A comprehensive survey on trustworthy recommender systems
As one of the most successful AI-powered applications, recommender systems aim to help
people make appropriate decisions in an effective and efficient way, by providing …
people make appropriate decisions in an effective and efficient way, by providing …
A survey on trustworthy recommender systems
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …
deployed in almost every corner of the web and facilitate the human decision-making …
Sok: differential privacies
D Desfontaines, B Pejó - arXiv preprint arXiv:1906.01337, 2019 - arxiv.org
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of IoT applications amongst researchers and technology industries over the last …
deployment of IoT applications amongst researchers and technology industries over the last …
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …
deployment of Internet of Things (IoT) applications amongst researchers and technology …
Efficient and scalable job recommender system using collaborative filtering
Recommendation system is a techniques, which provides users with information, which
he/she may be interested in or accessed in past. Traditional recommender techniques such …
he/she may be interested in or accessed in past. Traditional recommender techniques such …
Trustworthy Recommender Systems: Foundations and Frontiers
Recommender systems aim to provide personalized suggestions to users, helping them
make effective decisions. However, recent evidence has revealed the untrustworthy aspects …
make effective decisions. However, recent evidence has revealed the untrustworthy aspects …
Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review
Purpose Similarly, Zhu et al.(2014) and Zhang et al.(2014) stated that addressing privacy
concerns with the recommendation process is necessary for the healthy development of app …
concerns with the recommendation process is necessary for the healthy development of app …
[图书][B] Guide to differential privacy modifications: a taxonomy of variants and extensions
B Pejó, D Desfontaines - 2022 - books.google.com
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
An automated model to score the privacy of unstructured information—Social media case
One of the common forms of data which is shared by online social media users is free-text
formats including comments, posts, blogs and tweets. While users mostly share this …
formats including comments, posts, blogs and tweets. While users mostly share this …