W2017464959","https://openalex.org/W2022097286","https://openalex.org/W2054141820","https://openalex.org/W2083287929","https://openalex.org/W2142827986","https://openalex.org/W2157881433","https://openalex.org/W2167094273","https://openalex.org/W2233233025","https://openalex.org/W2406176316","https://openalex.org/W2512971201","https://openalex.org/W2513128224","https://openalex.org/W2527113903","https://openalex.org/W2544006205","https://openalex.org/W2604662567","https://openalex.org/W2605350416","https://openalex.org/W2735032239","https://openalex.org/W2767079719","https://openalex.org/W2768174108","https://openalex.org/W2789607830","https://openalex.org/W2790002550","https://openalex.org/W2798972759","https://openalex.org/W2806031607","https://openalex.org/W2888838693","https://openalex.org/W2913777072","https://openalex.org/W2949073274","https://openalex.org/W2951001079","https://openalex.org/W2963535017","https://openalex.org/W2989137146","https://openalex.org/W3047789363","https://openalex.org/W3097991661","https://openalex.org/W3099386565"],"related_works":["https://openalex.org/W4320023985","https://openalex.org/W2583454074","https://openalex.org/W4310629440","https://openalex.org/W2296635479","https://openalex.org/W2293469314","https://openalex.org/W2811423811","https://openalex.org/W3128102173","https://openalex.org/W3200727301","https://openalex.org/W3173540700","https://openalex.org/W4280588960"],"abstract_inverted_index":{"Recommender":[0],"systems":[1],"typically":[2],"require":[3],"the":[4,10,37,81,88,94,103,111,115,124],"revelation":[5],"of":[6,33,99,149],"users\u2019":[7,42],"ratings":[8,18],"to":[9,19,29,40,77,109,122,147,154],"recommender":[11,38],"server,":[12],"which":[13,92],"will":[14],"subsequently":[15],"use":[16],"these":[17],"provide":[20],"personalized":[21],"services.":[22],"However,":[23],"such":[24,79],"revelations":[25],"make":[26],"users":[27,63],"vulnerable":[28],"a":[30],"broader":[31],"set":[32],"inference":[34,65,150],"attacks,":[35],"allowing":[36],"server":[39],"learn":[41],"private":[43,82],"attributes,":[44],"e.g.,":[45],"age":[46],"and":[47,97,133],"gender.":[48],"Therefore,":[49],"in":[50],"this":[51],"paper,":[52],"we":[53,72,105],"propose":[54],"an":[55],"efficient":[56],"federated":[57],"matrix":[58],"factorization":[59],"method":[60,143],"that":[61,71,80,141],"protects":[62],"against":[64],"attacks.":[66],"The":[67,138],"key":[68],"idea":[69],"is":[70,85,131],"obfuscate":[73],"one":[74],"user\u2019s":[75],"rating":[76],"another":[78],"attribute":[83],"leakage":[84,113],"minimized":[86],"under":[87],"given":[89],"distortion":[90],"budget,":[91],"bounds":[93],"recommending":[95],"loss":[96],"overhead":[98],"system":[100],"efficiency.":[101],"During":[102],"obfuscation,":[104],"apply":[106],"differential":[107],"privacy":[108,157],"control":[110],"information":[112],"between":[114],"users.":[116],"We":[117],"also":[118],"adopt":[119],"homomorphic":[120],"encryption":[121],"protect":[123],"intermediate":[125],"results":[126],"during":[127],"training.":[128],"Our":[129],"framework":[130],"implemented":[132],"tested":[134],"on":[135],"real-world":[136],"datasets.":[137],"result":[139],"shows":[140],"our":[142],"can":[144],"reduce":[145],"up":[146],"16.7%":[148],"attack":[151],"accuracy":[152],"compared":[153],"using":[155],"no":[156],"protections.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
