A Safer Approach to build Recommendation Systems
on Unidentifiable Data
Kishor Datta Gupta* Akib Sadmanee+ Nafiz Sadman+
Authors
* University of Memphis, TN, USA
+ Silicon Orchard Ltd, Bangladesh
Roadmap
Introduction
Experiments & Results
Hypothesis
Conclusion
Data Preparation
Introduction
01/08
• Privacy is an illusion
• People have become products
• Identifiable information is shared knowingly/unknowingly
• Unaware about identifiable/unidentifiable data
• Recommendation systems exploit user privacy
02/08
How can we build a personalized recommendation system
without personal information?
Identifiable Data Unidentifiable Data
03/08
Our Contribution
A comprehensive and comparative study of deep
reinforcement learning algorithms (DQN, DDQN, D3QN)
for devising a movie recommendation system using
unidentifiable data
04/08
It is possible to build a good enough recommendation system
without using trackers and collecting identifiable sensitive
personal data from the everyday user of the internet.
Hypothesis
04/08
A RL agent can learn to recommend a set of movies to a user
based on only the user’s movie watch-time.
Hypothesis
Data preparation
05/08
• Pre-existing datasets comprise identifiable data
like User ID, rating, clicks etc.
• 20 human annotators
• Each annotator was asked to watch 50 movies
• We record the watch time of an annotator watching a
particular movie
• Why not consider movie watching frequency?
Experiments & Results
06/08
Q-learning (QN)
Deep Q-learning (DQN)
Double Deep Q-learning (DDQN)
Dueling Double Deep Q-learning (D3QN)
Reward
Reward
Reward
Episodes Episodes Episodes
(a) DQN (b) DDQN (c) D3QN
07/08
Conclusion
08/08
D3QN performs the best among the three Deep RL algorithms
It is indeed possible to build a recommendation system without using any
identifiable/sellable data

More Related Content

PPTX
Adversarial Attacks and Defense
PPTX
Managing the Barriers to an Open Data Culture
PPTX
GAN introduction.pptx
PPTX
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
PPTX
Who is responsible for adversarial defense
PPTX
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
PPTX
Zero shot learning
PPTX
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Adversarial Attacks and Defense
Managing the Barriers to an Open Data Culture
GAN introduction.pptx
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Who is responsible for adversarial defense
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Zero shot learning
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...

More from Kishor Datta Gupta (20)

PPTX
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
PPTX
Machine learning in computer security
PPTX
Policy Based reinforcement Learning for time series Anomaly detection
PPTX
Cyber intrusion
PPTX
understanding the pandemic through mining covid news using natural language p...
PPTX
Different representation space for MNIST digit
PPTX
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
PPTX
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
PPTX
Adversarial Input Detection Using Image Processing Techniques (IPT)
PPTX
Clustering report
PPTX
Basic digital image concept
PPTX
An empirical study on algorithmic bias (aiml compsac2020)
PPTX
Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system ...
PPTX
Shamir secret sharing: Alternative of hashing for authentication
PPTX
A Genetic Algorithm Approach to Optimize Dispatching for A Micro-grid Energy ...
PPTX
Multi level ransomware analysis MALCON 2019 conference
PPTX
COMXAI A tool to explain AI USING FAULT LOCATION
PPTX
Time expired ledger for File access blockchain
PPTX
BigData Computing For WebSite Classifier
PPTX
Performance evaluation of cloud-based log file analysis with Apache Hadoop an...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Machine learning in computer security
Policy Based reinforcement Learning for time series Anomaly detection
Cyber intrusion
understanding the pandemic through mining covid news using natural language p...
Different representation space for MNIST digit
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Adversarial Input Detection Using Image Processing Techniques (IPT)
Clustering report
Basic digital image concept
An empirical study on algorithmic bias (aiml compsac2020)
Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system ...
Shamir secret sharing: Alternative of hashing for authentication
A Genetic Algorithm Approach to Optimize Dispatching for A Micro-grid Energy ...
Multi level ransomware analysis MALCON 2019 conference
COMXAI A tool to explain AI USING FAULT LOCATION
Time expired ledger for File access blockchain
BigData Computing For WebSite Classifier
Performance evaluation of cloud-based log file analysis with Apache Hadoop an...
Ad

Recently uploaded (20)

PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
737-MAX_SRG.pdf student reference guides
PPTX
Current and future trends in Computer Vision.pptx
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Design Guidelines and solutions for Plastics parts
Fundamentals of Mechanical Engineering.pptx
III.4.1.2_The_Space_Environment.p pdffdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
737-MAX_SRG.pdf student reference guides
Current and future trends in Computer Vision.pptx
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
CyberSecurity Mobile and Wireless Devices
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Management Information system : MIS-e-Business Systems.pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Information Storage and Retrieval Techniques Unit III
distributed database system" (DDBS) is often used to refer to both the distri...
Abrasive, erosive and cavitation wear.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Fundamentals of safety and accident prevention -final (1).pptx
Design Guidelines and solutions for Plastics parts
Ad

A safer approach to build recommendation systems on unidentifiable data