iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSN.2017.22
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:13:05Z","timestamp":1725743585666},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/dsn.2017.22","type":"proceedings-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T16:38:08Z","timestamp":1504197488000},"page":"439-450","source":"Crossref","is-referenced-by-count":6,"title":["I Know Nothing about You But Here is What You Might Like"],"prefix":"10.1109","author":[{"given":"Rachid","family":"Guerraoui","sequence":"first","affiliation":[]},{"given":"Anne-Marie","family":"Kermarrec","sequence":"additional","affiliation":[]},{"given":"Rhicheek","family":"Patra","sequence":"additional","affiliation":[]},{"given":"Mahammad","family":"Valiyev","sequence":"additional","affiliation":[]},{"given":"Jingjing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"journal-title":"NDSS'10","article-title":"Adnostic: Privacy Preserving Targeted Advertising","year":"0","author":"toubiana","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"ref32","first-page":"319","article-title":"Better key sizes (and attacks) for lwe-based encryption","author":"lindner","year":"0","journal-title":"CT-RSA ‘09"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"journal-title":"Handbook of Information and Communication Security","article-title":"Key lengths","year":"2004","author":"lenstra","key":"ref37"},{"key":"ref36","first-page":"147","article-title":"Clustknn: a highly scalable hybrid model-& memory-based cf algorithm","author":"al","year":"0","journal-title":"WebKDD'06"},{"key":"ref35","first-page":"33","article-title":"Enhanced middleware for collaborative privacy in IPTV recommender services","author":"elmisery","year":"0","journal-title":"JoC’ 11"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-013-9864-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.124"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590304"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947695"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref16","first-page":"169","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"0","journal-title":"NSDI’ 11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0049-3"},{"key":"ref18","first-page":"1","article-title":"On the impossibility of cryptography alone for privacy-preserving cloud computing","author":"van dijk","year":"0","journal-title":"HotSec'10"},{"journal-title":"X-Rec Technical Report and Demo","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2501221.2501222"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020443909834"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"journal-title":"MovieLens dataset","year":"2003","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"ref5","first-page":"221","article-title":"A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU","author":"rohloff","year":"0","journal-title":"FC’ 14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"ref7","first-page":"2619","article-title":"A novel bayesian similarity measure for recommender systems","author":"guo","year":"0","journal-title":"IJCAI'13"},{"key":"ref2","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits","author":"sabottke","year":"0","journal-title":"Usenix Sec '15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"ref46","first-page":"862","article-title":"D 2 p: distance-based differential privacy in recommenders","author":"guerraoui","year":"0","journal-title":"VLDB ‘15"},{"key":"ref20","first-page":"76","article-title":"Amazon. com recommendations: Item-to-item collaborative filtering","author":"linden","year":"0","journal-title":"ICC 03"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"},{"journal-title":"FunkSVD","year":"0","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"ref24","first-page":"400","article-title":"Efficient privacy-enhanced familiarity-based recommender system","author":"jeckmans","year":"0","journal-title":"ESORICS'13"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"}],"event":{"name":"2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2017,6,26]]},"location":"Denver, CO, USA","end":{"date-parts":[[2017,6,29]]}},"container-title":["2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8019912\/8023090\/08023143.pdf?arnumber=8023143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T22:29:02Z","timestamp":1506983342000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8023143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/dsn.2017.22","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}