{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:46:06Z","timestamp":1767771966089,"version":"3.44.0"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["30918012204","30918014108"],"award-info":[{"award-number":["30918012204","30918014108"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M651835"],"award-info":[{"award-number":["2019M651835"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People's Republic of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF001"],"award-info":[{"award-number":["ZR2019MF001"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011246","name":"State Key Laboratory of Novel Software Technology","doi-asserted-by":"publisher","award":["2020YFB1804604","KFKT2020B08"],"award-info":[{"award-number":["2020YFB1804604","KFKT2020B08"]}],"id":[{"id":"10.13039\/501100011246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1804600"],"award-info":[{"award-number":["2020YFB1804600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702264","61761136003","61872219"],"award-info":[{"award-number":["61702264","61761136003","61872219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1016\/j.cose.2020.101950","type":"journal-article","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T20:59:13Z","timestamp":1593032353000},"page":"101950","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["Security-Driven hybrid collaborative recommendation method for cloud-based iot services"],"prefix":"10.1016","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6173-9787","authenticated-orcid":false,"given":"Shunmei","family":"Meng","sequence":"first","affiliation":[]},{"given":"Zijian","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":false,"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-9856","authenticated-orcid":false,"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/j.cose.2020.101950_bib0031","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1109\/TKDE.2016.2566622","article-title":"Improving collaborative recommendation via user-item subgroups","volume":"28","author":"Bu","year":"2016","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.cose.2020.101950_bib0018","article-title":"Energy efficient dynamic offloading in mobile edge computing for Internet of Things","author":"Chen","year":"2019","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"10.1016\/j.cose.2020.101950_bib0020","article-title":"Amplified LSH-based recommender systems with privacy protection","author":"Chi","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.1016\/j.cose.2020.101950_bib0028","series-title":"The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval","first-page":"515","article-title":"Collaborative memory network for recommendation systems","author":"Ebesu","year":"2018"},{"issue":"3","key":"10.1016\/j.cose.2020.101950_bib0017","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/TCYB.2018.2795041","article-title":"A novel deep learning-based collaborative filtering model for recommendation system","volume":"49","author":"Fu","year":"2018","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.cose.2020.101950_bib0002","doi-asserted-by":"crossref","DOI":"10.1109\/TBDATA.2017.2705807","article-title":"Privacy-preserving data encryption strategy for big data in mobile cloud computing","author":"Gai","year":"2017","journal-title":"IEEE Transactions on Big Data"},{"issue":"4","key":"10.1016\/j.cose.2020.101950_bib0008","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1109\/JIOT.2018.2830340","article-title":"Privacy-preserving content-oriented wireless communication in internet-of-things","volume":"5","author":"Gai","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.cose.2020.101950_bib0037","series-title":"Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval","first-page":"549","article-title":"Fast matrix factorization for online recommendation with implicit feedback","author":"He","year":"2016"},{"key":"10.1016\/j.cose.2020.101950_bib0025","series-title":"Proceedings of the 26th international conference on world wide web.","first-page":"173","article-title":"Neural collaborative filtering","author":"He","year":"2017"},{"issue":"8","key":"10.1016\/j.cose.2020.101950_bib0013","article-title":"Matrix factorization techniques for recommender systems","volume":"42","author":"Koren","year":"2009","journal-title":"Computer (Long Beach Calif)"},{"key":"10.1016\/j.cose.2020.101950_bib0041","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1016\/j.neucom.2016.09.059","article-title":"Efficient privacy-preserving content recommendation for online social communities","volume":"219","author":"Li","year":"2017","journal-title":"Neurocomputing"},{"key":"10.1016\/j.cose.2020.101950_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2020.101522","article-title":"Community-diversified influence maximization in social networks","volume":"92","author":"Li","year":"2020","journal-title":"Inf Syst"},{"issue":"6","key":"10.1016\/j.cose.2020.101950_bib0035","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1109\/TKDE.2018.2789445","article-title":"Scalable content-aware collaborative filtering for location recommendation","volume":"30","author":"Lian","year":"2018","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0048","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","article-title":"Amazon.com Recommendations: item-to-item collaborative filtering","author":"Linden","year":"2003","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1561-7","article-title":"Link prediction in paper citation network to construct paper correlation graph","volume":"2019","author":"Liu","year":"2019","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"10.1016\/j.cose.2020.101950_bib0014","article-title":"Secfact: secure large-scale QR and LU factorizations","author":"Luo","year":"2017","journal-title":"IEEE Transactions on Big Data"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0027","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TNSE.2018.2848960","article-title":"Channel state information prediction for 5\u00a0G wireless communications: a deep learning approach","volume":"7","author":"Luo","year":"2018","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"10.1016\/j.cose.2020.101950_bib0023","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.physa.2016.01.051","article-title":"Performance evaluation of recommendation algorithms on Internet of Things services","volume":"451","author":"Mashal","year":"2016","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"12","key":"10.1016\/j.cose.2020.101950_bib0032","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1109\/TPDS.2013.2297117","article-title":"KASR: a keyword-aware service recommendation method on mapreduce for big data applications","volume":"25","author":"Meng","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.1016\/j.cose.2020.101950_bib0040","series-title":"Thirty-Second AAAI Conference on Artificial Intelligence","article-title":"Personalized privacy-preserving social recommendation","author":"Meng","year":"2018"},{"key":"10.1016\/j.cose.2020.101950_bib0005","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.future.2019.02.016","article-title":"Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems","volume":"96","author":"Meng","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.1016\/j.cose.2020.101950_bib0038","doi-asserted-by":"crossref","first-page":"e5447","DOI":"10.1002\/cpe.5447","article-title":"Temporal-aware and sparsity-tolerant hybrid collaborative recommendation method with privacy preservation","volume":"32","author":"Meng","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.1016\/j.cose.2020.101950_bib0036","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ins.2015.10.044","article-title":"Mixed factorization for collaborative recommendation with heterogeneous explicit feedbacks","volume":"332","author":"Pan","year":"2016","journal-title":"Inf Sci (Ny)"},{"key":"10.1016\/j.cose.2020.101950_bib0016","series-title":"Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP)","first-page":"1532","article-title":"Glove: global vectors for word representation","author":"Pennington","year":"2014"},{"key":"10.1016\/j.cose.2020.101950_bib0011","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.trc.2017.01.008","article-title":"Evaluation of spatial heterogeneity in the sensitivity of on-street parking occupancy to price change","volume":"77","author":"Pu","year":"2017","journal-title":"Transportation Research Part C: Emerging Technologies"},{"key":"10.1016\/j.cose.2020.101950_bib0019","article-title":"Full Bayesian Before-After Analysis of Safety Effects of Variable Speed Limit System","author":"Pu","year":"2020","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"10.1016\/j.cose.2020.101950_bib0029","doi-asserted-by":"crossref","DOI":"10.1061\/JTEPBS.0000410","article-title":"Evaluating the Non-Linear Correlation between Vertical Curve Features and Crash Frequency on Highways using Random Forests","author":"Pu","year":"2020","journal-title":"Journal of Transportation Engineering Part A: System"},{"key":"10.1016\/j.cose.2020.101950_bib0033","article-title":"A context-aware service evaluation approach over big data for cloud applications","author":"Qi","year":"2015","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"10.1016\/j.cose.2020.101950_bib0010","doi-asserted-by":"crossref","first-page":"46926","DOI":"10.1109\/ACCESS.2018.2866641","article-title":"Dynamic mobile crowdsourcing selection for electricity load forecasting","volume":"6","author":"Qi","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2020.101950_bib0044","article-title":"Privacy-Aware Cross-Platform Service Recommendation based on Enhanced Locality-Sensitive Hashing","author":"Qi","year":"2020","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"10.1016\/j.cose.2020.101950_bib0045","article-title":"Data-Driven Web APIs Recommendation for Building Web Applications","author":"Qi","year":"2020","journal-title":"IEEE Transactions on Big Data"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0006","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.diin.2013.02.003","article-title":"Dropbox analysis: data remnants on user machines","volume":"10","author":"Quick","year":"2013","journal-title":"Digital Investigation"},{"year":"2011","series-title":"Mining of Massive Datasets","author":"Rajaraman","key":"10.1016\/j.cose.2020.101950_bib0047"},{"key":"10.1016\/j.cose.2020.101950_bib0022","series-title":"IEEE 3rd World Forum on Internet of Things (WF-IoT)","first-page":"359","article-title":"Exploitation of social IoT for recommendation services","volume":"2016","author":"Saleem","year":"2016"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0046","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TKDE.2016.2610420","article-title":"Fully scalable methods for distributed tensor factorization","volume":"29","author":"Shin","year":"2016","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"9","key":"10.1016\/j.cose.2020.101950_bib0042","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.1109\/TKDE.2018.2805356","article-title":"Privacy enhanced matrix factorization for recommendation with local differential privacy","volume":"30","author":"Shin","year":"2018","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.cose.2020.101950_bib0043","article-title":"Privacy-preserving task recommendation services for crowdsourcing","author":"Shu","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"issue":"6","key":"10.1016\/j.cose.2020.101950_bib0024","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1007\/s11227-018-2331-8","article-title":"An ontology-driven personalized food recommendation in IoT-based healthcare system","volume":"75","author":"Subramaniyaswamy","year":"2019","journal-title":"J Supercomput"},{"issue":"1","key":"10.1016\/j.cose.2020.101950_bib0039","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MNET.2018.1800192","article-title":"A tensor-based big-data-driven routing recommendation approach for heterogeneous networks","volume":"33","author":"Wang","year":"2019","journal-title":"IEEE Netw"},{"key":"10.1016\/j.cose.2020.101950_bib0026","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.eswa.2016.09.040","article-title":"Collaborative filtering and deep learning based recommendation system for cold start items","volume":"69","author":"Wei","year":"2017","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.cose.2020.101950_bib0001","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2019.2896965","article-title":"BeCome: blockchain-enabled computation offloading for IoT in mobile edge computing","author":"Xu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.cose.2020.101950_bib0003","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.future.2018.12.055","article-title":"A computation offloading method over big data for IoT-enabled cloud-edge computing","volume":"95","author":"Xu","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.cose.2020.101950_bib0009","article-title":"Joint optimization of offloading utility and privacy for edge computing enabled IoT","author":"Xu","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"10.1016\/j.cose.2020.101950_bib0034","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/TMM.2016.2537216","article-title":"Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks","volume":"18","author":"Zhou","year":"2016","journal-title":"IEEE Trans Multimedia"},{"key":"10.1016\/j.cose.2020.101950_bib0004","article-title":"Deep Learning Enhanced Human Activity Recognition for Internet of Healthcare Things","author":"Zhou","year":"2018","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"10.1016\/j.cose.2020.101950_bib0015","article-title":"Academic influence aware and multidimensional network analysis for research collaboration navigation based on scholarly big data","author":"Zhou","year":"2018","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"5","key":"10.1016\/j.cose.2020.101950_bib0021","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1109\/TCSS.2019.2932288","article-title":"Social Recommendation With Large-Scale Group Decision-Making for Cyber-Enabled Online Service","volume":"6","author":"Zhou","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"5","key":"10.1016\/j.cose.2020.101950_bib0030","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/TCSS.2019.2918285","article-title":"Multi-modality behavioral influence analysis for personalized recommendations in health social media environment","volume":"6","author":"Zhou","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.cose.2020.101950_bib0049","series-title":"IEEE International Conference on Web Services (ICWS)","first-page":"241","article-title":"A Privacy-preserving QoS Prediction Framework for Web Service Recommendation","volume":"2015","author":"Zhu","year":"2015"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404820302261?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404820302261?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T19:07:24Z","timestamp":1759086444000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404820302261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":49,"alternative-id":["S0167404820302261"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2020.101950","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security-Driven hybrid collaborative recommendation method for cloud-based iot services","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2020.101950","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101950"}}