Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
[HTML][HTML] How do context-aware artificial intelligence algorithms used in fitness recommender systems? A literature review and research agenda
P Venkatachalam, S Ray - International Journal of Information Management …, 2022 - Elsevier
Recommender Systems (RS) help the user in the decision-making process when there is a
problem of plenty or lack of information. The context-aware recommender systems (CARS) …
problem of plenty or lack of information. The context-aware recommender systems (CARS) …
A survey on trustworthy recommender systems
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …
deployed in almost every corner of the web and facilitate the human decision-making …
Wearable activity trackers: A survey on utility, privacy, and security
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …
However, despite many research studies in different fields (eg psychology, health, and …
[PDF][PDF] Privacy and the Internet of Things.
Using networks of Internet-connected sensors, the Internet of Things (IoT) makes
technologies “smart” by enabling automation, personalization, and remote control. At the …
technologies “smart” by enabling automation, personalization, and remote control. At the …
Prediction of mobile app privacy preferences with user profiles via federated learning
Permission managers in mobile devices allow users to control permissions requests, by
granting of denying application's access to data and sensors. However, existing managers …
granting of denying application's access to data and sensors. However, existing managers …
The effectiveness of adaptation methods in improving user engagement and privacy protection on social network sites
M Namara, H Sloan… - Proceedings on Privacy …, 2022 - petsymposium.org
Research finds that the users of Social Networking Sites (SNSs) often fail to
comprehensively engage with the plethora of available privacy features—arguably due to …
comprehensively engage with the plethora of available privacy features—arguably due to …
When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification
Z Liang, J Guo, W Qiu, Z Huang, S Li - Data Mining and Knowledge …, 2024 - Springer
With the rise of Web 2.0 platforms such as online social media, people's private information,
such as their location, occupation and even family information, is often inadvertently …
such as their location, occupation and even family information, is often inadvertently …
In2P-Med: toward the individual privacy preferences identity in the medical web apps
With the advancement of technology, people are now able to monitor their health more
efficiently. Mobile phones and smartwatches are equipped with sensors that can measure …
efficiently. Mobile phones and smartwatches are equipped with sensors that can measure …
Enhancing user privacy in mobile devices through prediction of privacy preferences
The multitude of applications and security configurations of mobile devices requires
automated approaches for effective user privacy protection. Current permission managers …
automated approaches for effective user privacy protection. Current permission managers …