Secure multi-party protocols for item-based collaborative filtering

E Shmueli, T Tassa - Proceedings of the eleventh ACM conference on …, 2017 - dl.acm.org
Recommender systems have become extremely common in recent years, and are utilized in
a variety of domains such as movies, music, news, products, restaurants, etc. While a typical …

Quantitative computation of social strength in Social Internet of Things

J Jung, S Chun, X **, KH Lee - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Recently, the emerging Social Internet of Things (SIoT) has opened up a myriad of research
opportunities. One of the most fundamental research challenges posed by SIoT and its …

Find thy neighbourhood: Privacy-preserving local clustering

N Koti, VB Kukkala, A Patra… - Proceedings on Privacy …, 2023 - petsymposium.org
Identifying a cluster around a seed node in a graph, termed local clustering, finds use in
several applications, including fraud detection, targeted advertising, community detection …

Mediated secure multi-party protocols for collaborative filtering

E Shmueli, T Tassa - ACM Transactions on Intelligent Systems and …, 2020 - dl.acm.org
Recommender systems have become extremely common in recent years and are utilized in
a variety of domains such as movies, music, news, products, restaurants, and so on. While a …

Fairness-driven private collaborative machine learning

D Pessach, T Tassa, E Shmueli - ACM Transactions on Intelligent …, 2024 - dl.acm.org
The performance of machine learning algorithms can be considerably improved when
trained over larger datasets. In many domains, such as medicine and finance, larger …

Privacy-preserving collaborative filtering by distributed mediation

T Tassa, AB Horin - ACM Transactions on Intelligent Systems and …, 2022 - dl.acm.org
Recommender systems have become very influential in our everyday decision making, eg,
hel** us choose a movie from a content platform, or offering us suitable products on e …

Privacy-preserving planarity testing of distributed graphs

G Barshap, T Tassa - Data and Applications Security and Privacy XXXII …, 2018 - Springer
We study the problem of privacy-preserving planarity testing of distributed graphs. The
setting involves several parties that hold private graphs on the same set of vertices, and an …

[PDF][PDF] Secure Voting Protocols with Perfect Ballot Secrecy.

L Dery, T Tassa - arxiv preprint arxiv:1903.06472, 2019 - academia.edu
Securing voters' privacy and ensuring the integrity of the voting process are major design
goals in voting systems. We propose secure voting protocols for two families of voting rules …

秘密区间与阈值的保密判定.

成雯, **顺东, 王文丽 - … of Frontiers of Computer Science & …, 2020 - search.ebscohost.com
安全多方计算(SMC) 是密码学领域**年来的研究热点, 是信息安全保护的关键技术.
区间安全多方计算问题在密码学中具有重要的理论意义. 之前的研究很少涉及到秘密区间 …

[CITAZIONE][C] Privacy-Preserving Determination of Secret Interval and Threshold

C Wen, LI Shundong, W Wenli - Journal of Frontiers of Computer Science & …, 2020