| 1 | 陈检. 基于神经网络与因子分解机的点击率预估应用研究[J]. 信息技术与信息化, 2018(8): 204-207.  10.3969/j.issn.1672-9528.2018.08.063 | 
																													
																							|  | CHEN J. Application research of click rate estimation based on neural network and factor decomposition machine[J]. Information Technology and Informatization, 2018(8): 204-207.  10.3969/j.issn.1672-9528.2018.08.063 | 
																													
																							| 2 | WANG Y, BI X, QU A. A logistic factorization model for recommender systems with multinomial responses[J]. Journal of Computational and Graphical Statistics, 2020, 29(2): 396-404.  10.1080/10618600.2019.1665535 | 
																													
																							| 3 | 孙晓寒,张莉. 基于评分区域子空间的协同过滤推荐算法[J]. 计算机科学, 2022, 49(7): 50-56.  10.11896/jsjkx.210600062 | 
																													
																							|  | SUN X H, ZHANG L. Collaborative filtering recommendation algorithm based on rating region subspace[J]. Computer Science, 2022, 49(7): 50-56.  10.11896/jsjkx.210600062 | 
																													
																							| 4 | 田震,潘腊梅,尹朴,等. 深度矩阵分解推荐算法[J]. 软件学报, 2021, 32(12): 3917-3928. | 
																													
																							|  | TIAN Z, PAN L M, YIN P, et al. Deep matrix factorization recommendation algorithm[J]. Journal of Software, 2021, 32(12):3917-3928. | 
																													
																							| 5 | ZHANG H, ZHONG H, BAI W, et al. Cross-platform rating prediction method based on review topic[J]. Future Generation Computer Systems, 2019, 101: 236-245.  10.1016/j.future.2019.06.021 | 
																													
																							| 6 | SHAO Y, WANG C. HIBoosting: a recommender system based on a gradient boosting machine[J]. IEEE Access, 2019, 7: 171013-171022.  10.1109/access.2019.2956342 | 
																													
																							| 7 | XU J, HE X, LI H. Deep learning for matching in search and recommendation[J]. Foundations and Trends® in Information Retrieval, 2020, 14(2/3): 102-288.  10.1561/1500000076 | 
																													
																							| 8 | WILSON C M, FRIDLEY B L, CONEJO-GARCIA J R, et al. Wide and deep learning for automatic cell type identification[J]. Computational and Structural Biotechnology Journal, 2021, 19: 1052-1062.  10.1016/j.csbj.2021.01.027 | 
																													
																							| 9 | GUO H, TANG R, YE Y, et al. DeepFM: a factorization-machine based neural network for CTR prediction[C]// Proceedings of the 26th International Joint Conference on Artificial Intelligence. California: ijcai.org, 2017: 1725-1731.  10.24963/ijcai.2017/239 | 
																													
																							| 10 | FREDRIKSON M, JHA S, RISTENPART T. Model inversion attacks that exploit confidence information and basic countermeasures[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015: 1322-1333.  10.1145/2810103.2813677 | 
																													
																							| 11 | HINDS J, WILLIAMS E J, JOINSON A N. “It wouldn’t happen to me”: privacy concerns and perspectives following the Cambridge Analytica scandal[J]. International Journal of Human-Computer Studies, 2020, 143: No.102498.  10.1016/j.ijhcs.2020.102498 | 
																													
																							| 12 | SHOKRI R, STRONATI M, SONG C, et al. Membership inference attacks against machine learning models[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 3-18.  10.1109/sp.2017.41 | 
																													
																							| 13 | 熊平,朱天清,王晓峰. 差分隐私保护及其应用[J]. 计算机学报, 2014, 37(1): 101-122.  10.3724/SP.J.1016.2014.00101 | 
																													
																							|  | XIONG P, ZHU T Q, WANG X F. A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014, 37(1): 101-122.  10.3724/SP.J.1016.2014.00101 | 
																													
																							| 14 | 胡雨谷,葛丽娜. 一种改进的差分隐私参数设置及数据优化算法[J]. 计算机工程与科学, 2021, 43(10): 1758-1765.  10.3969/j.issn.1007-130X.2021.10.007 | 
																													
																							|  | HU Y G, GE L N. An improved differential privacy parameter setting and data optimization algorithm[J]. Computer Engineering and Science, 2021, 43(10): 1758-1765.  10.3969/j.issn.1007-130X.2021.10.007 | 
																													
																							| 15 | McSHERRY F, MIRONOV I. Differentially private recommender systems: building privacy into the Netflix Prize contenders[C]// Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2009: 627-636.  10.1145/1557019.1557090 | 
																													
																							| 16 | REN J, XU X, YAO Z, et al. Recommender systems based on autoencoder and differential privacy[C]// Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference. Piscataway: IEEE, 2019: 358-363.  10.1109/compsac.2019.00059 | 
																													
																							| 17 | ZHU T, YE D, WANG W, et al. More than privacy: applying differential privacy in key areas of artificial intelligence[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 34(6): 2824-2843. | 
																													
																							| 18 | ABADI M, CHU A, GOODFELLOW I, et al. Deep learning with differential privacy[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 308-318.  10.1145/2976749.2978318 | 
																													
																							| 19 | 张啸剑,孟小峰. 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014, 37(4): 927-949.  10.3724/SP.J.1016.2014.00927 | 
																													
																							|  | ZHANG X J, MENG X F. Differential privacy in data publishing and analysis[J]. Chinese Journal of Computers, 2014, 37(4): 927-949.  10.3724/SP.J.1016.2014.00927 | 
																													
																							| 20 | BU Z, DONG J, LONG Q, et al. Deep learning with Gaussian differential privacy[J]. Harvard Data Science Review, 2020, 2(3): No.cfc5dd25. | 
																													
																							| 21 | 李杨,温雯,谢光强. 差分隐私保护研究综述[J]. 计算机应用研究, 2012, 29(9): 3201-3205, 3211.  10.3969/j.issn.1001-3695.2012.09.001 | 
																													
																							|  | LI Y, WEN W, XIE G Q. Survey of research on differential privacy[J]. Application Research of Computers, 2012, 29(9): 3201-3205, 3211.  10.3969/j.issn.1001-3695.2012.09.001 | 
																													
																							| 22 | KINGMA D P, BA J L. Adam: a method for stochastic optimization[EB/OL]. (2017-01-30) [2023-08-03].. | 
																													
																							| 23 | 李敏,李红娇,陈杰. 差分隐私保护下的Adam优化算法研究[J]. 计算机应用与软件, 2020, 37(6): 253-258, 296.  10.3969/j.issn.1000-386x.2020.06.044 | 
																													
																							|  | LI M, LI H J, CHEN J. Adam optimization algorithm based on differential privacy protection[J]. Computer Applications and Software, 2020, 37(6): 253-258, 296.  10.3969/j.issn.1000-386x.2020.06.044 | 
																													
																							| 24 | RENDLE S. Factorization machines[C]// Proceedings of the 2010 IEEE International Conference on Data Mining. Piscataway: IEEE, 2010, 995-1000.  10.1109/icdm.2010.127 | 
																													
																							| 25 | YANG L, ZHENG W, XIAO Y. Exploring different interaction among features for CTR prediction[J]. Soft Computing, 2022, 26(13): 6233-6243.  10.1007/s00500-022-07149-x |