Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2365952.2365989acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
research-article

BlurMe: inferring and obfuscating user gender based on ratings

Published: 09 September 2012 Publication History

Abstract

User demographics, such as age, gender and ethnicity, are routinely used for targeting content and advertising products to users. Similarly, recommender systems utilize user demographics for personalizing recommendations and overcoming the cold-start problem. Often, privacy-concerned users do not provide these details in their online profiles. In this work, we show that a recommender system can infer the gender of a user with high accuracy, based solely on the ratings provided by users (without additional metadata), and a relatively small number of users who share their demographics. Focusing on gender, we design techniques for effectively adding ratings to a user's profile for obfuscating the user's gender, while having an insignificant effect on the recommendations provided to that user.

References

[1]
G. Adomavicius and J. Zhang. On the stability of recommendation algorithms. In RecSys, 2010.
[2]
S. Bhagat, I. Rozenbaum, and G. Cormode. Applying link-based classification to label blogs. In WebKDD/SNA-KDD, 2007.
[3]
Z. Cheng and N. Hurley. E ective diverse and obfuscated attacks on model-based recommender systems. In RecSys, 2009.
[4]
T. Hastie, R. Tibshirani, and J. H. Friedman. The elements of statistical learning: data mining, inference, and prediction. New York: Springer-Verlag, 2001.
[5]
M. Jamali and M. Ester. A matrix factorization technique with trust propagation for recommendation in social networks. In RecSys, 2010.
[6]
Y. Koren, R. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 42(8):30--37, 2009.
[7]
A. McCallum and K. Nigam. A comparison of event models for Naive Bayes text classification. In AAAI, 1998.
[8]
F. McSherry and I. Mironov. Di erentially private recommender systems: building privacy into the net. In KDD, 2009.
[9]
A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in Online Social Networks. In WSDM, 2010.
[10]
M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Recommender systems: Attack types and strategies. In AAAI, 2005.
[11]
J. Otterbacher. Inferring gender of movie reviewers: exploiting writing style, content and metadata. In CIKM, 2010.
[12]
D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta. Classifying latent user attributes in twitter. In SMUC, 2010.
[13]
A. P. Singh and G. J. Gordon. Relational learning via collective matrix factorization. In KDD, 2008.
[14]
V. Toubiana, L. Subramanian, and H. Nissenbaum. Trackmenot: Enhancing the privacy of web search. CoRR, abs/1109.4677, 2011.
[15]
S. Ye, F. Wu, R. Pandey, and H. Chen. Noise injection for search privacy protection. In CSE, 2009.

Cited By

View all
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/36528913:2(1-68)Online publication date: 13-Apr-2024
  • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/3643821Online publication date: 30-Jan-2024
  • (2024)Fair Recommendations with Limited Sensitive Attributes: A Distributionally Robust Optimization ApproachProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657822(448-457)Online publication date: 10-Jul-2024
  • Show More Cited By

Index Terms

  1. BlurMe: inferring and obfuscating user gender based on ratings

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RecSys '12: Proceedings of the sixth ACM conference on Recommender systems
    September 2012
    376 pages
    ISBN:9781450312707
    DOI:10.1145/2365952
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 September 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. inference
    2. obfuscation
    3. privacy
    4. recommender systems

    Qualifiers

    • Research-article

    Conference

    RecSys '12
    Sponsor:
    RecSys '12: Sixth ACM Conference on Recommender Systems
    September 9 - 13, 2012
    Dublin, Ireland

    Acceptance Rates

    RecSys '12 Paper Acceptance Rate 24 of 119 submissions, 20%;
    Overall Acceptance Rate 254 of 1,295 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)43
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/36528913:2(1-68)Online publication date: 13-Apr-2024
    • (2024)Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network ApproachACM Transactions on Knowledge Discovery from Data10.1145/3643821Online publication date: 30-Jan-2024
    • (2024)Fair Recommendations with Limited Sensitive Attributes: A Distributionally Robust Optimization ApproachProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657822(448-457)Online publication date: 10-Jul-2024
    • (2024)Comprehensive Privacy Analysis on Federated Recommender System Against Attribute Inference AttacksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.329560136:3(987-999)Online publication date: Mar-2024
    • (2024)Differentially Private Graph Neural Networks for Link Prediction2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00133(1632-1644)Online publication date: 13-May-2024
    • (2024)Consumer-side fairness in recommender systems: a systematic survey of methods and evaluationArtificial Intelligence Review10.1007/s10462-023-10663-557:4Online publication date: 29-Mar-2024
    • (2024)SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix FactorizationWeb Information Systems Engineering – WISE 202410.1007/978-981-96-0567-5_17(227-242)Online publication date: 3-Dec-2024
    • (2024)Making Alice Appear Like Bob: A Probabilistic Preference Obfuscation Method For Implicit Feedback Recommendation ModelsMachine Learning and Knowledge Discovery in Databases. Research Track10.1007/978-3-031-70368-3_21(349-365)Online publication date: 22-Aug-2024
    • (2024)A Review of Social Network Regulations and Mechanisms for Safeguarding Children’s PrivacyAdvanced Information Networking and Applications10.1007/978-3-031-57931-8_41(427-438)Online publication date: 9-Apr-2024
    • (2024)The Impact of Differential Privacy on Recommendation Accuracy and Popularity BiasAdvances in Information Retrieval10.1007/978-3-031-56066-8_33(466-482)Online publication date: 15-Mar-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media