A comprehensive survey on trustworthy recommender systems

W Fan, X Zhao, X Chen, J Su, J Gao, L Wang… - arXiv preprint arXiv …, 2022 - arxiv.org
As one of the most successful AI-powered applications, recommender systems aim to help
people make appropriate decisions in an effective and efficient way, by providing …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2022 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

Sok: differential privacies

D Desfontaines, B Pejó - arXiv preprint arXiv:1906.01337, 2019 - arxiv.org
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …

Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review

AAN Patwary, A Fu, RK Naha, SK Battula… - arXiv preprint arXiv …, 2020 - arxiv.org
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of IoT applications amongst researchers and technology industries over the last …

Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …

Efficient and scalable job recommender system using collaborative filtering

R Mishra, S Rathi - ICDSMLA 2019: Proceedings of the 1st International …, 2020 - Springer
Recommendation system is a techniques, which provides users with information, which
he/she may be interested in or accessed in past. Traditional recommender techniques such …

Trustworthy Recommender Systems: Foundations and Frontiers

W Fan, X Zhao, L Wang, X Chen, J Gao, Q Liu… - Proceedings of the 29th …, 2023 - dl.acm.org
Recommender systems aim to provide personalized suggestions to users, helping them
make effective decisions. However, recent evidence has revealed the untrustworthy aspects …

Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review

S Beg, SUR Khan, A Anjum - Library Hi Tech, 2022 - emerald.com
Purpose Similarly, Zhu et al.(2014) and Zhang et al.(2014) stated that addressing privacy
concerns with the recommendation process is necessary for the healthy development of app …

[图书][B] Guide to differential privacy modifications: a taxonomy of variants and extensions

B Pejó, D Desfontaines - 2022 - books.google.com
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …

An automated model to score the privacy of unstructured information—Social media case

E Aghasian, S Garg, J Montgomery - Computers & Security, 2020 - Elsevier
One of the common forms of data which is shared by online social media users is free-text
formats including comments, posts, blogs and tweets. While users mostly share this …