1 |
陈检. 基于神经网络与因子分解机的点击率预估应用研究[J]. 信息技术与信息化, 2018(8): 204-207. 10.3969/j.issn.1672-9528.2018.08.063
|
|
CHEN J. Application research of click rate estimation based on neural network and factor decomposition machine[J]. Information Technology and Informatization, 2018(8): 204-207. 10.3969/j.issn.1672-9528.2018.08.063
|
2 |
WANG Y, BI X, QU A. A logistic factorization model for recommender systems with multinomial responses[J]. Journal of Computational and Graphical Statistics, 2020, 29(2): 396-404. 10.1080/10618600.2019.1665535
|
3 |
孙晓寒,张莉. 基于评分区域子空间的协同过滤推荐算法[J]. 计算机科学, 2022, 49(7): 50-56. 10.11896/jsjkx.210600062
|
|
SUN X H, ZHANG L. Collaborative filtering recommendation algorithm based on rating region subspace[J]. Computer Science, 2022, 49(7): 50-56. 10.11896/jsjkx.210600062
|
4 |
田震,潘腊梅,尹朴,等. 深度矩阵分解推荐算法[J]. 软件学报, 2021, 32(12): 3917-3928.
|
|
TIAN Z, PAN L M, YIN P, et al. Deep matrix factorization recommendation algorithm[J]. Journal of Software, 2021, 32(12):3917-3928.
|
5 |
ZHANG H, ZHONG H, BAI W, et al. Cross-platform rating prediction method based on review topic[J]. Future Generation Computer Systems, 2019, 101: 236-245. 10.1016/j.future.2019.06.021
|
6 |
SHAO Y, WANG C. HIBoosting: a recommender system based on a gradient boosting machine[J]. IEEE Access, 2019, 7: 171013-171022. 10.1109/access.2019.2956342
|
7 |
XU J, HE X, LI H. Deep learning for matching in search and recommendation[J]. Foundations and Trends® in Information Retrieval, 2020, 14(2/3): 102-288. 10.1561/1500000076
|
8 |
WILSON C M, FRIDLEY B L, CONEJO-GARCIA J R, et al. Wide and deep learning for automatic cell type identification[J]. Computational and Structural Biotechnology Journal, 2021, 19: 1052-1062. 10.1016/j.csbj.2021.01.027
|
9 |
GUO H, TANG R, YE Y, et al. DeepFM: a factorization-machine based neural network for CTR prediction[C]// Proceedings of the 26th International Joint Conference on Artificial Intelligence. California: ijcai.org, 2017: 1725-1731. 10.24963/ijcai.2017/239
|
10 |
FREDRIKSON M, JHA S, RISTENPART T. Model inversion attacks that exploit confidence information and basic countermeasures[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015: 1322-1333. 10.1145/2810103.2813677
|
11 |
HINDS J, WILLIAMS E J, JOINSON A N. “It wouldn’t happen to me”: privacy concerns and perspectives following the Cambridge Analytica scandal[J]. International Journal of Human-Computer Studies, 2020, 143: No.102498. 10.1016/j.ijhcs.2020.102498
|
12 |
SHOKRI R, STRONATI M, SONG C, et al. Membership inference attacks against machine learning models[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 3-18. 10.1109/sp.2017.41
|
13 |
熊平,朱天清,王晓峰. 差分隐私保护及其应用[J]. 计算机学报, 2014, 37(1): 101-122. 10.3724/SP.J.1016.2014.00101
|
|
XIONG P, ZHU T Q, WANG X F. A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014, 37(1): 101-122. 10.3724/SP.J.1016.2014.00101
|
14 |
胡雨谷,葛丽娜. 一种改进的差分隐私参数设置及数据优化算法[J]. 计算机工程与科学, 2021, 43(10): 1758-1765. 10.3969/j.issn.1007-130X.2021.10.007
|
|
HU Y G, GE L N. An improved differential privacy parameter setting and data optimization algorithm[J]. Computer Engineering and Science, 2021, 43(10): 1758-1765. 10.3969/j.issn.1007-130X.2021.10.007
|
15 |
McSHERRY F, MIRONOV I. Differentially private recommender systems: building privacy into the Netflix Prize contenders[C]// Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2009: 627-636. 10.1145/1557019.1557090
|
16 |
REN J, XU X, YAO Z, et al. Recommender systems based on autoencoder and differential privacy[C]// Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference. Piscataway: IEEE, 2019: 358-363. 10.1109/compsac.2019.00059
|
17 |
ZHU T, YE D, WANG W, et al. More than privacy: applying differential privacy in key areas of artificial intelligence[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 34(6): 2824-2843.
|
18 |
ABADI M, CHU A, GOODFELLOW I, et al. Deep learning with differential privacy[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 308-318. 10.1145/2976749.2978318
|
19 |
张啸剑,孟小峰. 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014, 37(4): 927-949. 10.3724/SP.J.1016.2014.00927
|
|
ZHANG X J, MENG X F. Differential privacy in data publishing and analysis[J]. Chinese Journal of Computers, 2014, 37(4): 927-949. 10.3724/SP.J.1016.2014.00927
|
20 |
BU Z, DONG J, LONG Q, et al. Deep learning with Gaussian differential privacy[J]. Harvard Data Science Review, 2020, 2(3): No.cfc5dd25.
|
21 |
李杨,温雯,谢光强. 差分隐私保护研究综述[J]. 计算机应用研究, 2012, 29(9): 3201-3205, 3211. 10.3969/j.issn.1001-3695.2012.09.001
|
|
LI Y, WEN W, XIE G Q. Survey of research on differential privacy[J]. Application Research of Computers, 2012, 29(9): 3201-3205, 3211. 10.3969/j.issn.1001-3695.2012.09.001
|
22 |
KINGMA D P, BA J L. Adam: a method for stochastic optimization[EB/OL]. (2017-01-30) [2023-08-03]..
|
23 |
李敏,李红娇,陈杰. 差分隐私保护下的Adam优化算法研究[J]. 计算机应用与软件, 2020, 37(6): 253-258, 296. 10.3969/j.issn.1000-386x.2020.06.044
|
|
LI M, LI H J, CHEN J. Adam optimization algorithm based on differential privacy protection[J]. Computer Applications and Software, 2020, 37(6): 253-258, 296. 10.3969/j.issn.1000-386x.2020.06.044
|
24 |
RENDLE S. Factorization machines[C]// Proceedings of the 2010 IEEE International Conference on Data Mining. Piscataway: IEEE, 2010, 995-1000. 10.1109/icdm.2010.127
|
25 |
YANG L, ZHENG W, XIAO Y. Exploring different interaction among features for CTR prediction[J]. Soft Computing, 2022, 26(13): 6233-6243. 10.1007/s00500-022-07149-x
|