Learning from What Others Know: Privacy Preserving Cross System Personalization

作者: Bhaskar Mehta

DOI: 10.1007/978-3-540-73078-1_9

关键词:

摘要: Recommender systems have been steadily gaining popularity and deployed by several service providers. Large scalable deployment has however highlighted one of the design problems recommender systems: lack interoperability. Users today often use multiple electronic offering recommendations, which cannot learn from another. The result is that end user to provide similar information in some cases disjoint information. Intuitively, it seems much can be improved with this situation: learnt system could potentially reused another, offer an overall personalization experience. In paper, we effective solution problem using Latent Semantic Models learning a model across systems. A privacy preserving distributed framework added around traditional Probabilistic Analysis framework, practical aspects such as addition new items are also dealt work.

参考文章(10)
Bhaskar Mehta, Claudia Niederee, Avare Stewart, Marco Degemmis, Pasquale Lops, Giovanni Semeraro, Ontologically-Enriched Unified User Modeling for Cross-System Personalization User Modeling 2005. pp. 119- 123 ,(2005) , 10.1007/11527886_16
Bhaskar Mehta, Thomas Hofmann, Cross system personalization and collaborative filtering by learning manifold alignments KI'06 Proceedings of the 29th annual German conference on Artificial intelligence. pp. 244- 259 ,(2006) , 10.1007/978-3-540-69912-5_19
Thomas Hofmann, Collaborative filtering via gaussian probabilistic latent semantic analysis international acm sigir conference on research and development in information retrieval. pp. 259- 266 ,(2003) , 10.1145/860435.860483
A. P. Dempster, N. M. Laird, D. B. Rubin, Maximum Likelihood from Incomplete Data Via theEMAlgorithm Journal of the Royal Statistical Society: Series B (Methodological). ,vol. 39, pp. 1- 22 ,(1977) , 10.1111/J.2517-6161.1977.TB01600.X
John Canny, Collaborative filtering with privacy via factor analysis Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '02. pp. 238- 245 ,(2002) , 10.1145/564376.564419
Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms international cryptology conference. ,vol. 31, pp. 10- 18 ,(1985) , 10.1109/TIT.1985.1057074
Carl Kadie, David Heckerman, John S. Breese, Empirical analysis of predictive algorithms for collaborative filtering uncertainty in artificial intelligence. pp. 43- 52 ,(1998)
J. Canny, Collaborative filtering with privacy ieee symposium on security and privacy. pp. 45- 57 ,(2002) , 10.1109/SECPRI.2002.1004361
Torben Pryds Pedersen, A threshold cryptosystem without a trusted party theory and application of cryptographic techniques. pp. 522- 526 ,(1991) , 10.1007/3-540-46416-6_47
A. Dempster, Maximum likelihood estimation from incomplete data via the EM algorithm Journal of the Royal Statistical Society. ,vol. 39, pp. 1- 38 ,(1977)