首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Privacy-preserving collaborative filtering is an emerging web-adaptation tool to cope with information overload problem without jeopardizing individuals’ privacy. However, collaborative filtering with privacy schemes commonly suffer from scalability and sparseness as the content in the domain proliferates. Moreover, applying privacy measures causes a distortion in collected data, which in turn defects accuracy of such systems. In this work, we propose a novel privacy-preserving collaborative filtering scheme based on bisecting k-means clustering in which we apply two preprocessing methods. The first preprocessing scheme deals with scalability problem by constructing a binary decision tree through a bisecting k-means clustering approach while the second produces clones of users by inserting pseudo-self-predictions into original user profiles to boost accuracy of scalability-enhanced structure. Sparse nature of collections are handled by transforming ratings into item features-based profiles. After analyzing our scheme with respect to privacy and supplementary costs, we perform experiments on benchmark data sets to evaluate it in terms of accuracy and online performance. Our empirical outcomes verify that combined effects of the proposed preprocessing schemes relieve scalability and augment accuracy significantly.  相似文献   

2.
This paper proposes a privacy-preserving consensus algorithm which enables all the agents in the directed network to eventually reach the weighted average of initial states, and while preserving the privacy of the initial state of each agent. A novel privacy-preserving scheme is proposed in our consensus algorithm where initial states are hidden in random values. We also develop detailed analysis based on our algorithm, including its convergence property and the topology condition of privacy leakages for each agent. It can be observed that final consensus point is independent of their initial values that can be arbitrary random values. Besides, when an eavesdropper exists and can intercept the data transmitted on the edges, we introduce an index to measure the privacy leakage degree of agents, and then analyze the degree of privacy leakage for each agent. Similarly, the degree for network privacy leakage is derived. Subsequently, we establish an optimization problem to find the optimal attacking strategy, and present a heuristic optimization algorithm based on the Sequential Least Squares Programming (SLSQP) to solve the proposed optimization problem. Finally, numerical experiments are designed to demonstrate the effectiveness of our algorithm.  相似文献   

3.
Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.  相似文献   

4.
This paper proposes collaborative filtering as a means to predict semantic preferences by combining information on social ties with information on links between actors and semantics. First, the authors present an overview of the most relevant collaborative filtering approaches, showing how they work and how they differ. They then compare three different collaborative filtering algorithms using articles published by New York Times journalists from 2003 to 2005 to predict preferences, where preferences refer to journalists’ inclination to use certain words in their writing. Results show that while preference profile similarities in an actor’s neighbourhood are a good predictor of her semantic preferences, information on her social network adds little to prediction accuracy.  相似文献   

5.
[目的/意义]将情境感知技术引入图书馆以提高服务的智能化,已成为数字图书馆的发展趋势之一。为了提高情境感知模型中推荐结果的准确度。[方法/过程]本文研究并提出了一种融合了朴素贝叶斯算法与情景感知功能的协同推荐模型,并通过实验对推荐效果进行了评估。具体为:首先,获取用户的当前任务和情景信息,同时提取历史信息库用户的行为偏好;其次基于属性加权贝叶斯算法计算用户的行为相似度,继而进行协同推荐;通过计算目标情景中所有情景属性对所推荐资源的影响的权值,对协同推荐所得评分进行加权处理,形成最终的预测预测;最后通过实验对模型进行检验。[结果/结论]结果表明:使用该模型得出的推荐结果优于传统的协同推荐结果。因此该模型能够更好地为为个性化信息服务提供支持。  相似文献   

6.
曾子明  李鑫 《情报杂志》2012,31(8):166-170
随着移动互联网的发展,越来越多的用户信息获取过程通过移动终端完成.但当前个性化推荐系统对用户情境的感知能力不足,缺乏为用户提供符合当前情境的个性化信息推荐服务.为此,本文提出了基于贝叶斯方法的情境化用户资源类别偏好学习以及融合该类别偏好的协同过滤个性化信息推荐.运用贝叶斯方法学习用户在不同情境下对各资源类别的偏好,然后将该类别偏好与传统协同过滤推荐算法相结合,生成符合用户当前情境的个性化信息推荐.实验表明本文提出的改进算法可以提高推荐的准确率.  相似文献   

7.
In recent years, regional traffic congestion has become increasingly frequent, which seriously affects the safety and efficiency of urban vehicles. Therefore, traffic flow prediction methods based on artificial intelligence are widely used in traffic management. However, the existing traffic flow prediction methods need to collect raw data, which involves risks of vehicle privacy leakage. Federated learning, which shares model updates without exchanging local data, has gradually become an effective solution to achieve privacy protection. A federated learning traffic flow prediction model for regional transportation systems is proposed in this paper. At the same time, due to the emergence of highly intelligent automatic driving vehicles, a vehicle scheduling system, which can control the departure and routes of vehicles in urban regions is developed in the proposed approach. A road weight measurement method combined with real time traffic information is introduced to optimize the driving routes of vehicles to reduce the average travel time. Additionally, departure strategy, is another factor that has a great influence on traffic efficiency, but is usually ignored in the past, and is also carefully compared and studied in this paper. The numerical results illustrate that the proposed schemes can effectively improve the privacy protection ability of model updates, reduce the scheduling completion time by using the traffic flow prediction model, and realize the comparative research between departure strategies, which provides a reference for developing a safe and efficient regional transportation system.  相似文献   

8.
This paper deals with the privacy-preserving average consensus problem for continuous-time multi-agent network systems (MANSs) based on the event-triggered strategy. A novel event-triggered privacy-preserving consensus algorithm is designed to achieve the average consensus of MANSs while avoiding the disclosure of the agents’ initial states. Different from the approaches incorporating stochastic noises, an output mask function in the proposed algorithm is developed to make initial state of each agent indiscernible by the others. Particularly, under the output mask function, all agents can exactly tend to the average value of initial states rather than the mean square value. Under the proposed algorithm, detailed theoretical proof about average consensus and privacy of the MANSs are conducted. Moreover, the proposed algorithm is extended to nonlinear continuous-time MANSs, and the corresponding results are also derived. A numerical simulation eventually is performed to demonstrate the validity of our results.  相似文献   

9.
The rapid development of the web has led to a considerable increase in information dissemination. Recently, personalized web service recommendation has become a popular research area in service computing. Research on web service recommendation systems mainly addresses two problems: prediction and completion of sparse QoS data, and the user's personalized recommendation. To address the issue of high data sparsity and low recommendation accuracy in the traditional service recommendation models under mobile cloud, this study presents a hybrid collaborative filtering model for consumer service recommendation based on mobile cloud by introducing user preferences. The example verified that the service recommendation based on the model can effectively reduce the data sparsity and increase the accuracy of the prediction.  相似文献   

10.
杨峰 《情报探索》2014,(10):79-81
采用信息协同过滤技术构建一个面向公众的电子政务信息推荐服务系统框架。通过信息用户评价矩阵寻找相似度较高的邻居集,能够较好地把握用户的需求偏好,主动提供适合用户的信息组合。但需要解决稀疏性、冷启动、扩展瓶颈问题,以及处理好用户参与、个人隐私和系统优化问题。  相似文献   

11.
This paper presents a privacy-preserving average consensus algorithm for a discrete-time network with heterogeneous dynamic nodes in the presence of Gaussian privacy noises. Rényi divergence is used to measure the privacy, and a distributed algorithm is proposed for each node in the network to protect the initial output state and ensure consensus almost surely. The convergence rate of the proposed algorithm relates to the communication topology, dynamics of systems, and decaying rates of privacy noises. Moreover, by increasing neighbors of nodes in the network, the proposed algorithm can strengthen preservation. To demonstrate the theoretical results, a numerical example is carried out on a network of one hundred nodes.  相似文献   

12.
In collaborative filtering recommender systems recommendations can be made to groups of users. There are four basic stages in the collaborative filtering algorithms where the group’s users’ data can be aggregated to the data of the group of users: similarity metric, establishing the neighborhood, prediction phase, determination of recommended items. In this paper we perform aggregation experiments in each of the four stages and two fundamental conclusions are reached: (1) the system accuracy does not vary significantly according to the stage where the aggregation is performed, (2) the system performance improves notably when the aggregation is performed in an earlier stage of the collaborative filtering process. This paper provides a group recommendation similarity metric and demonstrates the convenience of tackling the aggregation of the group’s users in the actual similarity metric of the collaborative filtering process.  相似文献   

13.
In-memory nearest neighbor computation is a typical collaborative filtering approach for high recommendation accuracy. However, this approach is not scalable given the huge number of customers and items in typical commercial applications. Cluster-based collaborative filtering techniques can be a remedy for the efficiency problem, but they usually provide relatively lower accuracy figures, since they may become over-generalized and produce less-personalized recommendations. Our research explores an individualistic strategy which initially clusters the users and then exploits the members within clusters, but not just the cluster representatives, during the recommendation generation stage. We provide an efficient implementation of this strategy by adapting a specifically tailored cluster-skipping inverted index structure. Experimental results reveal that the individualistic strategy with the cluster-skipping index is a good compromise that yields high accuracy and reasonable scalability figures.  相似文献   

14.
This paper presents explicit and implicit discrete-time realizations for the robust exact filtering differentiator, aiming to facilitate an adequate posterior implementation structure in digital devices. This paper firstly presents an analysis of an explicit discrete-time realization of the filtering differentiator based on linear systems’ exact discretization with a zero-order holder. For this case, however, high-order terms in the filter dynamics may cause instability of the estimation error for signals with unbounded derivatives. Hence, two other new discrete-time realizations of the filtering differentiator are derived by removing some high-order terms in the filter dynamics. The first one is an explicit discrete-time realization, while the second one is implicit. After a finite time, both preserve the accuracy of the continuous-time robust exact filtering differentiator in the presence of measurement noise. For each proposed discrete-time scheme, a stability analysis based on homogeneity is provided. Finally, the simulation results include comparisons between the proposed implicit and explicit discrete-time realizations with other existing schemes. These numerical studies highlight that the implicit scheme supersedes the explicit one, consistent with the implicit and explicit realizations of other continuous-time algorithms.  相似文献   

15.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability.  相似文献   

16.
We propose a novel form of nonlinear stochastic filtering based on an iterative evaluation of a Kalman-like gain matrix computed within a Monte Carlo scheme as suggested by the form of the parent equation of nonlinear filtering (Kushner–Stratonovich equation) and retains the simplicity of implementation of an ensemble Kalman filter (EnKF). The numerical results, presently obtained via EnKF-like simulations with or without a reduced-rank unscented transformation, clearly indicate remarkably superior filter convergence and accuracy vis-à-vis most available filtering schemes and eminent applicability of the methods to higher dimensional dynamic system identification problems of engineering interest.  相似文献   

17.
针对LTE无线通信系统上行链路,提出一种联合HII和OI的干扰协调方法.与以往提高整个网络吞吐量或小区边缘用户速率为目标的传统干扰协调方法不同,该方法从满足用户的实际通信质量要求出发,以提高用户满意度为目标,并首次联合使用了LTE R8标准定义的2个信息(高干扰指示HII和过载指示OI)进行频域协调和功率调整.仿真结果表明,该方法相比传统的干扰协调方法能明显提升用户满意度,具有较高的实用价值.  相似文献   

18.
Privacy has raised considerable concerns recently, especially with the advent of information explosion and numerous data mining techniques to explore the information inside large volumes of data. These data are often collected and stored across different institutions (banks, hospitals, etc.), or termed cross-silo. In this context, cross-silo federated learning has become prominent to tackle the privacy issues, where only model updates will be transmitted from institutions to servers without revealing institutions’ private information. In this paper, we propose a cross-silo federated XGBoost approach to solve the federated anomaly detection problem, which aims to identify abnormalities from extremely unbalanced datasets (e.g., credit card fraud detection) and can be considered a special classification problem. We design two privacy-preserving mechanisms that are tailored to the federated XGBoost: anonymity based data aggregation and local differential privacy. In the anonymity based data aggregation scenario, we cluster data into different groups and using a cluster-level data feature to train the model. In the local differential privacy scenario, we design a federated XGBoost framework by incorporate differential privacy in parameter transmission. Our experimental results over two datasets show the effectiveness of our proposed schemes compared with existing methods.  相似文献   

19.
Previous federated recommender systems are based on traditional matrix factorization, which can improve personalized service but are vulnerable to gradient inference attacks. Most of them adopt model averaging to fit the data heterogeneity of federated recommender systems, requiring more training costs. To address privacy and efficiency, we propose an efficient federated item similarity model for the heterogeneous recommendation, called FedIS, which can train a global item-based collaborative filtering model to eliminate user feature dependencies. Specifically, we extend the neural item similarity model to the federated model, where each client only locally optimizes the shared item feature matrix. We then propose a fast-convergent federated aggregation method inspired by meta-learning to address heterogeneous user updates and accelerate the convergence of global training. Furthermore, we propose a two-stage perturbation method to protect both local training and transmission while reducing communication costs. Finally, extensive experiments on four real-world datasets validate that FedIS can provide more competitive performance on federated recommendations. Our proposed method also shows significant training efficiency with less performance degradation.  相似文献   

20.
Modeling user profiles is a necessary step for most information filtering systems – such as recommender systems – to provide personalized recommendations. However, most of them work with users or items as vectors, by applying different types of mathematical operations between them and neglecting sequential or content-based information. Hence, in this paper we study how to propose an adaptive mechanism to obtain user sequences using different sources of information, allowing the generation of hybrid recommendations as a seamless, transparent technique from the system viewpoint. As a proof of concept, we develop the Longest Common Subsequence (LCS) algorithm as a similarity metric to compare the user sequences, where, in the process of adapting this algorithm to recommendation, we include different parameters to control the efficiency by reducing the information used in the algorithm (preference filter), to decide when a neighbor is considered useful enough to be included in the process (confidence filter), to identify whether two interactions are equivalent (δ-matching threshold), and to normalize the length of the LCS in a bounded interval (normalization functions). These parameters can be extended to work with any type of sequential algorithm.We evaluate our approach with several state-of-the-art recommendation algorithms using different evaluation metrics measuring the accuracy, diversity, and novelty of the recommendations, and analyze the impact of the proposed parameters. We have found that our approach offers a competitive performance, outperforming content, collaborative, and hybrid baselines, and producing positive results when either content- or rating-based information is exploited.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号