{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T14:56:05Z","timestamp":1778079365028,"version":"3.51.4"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001031","name":"ARC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001031","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072269"],"award-info":[{"award-number":["62072269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ARC DE180100950"],"award-info":[{"award-number":["ARC DE180100950"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["DP200101374"],"award-info":[{"award-number":["DP200101374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LP190100676"],"award-info":[{"award-number":["LP190100676"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["STPP2021A0505110008"],"award-info":[{"award-number":["STPP2021A0505110008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1911201"],"award-info":[{"award-number":["U1911201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.ins.2022.05.083","type":"journal-article","created":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T21:03:40Z","timestamp":1653685420000},"page":"688-701","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training"],"prefix":"10.1016","volume":"606","author":[{"given":"Yipeng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Juncai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jessie Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2022.05.083_b0005","series-title":"Fifteenth ACM Conference on Recommender Systems","first-page":"838","article-title":"Pursuing privacy in recommender systems: the view of users and researchers from regulations to applications","author":"Anelli","year":"2021"},{"key":"10.1016\/j.ins.2022.05.083_b0010","series-title":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","first-page":"1359","article-title":"How to put users in control of their data in federated top-n recommendation with learning to rank","author":"Anelli","year":"2021"},{"key":"10.1016\/j.ins.2022.05.083_b0015","doi-asserted-by":"crossref","unstructured":"Anelli, V.W., Deldjoo, Y., Noia, T.D., Ferrara, A., Narducci, F., 2021c. Federank: User controlled feedback with federated recommender systems. In: European Conference on Information Retrieval. Springer, pp. 32\u201347.","DOI":"10.1007\/978-3-030-72113-8_3"},{"key":"10.1016\/j.ins.2022.05.083_b0020","unstructured":"Belli, L., Ktena, S.I., Tejani, A., Lung-Yut-Fon, A., Portman, F., Zhu, X., Xie, Y., Gupta, A., Bronstein, M., Deli\u0107, A., et al., 2020. Privacy-aware recommender systems challenge on twitter\u2019s home timeline. arXiv preprint arXiv:2004.13715."},{"key":"10.1016\/j.ins.2022.05.083_b0025","series-title":"Proceedings of the 9th ACM Conference on Recommender Systems","first-page":"107","article-title":"Applying differential privacy to matrix factorization","author":"Berlioz","year":"2015"},{"key":"10.1016\/j.ins.2022.05.083_b0030","series-title":"Proceedings of the 12th ACM conference on recommender systems","first-page":"306","article-title":"User preferences in recommendation algorithms: the influence of user diversity, trust, and product category on privacy perceptions in recommender algorithms","author":"Burbach","year":"2018"},{"key":"10.1016\/j.ins.2022.05.083_b0035","article-title":"Secure federated matrix factorization","author":"Chai","year":"2020","journal-title":"IEEE Intelligent Systems"},{"key":"10.1016\/j.ins.2022.05.083_b0040","series-title":"Thirty-Second AAAI Conference on Artificial Intelligence","article-title":"Privacy preserving point-of-interest recommendation using decentralized matrix factorization","author":"Chen","year":"2018"},{"key":"10.1016\/j.ins.2022.05.083_b0045","unstructured":"Dareddy, M.R., Das, A., Cho, J., Zaniolo, C., 2018. How much are you willing to share? a poker-styled selective privacy preserving framework for recommender systems. arXiv preprint arXiv:1806.00914."},{"key":"10.1016\/j.ins.2022.05.083_b0050","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.ins.2017.05.004","article-title":"Encrypted data processing with homomorphic re-encryption","volume":"409","author":"Ding","year":"2017","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0055","series-title":"Proceedings of the 13th ACM Conference on Recommender Systems","first-page":"457","article-title":"Pdmfrec: a decentralised matrix factorisation with tunable user-centric privacy","author":"Duriakova","year":"2019"},{"issue":"3\u20134","key":"10.1016\/j.ins.2022.05.083_b0060","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"issue":"5","key":"10.1016\/j.ins.2022.05.083_b0065","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s11257-016-9177-7","article-title":"A differential privacy framework for matrix factorization recommender systems","volume":"26","author":"Friedman","year":"2016","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"10.1016\/j.ins.2022.05.083_b0070","unstructured":"Fung, C., Yoon, C.J., Beschastnikh, I., 2018. Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866."},{"key":"10.1016\/j.ins.2022.05.083_b0075","unstructured":"Gao, D., Tan, B., Ju, C., Zheng, V.W., Yang, Q., 2020. Privacy threats against federated matrix factorization. arXiv preprint arXiv:2007.01587."},{"key":"10.1016\/j.ins.2022.05.083_b0080","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.ins.2019.06.021","article-title":"Locally differentially private item-based collaborative filtering","volume":"502","author":"Guo","year":"2019","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0085","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2019.2949041","article-title":"Secure and utility-aware data collection with condensed local differential privacy","author":"Gursoy","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.1016\/j.ins.2022.05.083_b0090","series-title":"Proceedings of the 26th international conference on world wide web. International World Wide Web Conferences Steering Committee","first-page":"173","article-title":"Neural collaborative filtering","author":"He","year":"2017"},{"key":"10.1016\/j.ins.2022.05.083_b0095","series-title":"Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval","first-page":"549","article-title":"Fast matrix factorization for online recommendation with implicit feedback","author":"He","year":"2016"},{"key":"10.1016\/j.ins.2022.05.083_b0100","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM","first-page":"603","article-title":"Deep models under the gan: information leakage from collaborative deep learning","author":"Hitaj","year":"2017"},{"key":"10.1016\/j.ins.2022.05.083_b0105","series-title":"28th USENIX Security Symposium (USENIX Security 19)","article-title":"Evaluating differentially private machine learning in practice","author":"Jayaraman","year":"2019"},{"key":"10.1016\/j.ins.2022.05.083_b0110","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ins.2018.12.085","article-title":"Towards a more reliable privacy-preserving recommender system","volume":"482","author":"Jiang","year":"2019","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0115","series-title":"2020 International Symposium on Reliable Distributed Systems (SRDS)","first-page":"185","article-title":"On the detection of shilling attacks in federated collaborative filtering","author":"Jiang","year":"2020"},{"key":"10.1016\/j.ins.2022.05.083_b0120","unstructured":"Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawitz, K., Charles, Z., Cormode, G., Cummings, R., et al., 2019. Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977."},{"key":"10.1016\/j.ins.2022.05.083_b0125","series-title":"Proceedings of the Eleventh ACM Conference on Recommender Systems","first-page":"394","article-title":"Privacy for recommender systems: tutorial abstract","author":"Knijnenburg","year":"2017"},{"key":"10.1016\/j.ins.2022.05.083_b0130","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.future.2014.11.003","article-title":"An algorithm for efficient privacy-preserving item-based collaborative filtering","volume":"55","author":"Li","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.ins.2022.05.083_b0135","series-title":"International Conference on Machine Learning for Cyber Security","first-page":"355","article-title":"Recommender systems with condensed local differential privacy","author":"Liu","year":"2020"},{"issue":"2","key":"10.1016\/j.ins.2022.05.083_b0140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3436755","article-title":"When machine learning meets privacy: A survey and outlook","volume":"54","author":"Liu","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.1016\/j.ins.2022.05.083_b0145","series-title":"Robust de-anonymization of large datasets (how to break anonymity of the netflix prize dataset)","author":"Narayanan","year":"2008"},{"key":"10.1016\/j.ins.2022.05.083_b0150","unstructured":"Nasr, M., Shokri, R., Houmansadr, A., 2018. Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv preprint arXiv:1812.00910."},{"key":"10.1016\/j.ins.2022.05.083_b0155","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.ins.2014.05.003","article-title":"When to recommend: A new issue on tv show recommendation","volume":"280","author":"Oh","year":"2014","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0160","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2022.01.050","article-title":"A differentially private nonnegative matrix factorization for recommender system","volume":"592","author":"Ran","year":"2022","journal-title":"Information Sciences"},{"issue":"3","key":"10.1016\/j.ins.2022.05.083_b0165","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1257\/jep.26.3.87","article-title":"The economics of spam","volume":"26","author":"Rao","year":"2012","journal-title":"Journal of Economic Perspectives"},{"key":"10.1016\/j.ins.2022.05.083_b0170","series-title":"Proceedings of the 13th ACM Conference on Recommender Systems","first-page":"87","article-title":"Privatejobmatch: a privacy-oriented deferred multi-match recommender system for stable employment","author":"Saini","year":"2019"},{"key":"10.1016\/j.ins.2022.05.083_b0175","series-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","first-page":"180","article-title":"Epicrec: Towards practical differentially private framework for personalized recommendation","author":"Shen","year":"2016"},{"issue":"9","key":"10.1016\/j.ins.2022.05.083_b0180","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.1109\/TKDE.2018.2805356","article-title":"Privacy enhanced matrix factorization for recommendation with local differential privacy","volume":"30","author":"Shin","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.ins.2022.05.083_b0185","series-title":"Proceedings of the eleventh ACM conference on recommender systems","first-page":"89","article-title":"Secure multi-party protocols for item-based collaborative filtering","author":"Shmueli","year":"2017"},{"issue":"5","key":"10.1016\/j.ins.2022.05.083_b0190","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TDSC.2016.2631533","article-title":"Privacy-preserving friendship-based recommender systems","volume":"15","author":"Tang","year":"2016","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.1016\/j.ins.2022.05.083_b0195","series-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"1617","article-title":"Data poisoning attacks against differentially private recommender systems","author":"Wadhwa","year":"2020"},{"key":"10.1016\/j.ins.2022.05.083_b0200","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2022.04.027","article-title":"Federated against the cold: A trust-based federated learning approach to counter the cold start problem in recommendation systems","author":"Wahab","year":"2022","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0205","series-title":"Proceedings of the 13th ACM Conference on Recommender Systems","first-page":"78","article-title":"Efficient privacy-preserving recommendations based on social graphs","author":"Wainakh","year":"2019"},{"key":"10.1016\/j.ins.2022.05.083_b0210","article-title":"A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent","author":"Wang","year":"2020","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0215","series-title":"Fourteenth ACM Conference on Recommender Systems","first-page":"150","article-title":"Global and local differential privacy for collaborative bandits","author":"Wang","year":"2020"},{"key":"10.1016\/j.ins.2022.05.083_b0220","doi-asserted-by":"crossref","unstructured":"Wang, J., Tang, Q., Arriaga, A., Ryan, P.Y., 2019. Novel collaborative filtering recommender friendly to privacy protection. In: IJCAI. pp. 4809\u20134815.","DOI":"10.24963\/ijcai.2019\/668"},{"key":"10.1016\/j.ins.2022.05.083_b0225","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: Algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.ins.2022.05.083_b0230","series-title":"Proceedings of the 29th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video. ACM","first-page":"43","article-title":"Tamf: towards personalized time-aware recommendation for over-the-top videos","author":"Wu","year":"2019"},{"key":"10.1016\/j.ins.2022.05.083_b0235","unstructured":"Xin, Y., Jaakkola, T., 2014. Controlling privacy in recommender systems. In: Advances in neural information processing systems. pp. 2618\u20132626."},{"key":"10.1016\/j.ins.2022.05.083_b0240","series-title":"Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video","first-page":"37","article-title":"Context-aware video recommendation by mining users\u2019 view preferences based on access points","author":"Zhang","year":"2017"},{"key":"10.1016\/j.ins.2022.05.083_b0245","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.05.034","article-title":"Context neighbor recommender: Integrating contexts via neighbors for recommendations","volume":"414","author":"Zheng","year":"2017","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2022.05.083_b0250","doi-asserted-by":"crossref","unstructured":"Zhou, H., Liu, X.-Y., Fu, C., Shang, C., Chang, X., 2018. Differentially private matrix completion via distributed matrix factorization. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, pp. 1628\u20131631.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00239"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522005217?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522005217?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T05:48:07Z","timestamp":1758088087000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025522005217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":50,"alternative-id":["S0020025522005217"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2022.05.083","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2022.05.083","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}