 Research
 Open Access
 Published:
LSHbased private data protection for service quality with big range in distributed educational service recommendations
EURASIP Journal on Wireless Communications and Networking volume 2019, Article number: 92 (2019)
Abstract
Service recommendation has become a promising way to extract useful or valuable information from big educational data collected by various sensors and distributed in different platforms. How to protect the private user data in each cluster during recommendation processes is an interesting but challenging problem in the educational domain. A localitysensitive hashing (LSH) technique has recently been employed to achieve the abovementioned privacypreservation goal. However, traditional LSHbased recommendation approaches often suffer from low accuracy when the service quality data recruited in recommendations vary in a big range. Considering this drawback, we modify the traditional LSH technique in this paper to make it applicable to the service quality data with a big range, so as to pursue privacypreserving and an accurate recommended list. Finally, a wide range of experiments are conducted based on the distributed dataset, i.e., WSDREAM. Experiment results show that our approach can protect the private data in education (e.g., student information in universities) and performs better than other stateoftheart ones in terms of accuracy and efficiency.
Introduction
In the age of Internet of Things (IoT), tremendous sensors embedded in various smart devices (e.g., smart phone and PDA) have produced a considerable amount of data and stored in different platforms, which form the so called big data [1,2,3]. In this situation, service recommendation has become one of the most effective techniques to extract valuable information from massive data in various domains, e.g., education. Typically, through analyzing the historical educational service usage data (e.g., service quality left by educational users) distributed in different platforms, a recommender system can mine the potential interest or preferences of a target user, through lightweight recommendation techniques (e.g., collaborative filtering (CF)). Then according to user preferences, the recommender system can return appropriate services to the target user, so as to satisfy his/her complex business requirements [4, 5].
However, from the perspective of educational users, the historical service quality data (stored in different clusters) used to make recommendation decisions are generally sensitive as they often contain some private information of users. Therefore, in order to protect business secrets and obey laws, it is necessary for a recommender system to protect the sensitive service quality data (e.g., quality of a service ever invoked by an educational user), especially when the data are collected via remote sensors and stored in distributed clusters [6, 7].
As an efficient and privacypreserving technique for a similar neighbor search, the localitysensitive hashing (LSH) [8] technique has recently been introduced into a service recommendation domain to protect the private information of users [9,10,11]. Typically, a recommender system first utilizes the LSH technique to build user indices with little privacy (even no privacy) and then search for the similar neighbors of a target user based on the prebuilt user indices; this way, similar neighbors of the target user can be found easily, without revealing the sensitive service quality data generated from past service invocations. Finally, appropriate services are selected and recommended to the target user based on the derived similar neighbors of the target user, so as to complete the LSHbased service recommendation process.
Generally, the traditional LSH technique performs well in privacypreserving service recommendations. However, when the service quality data vary in a big range (e.g., the throughput in WSDREAM dataset [12], whose value range is [0.004, 1000] kbps), the accuracy of LSHbased service recommended results decreases significantly and hence cannot satisfy the target users’ quick recommendation requirements. In view of this challenge, we improve the traditional LSH technique, so as to adapt the LSHbased recommendation approaches to the sensitive service quality data with a big range (e.g., throughput = 20 kbps when an educational user invoked a service). This way, we can enlarge the applicability of the LSH technique in privacypreserving service recommendations and meanwhile improve the recommendation accuracy.
In summary, our major contributions are twofold.

(1)
We recognize the limitation of the traditional LSH technique in terms of recommendation accuracy when the service quality data for recommendations vary in a big range. Furthermore, we improve the traditional LSHbased recommendation approaches to adapt to the service quality with a big range.

(2)
A set of experiments are designed and conducted on a wellknown service quality dataset, i.e., WSDREAM, to validate the effectiveness and efficiency of our proposed privacypreserving service recommendation approach. Experiment results show that our proposal outperforms other competitive approaches in terms of recommendation accuracy, when the historical service quality data are varied in a big range.
The rest of this paper is structured as below. Related work is presented in Section 2. In Section 3, a novel privacypreserving service recommendation approach based on the improved LSH technique, named Rec_{LSH*}, is proposed to protect the private service quality data with a big range. Experiment comparisons are presented in Section 4. Finally, in Section 5, we conclude the paper and discuss the possible research directions in the future.
Related work
In the IoT age, privacy preservation has become a hot research topic in various domains including service recommendations. Many researchers have concentrated on the privacypreserving service recommendation problems and put forward their respective resolutions. In this section, we will introduce the related work from the following four aspects, respectively.
Anonymization
Anonymity is an effective approach to achieve the data security and privacypreservation goals in many research domains. Through anonymization, multiple entries in a dataset become similar and indiscriminative; this way, the private information of users can be protected. As a variant of an anonymization technique, Kanonymity is recently recruited in [13] to generalize the real geographical information of users so as to protect the users’ location privacy. One shortcoming of Kanonymity is that it is hard to determine the optimal value of parameter K. Besides, the data availability after Kanonymity is reduced significantly when K grows; therefore, the recommendation accuracy would be decreased accordingly.
Encryption
As a classic data protection mechanism, encryption is widely applied in various domains. Many variants of an encryption technique are put forward in recent years, such as homomorphic encryption [14]. Although these approaches can protect the sensitive information of users, the encryption cost and time delay are often high; therefore, they are often not suitable for the lightweight service recommendation scenarios where quick responses from recommender systems are required.
Data obfuscation
In [15], the real service quality data are obfuscated by adding a random value and then the obfuscated data are recruited to make service recommendations; this way, the private information hidden in real service quality data can be protected well. However, as the data used to make recommendations are obfuscated, the recommendation accuracy is reduced accordingly. Similarly, in [16], the differential privacy (DP) technique is employed to protect the user privacy when making recommendation decisions. However, the time cost is often high due to the high time complexity of DP. Besides, when the available data for recommendations are updated frequently, the accumulated noise incurred by DP will become larger; in this situation, the recommendation accuracy would be decreased accordingly.
Localitysensitive hashing (LSH)
In refs. [3,4,5,6, 9,10,11], the LSH technique is combined with userbased CF to build user indices offline so as to make efficient and privacypreserving service recommendations. Similarly, the LSH technique is recruited in [17] to build service indices offline so as to accelerate the similar service search process. Although the LSH technique can be recruited to protect the private information of users, the LSHbased service recommendation approaches often fail to generate an accurate recommended result when the service quality data used to make recommendation decisions are varied in a big range.
With the above analyses, we can conclude that LSH is a promising technique to achieve the goal of efficient and privacypreserving service recommendations. However, the traditional LSH technique still fails to produce an accurate recommended result while protecting the private service quality data with a big range. Considering this drawback, we improve the traditional LSH technique in this paper to make it adapt to the service quality varied in a big range, so as to improve the applicability and the accuracy of LSHbased recommendation approaches.
Privacypreserving web service recommendations based on service quality data with a big range
In this section, we introduce the details of our proposed privacypreserving service recommendation approach, i.e., Rec_{LSH*}. Concretely, in Section 3.1, we briefly introduce the rationale of LSH to be used in our approach; in Section 3.2, we first improve the traditional LSH technique to make it applicable to the service quality with a big range, and then search for the neighbors of a target user based on the improved LSH technique; finally, in Section 3.3, we make service recommendations based on the target user’s neighbors derived in Section 3.2.
Localitysensitive hashing (LSH)
LSH is an effective and efficient technique to make similar neighbor search. The rationale behind LSH is as follows [8]: if two points are close enough, then they will be still neighbors with high probability after a LSH mapping; on the contrary, if two points are far away from each other, then they will not be neighbors with high probability after a LSH mapping. In summary, LSH is essentially a probabilitybased similar neighbor search technique. Additionally, the similar neighbors of a target user can be discovered based on the indices (with little privacy) after LSH, instead of the real service quality data; this way, the private information of users can be protected very well.
Improved LSHbased neighbor search based on service quality with a big range
As discussed in Section 1, the traditional LSH technique cannot guarantee high accuracy when the private service quality data vary in a big range. The reason is that LSH is essentially a probabilitybased neighbor search technique and the probability of successful neighbor search decreases when the service quality data for recommendations fluctuate significantly. In view of the above reason analyses, we first transform the service quality with a big range into a corresponding service quality with a small range through linear mappings; afterwards, we utilize the transformed service quality with a small range to make similar neighbor search based on LSH. Next, we introduce the concrete processes of service quality transformation and similar neighbor search.
To facilitate the further discussions, we only consider one service quality dimension with a big range, denoted by q, instead of multiple dimensions in many application domains [18,19,20,21,22,23,24,25,26,27]; for a web service ws, its real quality over q is denoted by ws.q; the minimal and maximal quality values of q of all the candidate services are denoted by MIN_{q} and MAX_{q}, respectively (thus a big range [MIN_{q}, MAX_{q}] can be obtained through statistic offline), while ws’s quality over q after transformation is denoted by T(ws.q). Next, we introduce how to transform the real service quality ws.q (∈[MIN_{q}, MAX_{q}]) into its corresponding value T(ws.q) (∈[0, 1]) (here, we select the small range [0, 1] due to its popularity in the data normalization applications).
Concretely, if q is a positive quality dimension (the larger the better, e.g., throughput), then the normalization process can be finished by (1) where ws.q∈[MIN_{q}, MAX_{q}] holds. While if q is a negative quality dimension (the smaller the better, e.g., response time), then the normalization process can be finished by (2) where ws.q∈[MIN_{q}, MAX_{q}] holds. Thus, through the transformation equations in (1) and (2), we can obtain T(ws.q) whose value falls into the range [0, 1]. Then according to the T(ws.q) values of all candidate services invoked by all users in the past, we can make similar neighbor search for a target user (denoted by u_{target}) based on the LSH technique, in an efficient and privacypreserving way. Next, we introduce the concrete process of LSHbased neighbor search.
Suppose there are n candidate services {ws_{1}, …, ws_{n}} and m users {u_{1}, …, u_{m}}. Then for each user u_{i} (1 ≤ i ≤ m), the quality of his/her invoked services can be denoted by the ndimensional vector \( \overrightarrow{u_i} \) = (T(ws_{1}.q), …, T(ws_{n}.q)). Specifically, T(ws_{j}.q) = 0 (1 ≤ j ≤ n) if user u_{i} has never invoked service ws_{j} before. Afterwards, we can transform the sensitive vector \( \overrightarrow{u_i} \) into its corresponding hash value h(u_{i}) with little privacy, based on the LSH function h(.) in (3). Here, \( \overrightarrow{v} \) is an ndimensional vector (v_{1}, …, v_{n}) where v_{j} is a random value in the range [− 1, 1]; symbol “○” denotes the dot product of two vectors.
We repeat the above hash process (for user u_{i}) r times based on the randomly selected r hash functions {h_{1}(.), …, h_{r}(.)}. Afterwards, an rdimensional vector H(u_{i}) = (h_{1}(u_{i}), …, h_{r}(u_{i})) is obtained, which can be regarded as the index for user u_{i} according to the traditional LSH theory. Then all the users and their respective indices form a hash table (denoted by Hash_Tb). With the derived hash table, we can make quick neighbor search for the target user u_{target}. Concretely, if the indices of u_{target} and u_{i} are equal in the hash table Hash_Tb, i.e., H(u_{i}) = H(u_{target}), then we can conclude that u_{i} is a neighbor of u_{target}.
However, LSH is a probabilitybased neighbor search technique; therefore, one hash table is often not enough to guarantee to find out all the similar neighbors of a target user. In other words, “falsenegative” (i.e., similar neighbors of the target user are overlooked by mistake) search results are possible. Therefore, in order to reduce the “falsenegative” probability, multiple hash tables are often needed. Concretely, we repeat the abovementioned hash table building process L times to get L hash tables {Hash_Tb_{1}, …, Hash_Tb_{L}}. Then we relax the neighbor search condition in the last paragraph as follows: if H(u_{i}) = H(u_{target}) holds in any hash table Hash_Tb_{x} (1 ≤ x ≤ L), then u_{i} can be regarded as a neighbor of u_{target}. This way, we can obtain more neighbors (denoted by set Neighbor_set) of the target user.
Here, we utilize the user index H(u_{i}) (1 ≤ i ≤ m), instead of the transformed service quality vector \( \overrightarrow{u_i} \), to make similar neighbor search due to the following two reasons. First of all, H(u_{i}) contains less private information of users compared to \( \overrightarrow{u_i} \). Second, the L hash tables can be built offline; therefore, the neighbor search process based on H(u_{i}) and H(u_{target}) would be finished quickly, which can accelerate the speed of subsequent recommendation process significantly. Therefore, with the help of user indices, we can search for the neighbors of a target user in a privacypreserving and efficient way. Next, we introduce how to predict the missing service quality and make appropriate service recommendations based on the derived neighbors in Neighbor_set.
Service recommendation
For each service ws_{j} (1 ≤ j ≤ n) never invoked by u_{target}, its missing service quality (after quality transformation) over dimension q, i.e., T(ws_{j}.q), can be predicted by the equation in (4). Here, set Neighbor_set_{j} includes all the neighbors of u_{target} who have ever invoked service ws_{j} before; T_{u}(ws_{j}.q) denotes the quality over dimension q of service ws_{j} invoked by user u.
With the predicted service quality T(ws_{j}.q) after quality transformation, we can reversely calculate the predicted service quality before quality transformation, i.e., ws_{j}.q, by (5) (for those positive quality dimensions) and (6) (for those negative quality dimensions). These two equations are deduced from (1) and (2), respectively. Then for each service never invoked by u_{target}, its missing service quality can be predicted by (5) and (6). Finally, we select the service with the optimal predicted quality and recommend it to u_{target}.
Experiments
Experiment configurations
To simulate the private data protection scenarios in the distributed environment, our experiments are conducted on a wellknown distributed service quality dataset named WSDREAM [12]. The dataset consists of the quality data (i.e., response time and throughput) of 5825 services invoked by 339 users around the world. In this paper, we only focus on the service quality with a big range; therefore, the quality dimension throughput whose values belong to the big range [0.004 kbps, 1000 kbps] is considered in our experiments. Because the quality values of response time are varied in a small range [0.001 s, 19.999 s], therefore, response time is not a quality dimension that we are interested in and hence is not considered here.
We test the time cost and MAE (mean absolute error, the smaller the better) to evaluate the performances of our proposed service recommendation approach, i.e., Rec_{LSH*}. Furthermore, to validate the advantages of Rec_{LSH*}, we compare our proposal with the following four recommendation approaches:

(1)
DistSR_{LSH} [28]: our previous work which employs the traditional LSH technique to search for the similar users of a target user, in a privacypreserving way.

(2)
UPCC: userbased collaborative filtering which recruits the PCC (Pearson correlation coefficient) as the similarity measurement.

(3)
PUIPCC [15]: data obfuscation technique (each sensitive service quality value is added a random number) is recruited to protect the private service quality.

(4)
PPICF [29]: sensitive service quality data are divided into several quality segments with little privacy, and then the quality segments are employed to make service recommendations.
The experiments were deployed on a Dell laptop with a 2.80GHz CPU and 2.0GB RAM. Experiments are running under Windows XP and JAVA 1.5. Each experiment is repeated 10 times, and the average results are reported.
Experiment results
Concretely, four profiles are tested and compared in our experiments. Here, β (∈[0%, 100%]) denotes the density of userservice quality matrix; r and L represent the number of hash functions and the number of hash tables recruited in our approach, respectively.
Profile 1: Recommendation accuracy comparisons of five approaches (w.r.t. β)
In this profile, we test the accuracy of our proposed Rec_{LSH*} approach and compare it with the other four approaches. The parameters are set as follows: β is varied from 5 to 25%, r = L = 10 holds. The experiment results are shown in Fig. 1. As Fig. 1 indicates, the recommendation accuracy of the Rec_{LSH*} approach outperforms the other four approaches, because the LSH technique is improved and recruited in Rec_{LSH*} to adapt the service quality data with a big range, while the other four approaches do not discriminate the service quality dimensions with different value ranges; therefore, the recommendation accuracy is decreased when the service quality for recommendations varies in a big range. Another observation from Fig. 1 is that in our Rec_{LSH*} approach, the recommendation accuracy does not render a linear variation tendency with the density of userservice quality matrix, i.e., β.
Profile 2: Recommendation efficiency comparisons of five approaches (w.r.t. β)
Efficiency or scalability is another criterion to evaluate the performances of a recommender system. Therefore, in this profile, we test and compare the efficiencies of different service recommendation approaches. The experiment parameter settings are as follows: the matrix density β is varied from 5 to 25%, r = L = 10 holds. The concrete experiment results are presented in Fig. 2.
As Fig. 2 shows, the recommendation efficiencies of Rec_{LSH*} and DistSR_{LSH} approaches are better than the other three approaches; this is because the LSH technique is adopted in both Rec_{LSH*} and DistSR_{LSH}, while LSH is rather efficient in searching for the neighbors of a target user as most jobs (e.g., the building of user index tables) can be done offline. Besides, Rec_{LSH*} consumes a little more time than DistSR_{LSH} as the service quality data with a big range need to be transformed in Rec_{LSH*}. However, as demonstrated in Fig. 2, our proposed Rec_{LSH*} approach is still efficient enough compared to the UPCC, PUIPCC, and PPICF approaches.
Profile 3: Recommendation accuracy of the Rec _{LSH*} approach w.r.t. r and L.
As introduced in Section 3.1, LSH is essentially a probabilitybased neighbor search technique; therefore, the accuracy values of LSHbased service recommendation approaches are often correlated with several LSH parameters, such as the number of hash functions (i.e., r) and the number of hash tables (i.e., L). Considering this, in this profile, we test the relationship or correlation between the recommendation accuracy of the Rec_{LSH*} approach and the parameters r and L. The experiment parameters are set as below: β = 25%; r is varied from 2 to 12; L is varied from 10 to 20. The concrete experiment execution results are presented in Fig. 3.
As Fig. 3 shows, the recommendation accuracy of the Rec_{LSH*} approach approximately decreases (i.e., MAE increases approximately) with the growth of L. This is because according to the nature of LSH, a larger L value (i.e., more hash tables) often means looser search condition for neighbors; in this situation, some neighbors who are not very similar with the target user would be returned to make service recommendations, and therefore, the recommendation accuracy is decreased to some extent accordingly. Another result that can be observed from Fig. 3 is that the recommendation accuracy of our Rec_{LSH*} approach approximately increases (i.e., MAE drops approximately) when r rises. This is because a larger r value (i.e., more hash functions) often means stricter search condition for similar neighbors of a target user. In this situation, only the neighbors who are very similar with the target user would be found and recruited to make recommendation decisions; therefore, the service recommendation accuracy of our Rec_{LSH*} approach is increased accordingly.
Profile 4: Number of neighbors in Rec _{LSH*} w.r.t. r, L.
The number of derived neighbors of a target user is an important reference criterion to evaluate the performance of CFbased service recommendation approaches. In this profile, we measure the number of neighbors of our proposed Rec_{LSH*} approach and investigate its possible relationship with the LSH parameters r and L. The concrete experiment parameters are set as below: β = 25%; r is varied from 2 to 12; L is varied from 10 to 20. The experiment results are shown in Fig. 4.
As can be seen from Fig. 4, there is an obvious decline of the number of similar neighbors when the number of hash functions, i.e., r, grows. The reason is the same as that in Fig. 3. More concretely, a larger r value often means stricter search condition for similar neighbors, and therefore, fewer neighbors of a target user would be found according to the stricter search condition. Additionally, when the number of hash tables, i.e., L, grows, the number of returned neighbors is increased approximately. This is because the search condition for neighbors becomes looser when L grows, and in this situation, more users would be regarded as qualified neighbors of a target user according to the looser search condition.
Discussions
In our approach and experiments, we only consider one quality dimension whose value is in a big range (e.g., throughput dimension in WSDREAM dataset), without considering the multiple quality dimensions as well as their complex relationships, e.g., linear correlations [30,31,32,33], nonlinear correlations [34,35,36,37,38,39,40,41,42,43,44,45,46,47,48], and weight significance [49,50,51,52,53,54,55]. So in the future, we will further discuss this more complex multidimensional service recommendation scenario. Besides, in this paper, we only consider the service quality dimension whose value is a real number, while neglecting the diversity of data styles (e.g., integer number, real number, fuzzy number) [56,57,58,59,60]. Considering this drawback, we will investigate more comprehensive service recommendation approach that integrates diverse data types. Finally, due to the intrinsic shortcoming of LSH technique, it is hard to evaluate the privacypreservation performance of our suggested Rec_{LSH*} approach. In the future work, we will further investigate this how to solve this key issue.
Conclusions
Protecting the private information of educational users hidden in the service quality data distributed across different platforms is a key precondition of successful service recommendations in the distributed environment. LSH has been proven as an effective technique to make privacypreserving and efficient service recommendations. However, traditional LSHbased service recommendation approaches often fail to return a highquality recommended list when the sensitive service quality data for recommendations vary in a big range. Considering this drawback, we improve the traditional LSH technique in this paper to make it applicable to the service quality data with a big range. Through the experiments on WSDREAM dataset, we prove the feasibility of the Rec_{LSH*} approach.
However, we only discuss one quality dimension of services in recommendation decisions for simplicity, without considering the multiple quality dimensions as well as their linear correlations, nonlinear correlations, data styles, and weights. So in the future, we will further refine our work by considering multiple service quality dimensions simultaneously. Additionally, service quality often varies with time; so timeaware recommendation is another research direction in the future.
Abbreviations
 CF:

Collaborative filtering
 DP:

Differential privacy
 IoT:

Internet of Things
 LSH:

Localitysensitive hashing
References
 1.
C. Li et al., Predicting shortterm electricity demand by combining the advantages of ARMA and XGBoost in fog computing environment. Wirel. Commun. Mob. Comput. 2018(5018053), 18 (2018)
 2.
L. Qi et al., Timeaware IoE service recommendation on sparse data. Mob. Inf. Syst. 2016(4397061), 12 (2016)
 3.
L. Kuang et al., A personalized QoS prediction approach for CPS service recommendation based on reputation and locationaware collaborative filtering. Sensors 18(5), 1556, 1–32 (2018)
 4.
Y. Xu et al., Privacypreserving and scalable service recommendation based on SimHash in a distributed cloud environment. Complexity 2017(3437854), 9 (2017)
 5.
L. Qi et al., A distributed localitysensitive hashing based approach for cloud service recommendation from multisource data. IEEE. J. Sel Areas Commun. 35(11), 2616–2624 (2017)
 6.
W. Gong et al., Privacyaware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel. Commun.Mob. Comp. 2018(3075849), 8 (2018)
 7.
L. Qi et al., Timeaware distributed service recommendation with privacypreservation. Inf. Sci. 480, 354–364 (2019)
 8.
A. Gionis et al., Similarity search in high dimensions via hashing. Proceedings of the 25th International Conference on Very Large Databases (VLDB), (Edinburgh, 1999), pp. 518–529
 9.
L. Qi et al., A twostage localitysensitive hashing based approach for privacypreserving mobile service recommendation in crossplatform edge environment. Futur. Gener. Comput. Syst. 88, 636–643 (2018)
 10.
C. Yan et al., Privacyaware data publishing and integration for collaborative service recommendation. IEEE ACCESS 6, 43021–43028 (2018)
 11.
L. Qi et al., An exception handling approach for privacypreserving service recommendation failure in a cloud environment. Sensors 18(7), 1–11 (2018)
 12.
Z. Zheng et al., Investigating QoS of real world web services. IEEE Trans. Serv. Comput. 7(1), 32–39 (2014)
 13.
I. Memon, Authentication user’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel. Pers. Commun. 82(3), 1585–1600 (2015)
 14.
S. Sobitha Ahila et al., Role of agent technology in web usage mining: homomorphic encryption based recommendation for Ecommerce applications. Wirel. Pers. Commun. 87(2), 499–512 (2016)
 15.
J. Zhu et al., A privacypreserving QoS prediction framework for web service recommendation. 2015 IEEE International Conference on Web Services (ICWS), (New York, 2015), pp. 241–248
 16.
L. Kuang et al., A privacy protection model of data publication based on game theory. Secur. Commun Netw. 2018(3486529), 13 (2018)
 17.
D. Li et al., SESLSH: shuffleefficient locality sensitive hashing for distributed similarity search. 2017 IEEE International Conference on Web Services (ICWS), (Honolulu, 2017), pp. 822–827
 18.
M. Wang et al., Robust group nonconvex estimations for highdimensional partially linear models. J. Nonparametr. Statistics 28(1), 49–67 (2016)
 19.
X. Wang et al., Variable selection for highdimensional generalized linear models with the weighted elasticnet procedure. J. Appl. Statistics 43(5), 796–809 (2016)
 20.
P. Wang et al., Some geometrical properties of convex level sets of minimal graph on 2dimensional Riemannian manifolds. Nonlinear Anal. 130, 1–17 (2016)
 21.
X. Wang et al., Adaptive group bridge estimation for highdimensional partially linear models. J. Inequal. Appl. 2017, 158 (2017). https://doi.org/10.1186/s136600171432x
 22.
X. Wang et al., Restricted profile estimation for partially linear models with largedimensional covariates. Statist. Probab. Lett. 128, 71–76 (2017)
 23.
H. Tian et al., Bifurcation of periodic orbits by perturbing highdimensional piecewise smooth Integrable systems. J. Differ Equ. 263, 7448–7474 (2017)
 24.
P. Wang et al., The geometric properties of harmonic function on 2dimensional Riemannian manifolds. Nonlinear Anal. 103, 2–8 (2014)
 25.
M. Wang et al., Adaptive lasso estimators for ultrahigh dimensional generalized linear models. Statist. Probab. Lett. 89, 41–50 (2014)
 26.
M. Wang et al., A note on the onestep estimator for ultrahigh dimensionality. J. Comput. Appl. Math. 260, 91–98 (2014)
 27.
G. Tian et al., Variable selection in the highdimensional continuous generalized linear model with current status data. J. Appl. Stat. 41, 467–483 (2014)
 28.
L. Qi et al., Privacypreserving distributed service recommendation based on localitysensitive hashing. 2017 IEEE International Conference on Web Services (ICWS), (Honolulu, 2017), pp. 49–56
 29.
D. Li et al., An algorithm for efficient privacypreserving itembased collaborative filtering. Futur. Gener. Comput. Syst. 55, 311–320 (2016)
 30.
G. Guo et al., Parallel tempering for dynamic generalized linear models. Commun. Statist.Theory Methods 45(21), 6299–6310 (2016)
 31.
L.L. Liu et al., Recurrence relations for linear transformations preserving the strong qlogconvexity. Electron. J. Comb. 23(3), 1–11 (2016)
 32.
H. Li et al., Partial condition number for the equality constrained linear least squares problem. Calcolo 54(4), 1121–1146 (2017)
 33.
Z. Zhao et al., Existence and uniqueness of positive solutions for some singular boundary value problems with linear functional boundary conditions. Acta Math. Sin. Engl. Ser. 27(10), 2073–2084 (2011)
 34.
H. Liu et al., Some new nonlinear integral inequalities with weakly singular kernel and their applications to FDEs. J. Inequal. Appl. 2015(209), 1–17 (2015)
 35.
X. Zhang et al., Entire large solutions for a Schrödinger systems with a nonlinear random operator. J. Math. Anal. Appl. 423(2), 1650–1659 (2015)
 36.
Z. Zong et al., On Jensen’s inequality, Holder’s inequality and Minkowski’s inequality for dynamically consistent nonlinear evaluations. J. Inequal. Appl. 2015(152), 1–18 (2015)
 37.
X. Hao et al., Positive solutions for nonlinear fractional semipositone differential equation with nonlocal boundary conditions. J. Nonl. Sci. Appl. 9(6), 3992–4002 (2016)
 38.
X. Hao et al., Iterative solution for nonlinear impulsive advectionreactiondiffusion equations. J. Nonl. Sci. Appl. 9(6), 4070–4077 (2016)
 39.
J. Shao et al., Oscillation theorems for second order forced neutral nonlinear differential equations with delayed argument. Int. J. Diff. Equ. 2010(181784), 1–15 (2010)
 40.
Y. Bai et al., On a class of Volterra nonlinear equations of parabolic type. Appl. Math. Comput. 2010(216), 236–240 (2010)
 41.
Y. Bai, Backward solutions to nonlinear integrodifferential systems. Cen. Eur. J. Math. 8(4), 807–815 (2010)
 42.
F. Li et al., Uniform energy decay rates for nonlinear viscoelastic wave equation with nonlocal boundary damping. Nonlinear Anal. 74, 3468–3477 (2011)
 43.
F. Li et al., Global existence uniqueness and decay estimates for nonlinear viscoelastic wave equation with boundary dissipation. Nonlinear Anal. Real World Appl. 12, 1770–1784 (2011)
 44.
A. Qian, Singchanging solutions for some nonlinear problems with strong resonance. Bound. Value Probl. 18, 1–9 (2011)
 45.
Y. Wang et al., Positive solutions for a class of fractional boundary value problem with changing sign nonlinearity. Nonlinear Anal. 74(17), 6434–6441 (2011)
 46.
W. Fan et al., Nontrivial solutions of singular fourthorder SturmLiouville boundary value problems with a signchanging nonlinear term. Appl Math. Comput. 217(15), 6700–6708 (2011)
 47.
L.L. Liu, Linear transformations preserving logconvexity. Ars Combin. 100, 473–483 (2011)
 48.
J. Liu et al., Multiple positive solutions for secondorder threepoint boundaryvalue problems with sign changing nonlinearities. Electronic. J. Differ. Equ. 2012(152), 1–7 (2012)
 49.
S. Yang et al., The weight distributions of two classes of pary cyclic codes with few weights. Finite Fields Appl. 44, 76–91 (2017)
 50.
Y. Wang et al., Uniform estimate for the tail probabilities of randomly weighted sums. Acta Math. Appl. Sin. Engl. Ser. 30(4), 1063–1072 (2014)
 51.
S. Yang et al., A class of threeweight linear codes and their complete weight enumerators. Cryptogr. Commun. 9, 133–149 (2017)
 52.
J. Cai, An implicit sigma (3) type condition for heavy cycles in weighted graphs. Ars Combin. 115, 211–218 (2014)
 53.
S. Yang et al., Complete weight enumerators of a family of threeweight linear codes. Des Codes Cryptogr 82, 663–674 (2017)
 54.
S. Yang et al., Complete weight enumerators of a class of linear codes. Discret. Math. 340, 729–739 (2017)
 55.
S. Yang et al., A construction of linear codes and their complete weight enumerators. Finite Fields Appl. 48, 196–226 (2017)
 56.
P. Li, Two classes of linear equations of discrete convolution type with harmonic singular operators. Complex Variables Elliptic Equ. 61(1), 67–75 (2016)
 57.
Z. Zheng, Invariance of deficiency indices under perturbation for discrete Hamiltonian systems. J. Differ. Equ. Appl. 19(8), 1243–1250 (2013)
 58.
M. Han et al., Theory of rotated equations and applications to a population model. Discrete Contin. Dynam. SystemsA 38(4), 2171–2185 (2018)
 59.
J. Cai et al., A new sufficient condition for pancyclability of graphs. Discret. Appl. Math. 162, 142–148 (2014)
 60.
L.L. Liu et al., Strong qlogconvexity of the Eulerian polynomials of Coxeter groups. Discrete Math. 338(12), 2332–2340 (2015)
Acknowledgements
Not applicable.
Funding
Partial work of this paper is supported by the Natural Science Foundation of China (No. 61872219).
Availability of data and materials
The recruited experiment dataset WSDREAM is available at wsdream.github.io/.
Author information
Affiliations
Contributions
CY finished the algorithm and English writing of the paper. XC finished the experiments. QK put forward the idea of this paper. All authors read and approved the final manuscript.
Corresponding author
Correspondence to Qinglei Kong.
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Received
Accepted
Published
DOI
Keywords
 Recommender system
 Cluster
 Sensor
 Service quality with big range
 Privacy preservation