Asynchronous Federated Learning With Local Differential Privacy for Privacy-Enhanced Recommender Systems

被引:0
作者
Zhao, Xiaopeng [1 ]
Bai, Xiao [1 ]
Sun, Guohao [1 ]
Yan, Zhe [1 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 07期
关键词
Privacy; Training; Recommender systems; Data privacy; Internet of Things; Federated learning; Accuracy; Data models; Servers; Protection; Differential privacy (DP); federated learning (FL); Internet of Things (IoT); privacy-preserving; recommender systems;
D O I
10.1109/JIOT.2025.3531117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recommender systems provide an effective solution to information overload. With the rapid advancement of deep learning, these systems can efficiently manage large training datasets and incorporate diverse supplementary data, thereby alleviating issues related to data sparsity and the cold start problem. However, training deep-learning-based recommender systems necessitates a substantial amount of user data, which raises concerns regarding data security and user privacy. Federated learning (FL) emerges as an innovative response to this challenge, particularly in the context of the Internet of Things (IoT). Nevertheless, existing FL recommender systems have been shown to pose potential threats during both the model training and inference phases, compromising data privacy and system robustness. This article introduces the asynchronous FL extreme deep factorization machine (AFedDFM), a state-of-the-art deep learning recommendation model that employs FL principles to prioritize user privacy. To enhance privacy protection and mitigate the risk of inference attacks, the model incorporates pseudo-interaction padding to obscure real user interactions and implements local differential privacy by adding controlled noise to the shared model parameters, thereby strengthening the model's defenses against potential privacy breaches. Simultaneously, AFedDFM employs anti-poisoning algorithms to reduce the impact of malicious clients. Furthermore, AFedDFM effectively learns both explicit and implicit feature interactions, improves recommendation accuracy, and addresses the cold start problem. Extensive experiments conducted on two benchmark datasets demonstrate the superiority of our approach in terms of recommendation quality and privacy protection.
引用
收藏
页码:7915 / 7929
页数:15
相关论文
共 41 条
[1]  
Alashkar T, 2017, AAAI CONF ARTIF INTE, P941
[2]  
Ammad-ud-din M, 2019, Arxiv, DOI arXiv:1901.09888
[3]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[4]   Study of N* production from J/ψ → p(p)over-barη [J].
Bai, JZ ;
Ban, Y ;
Bian, JG ;
Chang, JF ;
Chen, AD ;
Chen, HF ;
Chen, HS ;
Chen, JC ;
Chen, XD ;
Chen, YB ;
Cheng, BS ;
Chi, SP ;
Chu, YP ;
Chui, XZ ;
Dai, YS ;
Dong, LY ;
Du, ZZ ;
Fu, HY ;
Fu, LP ;
Gao, CS ;
Gu, SD ;
Guo, YN ;
Guo, ZJ ;
Han, SW ;
Han, Y ;
He, J ;
He, JT ;
He, KL ;
He, M ;
He, X ;
Hong, T ;
Heng, YK ;
Hu, GY ;
Hu, HM ;
Hu, QH ;
Hu, T ;
Huang, GS ;
Huang, XP ;
Huang, YZ ;
Ji, XB ;
Jiang, CH ;
Jin, Y ;
Ke, ZJ ;
Lai, YF ;
Li, D ;
Li, HB ;
Li, HH ;
Li, J ;
Li, JC ;
Li, PQ .
PHYSICS LETTERS B, 2001, 510 (1-4) :75-82
[5]   Locally Connected Deep Learning Framework for Industrial-scale Recommender Systems [J].
Chen, Cen ;
Zhao, Peilin ;
Li, Longfei ;
Zhou, Jun ;
Li, Xiaolong ;
Qiu, Minghui .
WWW'17 COMPANION: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2017, :769-770
[6]  
Chen ZX, 2019, PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P2137
[7]  
Cheng H.-T., 2016, ACM International Conference Proceeding Series, P7, DOI DOI 10.1145/2988450.2988454
[8]   Guaranteeing Local Differential Privacy on Ultra-low-power Systems [J].
Choi, Woo-Seok ;
Tomei, Matthew ;
Vicarte, Jose Rodrigo Sanchez ;
Hanumolu, Pavan Kumar ;
Kumar, Rakesh .
2018 ACM/IEEE 45TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2018, :561-574
[9]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[10]  
[高莹 Gao Ying], 2023, [计算机学报, Chinese Journal of Computers], V46, P1781