International audienceRecommenders have become a fundamental tool to navigate the huge amount of information available on the web. However, their ubiquitous presence comes with the risk of exposing sensitive user information. This paper explores this problem in the context of user-based collaborative filtering. We consider an active attacker equipped with externally available knowledge about the interests of users. The attacker creates fake identities based on this external knowledge and exploits the recommendations it receives to identify the items appreciated by a user. Our experiment on a real data trace shows that while the attack is effective, the inherent similarity between real users may be enough to protect at least part of their in...
Recently, recommender systems have achieved promising performances and become one of the most widely...
Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
International audienceRecommenders have become a fundamental tool to navigate the huge amount of inf...
International audienceRecommendation systems help users identify interesting content, but they also ...
Abstract. While recommender systems based on collaborative filtering have be-come an essential tool ...
Privacy risks of collaborative filtering (CF) have been widely studied. The current state-of-theart ...
Recommendation systems try to infer their users’ interests in order to suggest items relevant to the...
Abstract Despite its success, similarity-based collaborative filtering suffers from some limitations...
Collaborative Filtering (CF) is a powerful technique for generating personalized predictions. CF sys...
Collaborative Filtering (CF) is a powerful technique for generating personalized predictions. CF sys...
Current implementations of the Collaborative Filtering (CF) algorithm are mostly centralized and the...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Abstract. We discuss the issue of privacy protection in collaborative filtering, focusing on the com...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recently, recommender systems have achieved promising performances and become one of the most widely...
Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically...
Recommender systems play an essential role in our digital society as they suggest products to purcha...
International audienceRecommenders have become a fundamental tool to navigate the huge amount of inf...
International audienceRecommendation systems help users identify interesting content, but they also ...
Abstract. While recommender systems based on collaborative filtering have be-come an essential tool ...
Privacy risks of collaborative filtering (CF) have been widely studied. The current state-of-theart ...
Recommendation systems try to infer their users’ interests in order to suggest items relevant to the...
Abstract Despite its success, similarity-based collaborative filtering suffers from some limitations...
Collaborative Filtering (CF) is a powerful technique for generating personalized predictions. CF sys...
Collaborative Filtering (CF) is a powerful technique for generating personalized predictions. CF sys...
Current implementations of the Collaborative Filtering (CF) algorithm are mostly centralized and the...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Abstract. We discuss the issue of privacy protection in collaborative filtering, focusing on the com...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
Recently, recommender systems have achieved promising performances and become one of the most widely...
Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically...
Recommender systems play an essential role in our digital society as they suggest products to purcha...