[1] |
Deebak B D,Al-Turjman F.A novel community-based trust aware recommender systems for big data cloud service networks[J].Sustainable Cities and Society,2020,61:102274.
|
[2] |
Cao S,Zhang G X,Liu P F,et al.Cloud-assisted secure e- Health systems for tamper-proofing EHR via blockchain[J].Information Sciences:An International Journal,2019,485(C):427-440.
|
[3] |
Polatidis N, Georgiadis C K, Pimenidis E,et al.Privacy- preserving recommendations in context-aware mobile environments[J].Information & Computer Security,2017,25(1):62-79.
|
[4] |
Deldjoo Y,Noia T D,Merra F A.A survey on adversarial recommender systems:From attack/defense strategies to gene- rative adversarial networks[J].ACM Computing Surveys,2021,54(2):1-38.
|
[5] |
Bitcoin: A peer-to-peer electronic cash system [EB/OL]. [2008-08-01]. https://bitcoin.org/bitcoin.pdf.
|
[6] |
Frey R, Wrner D,Ilic A.Collaborative filtering on the blockchain:A secure recommender system for e-commerce[C]∥Proc of the 22nd Americas Conference on Information Systems,2016:875-890.
|
[7] |
Bosri R, Rahman M S,Bhuiyan M Z A,et al.Integrating blockchain with artificial intelligence for privacy-preserving recommender systems[J].IEEE Transactions on Network Science and Engineering,2020,8(2):1009-1018.
|
[8] |
Benet J. IPFS-content addressed,versioned,P2P file system[J].arXiv:1407.3561,2014.
|
[9] |
Casino F,Patsakis C.An efficient blockchain-based privacy-preserving collaborative filtering architecture [J].IEEE Transactions on Engineering Management,2019,67(4):1501-1513.
|
[10] |
Li L, Liu A,Li Q,et al.Privacy-preserving collaborative web services QoS prediction via YAOs garbled circuits and homomorphic encryption [J].Journal of Web Engineering,2016,15(3-4):203-225.
|
[11] |
Erkin Z,Veugen T,Toft T,et al.Generating private recommendations efficiently using homomorphic encryption and data packing[J].IEEE Transactions on Information Forensics and Security,2012,7(3):1053-1066.
|
[12] |
Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥Proc of the 17th International Conference on the Theory and Applications of Cryptogra- phic Techniques,1999:223-238.
|
[13] |
Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and publickey cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
|
[14] |
Zhou H, Wornell G.Efficient homomorphic encryption on integer vectors and its applications[C]∥Proc of 2014 Information Theory and Applications Workshop,2014:1-9.
|
[15] |
Lin L,Tian Y,Liu Y.A blockchain-based privacy-preserving recommendation mechanism[C]∥Proc of 2021 IEEE 5th International Conference on Cryptography,Security and Privacy,2021:74-78.
|
[16] |
Hu H,Dobbie G,Salcic Z,et al.A locality sensitive hashing based approach for federated recommender system[C]∥Proc of 2020 20th IEEE/ACM International Symposium on Cluster,Cloud and Internet Computing,2020:836-842.
|
[17] |
Gao C,Huang C,Lin D,et al.DPLCF:Differentially-private local collaborative filtering[C]∥Proc of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval,2020:961-970.
|
[18] |
Cai J-Y,Cusick T W.A lattice-based public-key cryptosystem[J].Information and Computation,1999,151(1-2):17-31.
|
[19] |
Micciancio D, Regev O.Lattice-based cryptography[M]∥Post-quantum Cryptography.Berlin,Heidelberg:Springer,2009:147-191.
|
[20] |
Regev O. On lattices, learning with errors, random linear codes, and cryptography[C]∥Proc of the 37th Annual ACM Symposium on Theory of Computing, 2005: 84-93.
|
[21] |
Indyk P, Motwani R.Approximate nearest neighbors:Towards removing the curse of dimensionality[C]∥Proc of the 30th Annual ACM Symposium on Theory of Computing,1998:604-613.
|
[22] |
Datar M,Immorlica N,Indyk P,et al.Locality-sensitive hash- ing scheme based on p-stable distributions[C]∥Proc of the 20th Annual Symposium on Computational Geometry,2004:253-262.
|