{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:39:59Z","timestamp":1767706799074,"version":"3.41.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030494605"},{"type":"electronic","value":"9783030494612"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49461-2_18","type":"book-chapter","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T23:04:49Z","timestamp":1590534289000},"page":"307-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["SAShA: Semantic-Aware Shilling Attacks on Recommender Systems Exploiting Knowledge Graphs"],"prefix":"10.1007","author":[{"given":"Vito Walter","family":"Anelli","sequence":"first","affiliation":[]},{"given":"Yashar","family":"Deldjoo","sequence":"additional","affiliation":[]},{"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[]},{"given":"Eugenio","family":"Di Sciascio","sequence":"additional","affiliation":[]},{"given":"Felice Antonio","family":"Merra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,27]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-319-29659-3_12","volume-title":"Recommender Systems","author":"Charu C. Aggarwal","year":"2016","unstructured":"Aggarwal, C.C.: Attack-resistant recommender systems. In: Recommender Systems, pp. 385\u2013410. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29659-3_12"},{"key":"18_CR2","unstructured":"Alam, M., Buscaldi, D., Cochez, M., Osborne, F., Recupero, D.R., Sack, H. (eds.): Proceedings of the Workshop on Deep Learning for Knowledge Graphs (DL4KG2019) Co-located with the 16th Extended Semantic Web Conference 2019 (ESWC 2019). CEUR Workshop Proceedings, Portoroz, Slovenia, 2 June 2019, vol. 2377. CEUR-WS.org (2019)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Anelli, V.W., Bellini, V., Di Noia, T., Bruna, W.L., Tomeo, P., Di Sciascio, E.: An analysis on time- and session-aware diversification in recommender systems. In: UMAP, pp. 270\u2013274. ACM (2017)","DOI":"10.1145\/3079628.3079703"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Anelli, V.W., Di Noia, T.: 2nd workshop on knowledge-aware and conversational recommender systems - KaRS. In: CIKM, pp. 3001\u20133002. ACM (2019)","DOI":"10.1145\/3357384.3358805"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-030-30793-6_3","volume-title":"The Semantic Web \u2013 ISWC 2019","author":"VW Anelli","year":"2019","unstructured":"Anelli, V.W., Di Noia, T., Di Sciascio, E., Ragone, A., Trotta, J.: How to make latent factors interpretable by feeding factorization machines with knowledge graphs. In: Ghidini, C., et al. (eds.) ISWC 2019. LNCS, vol. 11778, pp. 38\u201356. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30793-6_3"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Leskovec, J.: Supervised random walks: predicting and recommending links in social networks. In: Proceedings of the Forth International Conference on Web Search and Web Data Mining, WSDM 2011, Hong Kong, China, 9\u201312 February 2011, pp. 635\u2013644 (2011)","DOI":"10.1145\/1935826.1935914"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-030-00671-6_15","volume-title":"The Semantic Web \u2013 ISWC 2018","author":"S Bhatia","year":"2018","unstructured":"Bhatia, S., Dwivedi, P., Kaur, A.: That\u2019s interesting, tell me more! finding descriptive support passages for knowledge graph relationships. In: Vrande\u010di\u0107, D., et al. (eds.) ISWC 2018, Part I. LNCS, vol. 11136, pp. 250\u2013267. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00671-6_15"},{"key":"18_CR8","unstructured":"Bhaumik, R., Williams, C., Mobasher, B., Burke, R.: Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP 2006), Boston, vol. 6, p. 10 (2006)"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/978-1-4899-7637-6_28","volume-title":"Recommender Systems Handbook","author":"R Burke","year":"2015","unstructured":"Burke, R., O\u2019Mahony, M.P., Hurley, N.J.: Robust collaborative recommendation. In: Ricci, F., Rokach, L., Shapira, B. (eds.) Recommender Systems Handbook, pp. 961\u2013995. Springer, Boston (2015). https:\/\/doi.org\/10.1007\/978-1-4899-7637-6_28"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/978-3-540-73499-4_41","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"L Candillier","year":"2007","unstructured":"Candillier, L., Meyer, F., Boull\u00e9, M.: Comparing state-of-the-art collaborative filtering systems. In: Perner, P. (ed.) MLDM 2007. LNCS (LNAI), vol. 4571, pp. 548\u2013562. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73499-4_41"},{"issue":"5","key":"18_CR11","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","volume":"16","author":"J Cao","year":"2012","unstructured":"Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5), 729\u2013748 (2012). https:\/\/doi.org\/10.1007\/s11280-012-0164-6","journal-title":"World Wide Web"},{"issue":"7","key":"18_CR12","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1007\/s13042-018-0861-2","volume":"10","author":"K Chen","year":"2018","unstructured":"Chen, K., Chan, P.P.K., Zhang, F., Li, Q.: Shilling attack based on item popularity and rated item correlation against collaborative filtering. Int. J. Mach. Learn. Cybernet. 10(7), 1833\u20131845 (2018). https:\/\/doi.org\/10.1007\/s13042-018-0861-2","journal-title":"Int. J. Mach. Learn. Cybernet."},{"key":"18_CR13","unstructured":"Cochez, M., et al. (eds.): Proceedings of the First Workshop on Deep Learning for Knowledge Graphs and Semantic Technologies (DL4KGS) Co-located with the 15th Extended Semantic Web Conerence (ESWC 2018). CEUR Workshop Proceedings, Heraklion, Crete, Greece, 4 June 2018, vol. 2106. CEUR-WS.org (2018)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s11257-019-09221-y","volume":"29","author":"Y Deldjoo","year":"2019","unstructured":"Deldjoo, Y., et al.: Movie genome: alleviating new item cold start in movie recommendation. User Model. User-Adap. Inter. 29(2), 291\u2013343 (2019). https:\/\/doi.org\/10.1007\/s11257-019-09221-y","journal-title":"User Model. User-Adap. Inter."},{"key":"18_CR15","unstructured":"Deldjoo, Y., Di Noia, T., Merra, F.A.: Assessing the impact of a user-item collaborative attack on class of users. In: ImpactRS@RecSys. CEUR Workshop Proceedings, vol. 2462. CEUR-WS.org (2019)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-319-93417-4_9","volume-title":"The Semantic Web","author":"T Di Noia","year":"2018","unstructured":"Di Noia, T., Magarelli, C., Maurino, A., Palmonari, M., Rula, A.: Using ontology-based data summarization to develop semantics-aware recommender systems. In: Gangemi, A., et al. (eds.) ESWC 2018. LNCS, vol. 10843, pp. 128\u2013144. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93417-4_9"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Di Noia, T., Mirizzi, R., Ostuni, V.C., Romito, D., Zanker, M.: Linked open data to support content-based recommender systems. In: Proceedings of the 8th International Conference on Semantic Systems, pp. 1\u20138. ACM (2012)","DOI":"10.1145\/2362499.2362501"},{"issue":"1","key":"18_CR18","first-page":"9:1","volume":"8","author":"T Di Noia","year":"2016","unstructured":"Di Noia, T., Ostuni, V.C., Tomeo, P., Di Sciascio, E.: SPrank: semantic path-based ranking for top-N recommendations using linked open data. ACM TIST 8(1), 9:1\u20139:34 (2016)","journal-title":"ACM TIST"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Gao, L., Yang, H., Wu, J., Zhou, C., Lu, W., Hu, Y.: Recommendation with multi-source heterogeneous information. In: IJCAI, pp. 3378\u20133384. ijcai.org (2018)","DOI":"10.24963\/ijcai.2018\/469"},{"issue":"4","key":"18_CR20","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","volume":"42","author":"I Gunes","year":"2012","unstructured":"Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. 42(4), 767\u2013799 (2012). https:\/\/doi.org\/10.1007\/s10462-012-9364-9","journal-title":"Artif. Intell. Rev."},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-030-21348-0_12","volume-title":"The Semantic Web","author":"M Hildebrandt","year":"2019","unstructured":"Hildebrandt, M., et al.: A recommender system for complex real-world applications with nonlinear dependencies and knowledge graph context. In: Hitzler, P., et al. (eds.) ESWC 2019. LNCS, vol. 11503, pp. 179\u2013193. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21348-0_12"},{"key":"18_CR22","unstructured":"Hug, N.: Surprise, a Python library for recommender systems (2017). http:\/\/surpriselib.com"},{"issue":"1","key":"18_CR23","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/1644873.1644874","volume":"4","author":"Y Koren","year":"2010","unstructured":"Koren, Y.: Factor in the neighbors: scalable and accurate collaborative filtering. TKDD 4(1), 1:1\u20131:24 (2010)","journal-title":"TKDD"},{"issue":"8","key":"18_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren, Y., Bell, R.M., Volinsky, C.: Matrix factorization techniques for recommender systems. IEEE Comput. 42(8), 30\u201337 (2009)","journal-title":"IEEE Comput."},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: WWW, pp. 393\u2013402. ACM (2004)","DOI":"10.1145\/988672.988726"},{"issue":"1","key":"18_CR26","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G Linden","year":"2003","unstructured":"Linden, G., Smith, B., York, J.: Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Comput. 7(1), 76\u201380 (2003)","journal-title":"IEEE Internet Comput."},{"key":"18_CR27","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of the WebKDD Workshop, pp. 13\u201323. Citeseer (2005)"},{"issue":"4","key":"18_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher, B., Burke, R.D., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. 7(4), 23 (2007)","journal-title":"ACM Trans. Internet Technol."},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Ning, X., Karypis, G.: Sparse linear methods with side information for top-n recommendations. In: Cunningham, P., Hurley, N.J., Guy, I., Anand, S.S. (eds.) Sixth ACM Conference on Recommender Systems, RecSys 2012, Dublin, Ireland, 9\u201313 September 2012, pp. 155\u2013162. ACM (2012)","DOI":"10.1145\/2365952.2365983"},{"issue":"4","key":"18_CR30","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"MP O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony, M.P., Hurley, N.J., Kushmerick, N., Silvestre, G.C.M.: Collaborative recommendation: a robustness analysis. ACM Trans. Internet Technol. 4(4), 344\u2013377 (2004)","journal-title":"ACM Trans. Internet Technol."},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Paulheim, H., F\u00fcrnkranz, J.: Unsupervised generation of data mining features from linked open data. In: WIMS, pp. 31:1\u201331:12. ACM (2012)","DOI":"10.1145\/2254129.2254168"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: GroupLens: an open architecture for collaborative filtering of netnews. In: CSCW, pp. 175\u2013186. ACM (1994)","DOI":"10.1145\/192844.192905"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Shen, V.Y., Saito, N., Lyu, M.R., Zurko, M.E. (eds.) Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, 1\u20135 May 2001, pp. 285\u2013295. ACM (2001)","DOI":"10.1145\/371920.372071"},{"issue":"3","key":"18_CR34","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIS.2012.23","volume":"27","author":"N Shadbolt","year":"2012","unstructured":"Shadbolt, N., et al.: Linked open government data: lessons from data.gov.uk. IEEE Intell. Syst. 27(3), 16\u201324 (2012)","journal-title":"IEEE Intell. Syst."},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, F., Xie, X., Guo, M.: DKN: deep knowledge-aware network for news recommendation. In: WWW, pp. 1835\u20131844. ACM (2018)","DOI":"10.1145\/3178876.3186175"},{"key":"18_CR36","doi-asserted-by":"publisher","first-page":"5329","DOI":"10.1609\/aaai.v33i01.33015329","volume":"33","author":"Xiang Wang","year":"2019","unstructured":"Wang, X., Wang, D., Xu, C., He, X., Cao, Y., Chua, T.S.: Explainable reasoning over knowledge graphs for recommendation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 5329\u20135336 (2019)","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Yu, X., et al.: Personalized entity recommendation: a heterogeneous information network approach. In: WSDM, pp. 283\u2013292. ACM (2014)","DOI":"10.1145\/2556195.2556259"},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.neucom.2015.12.137","volume":"210","author":"W Zhou","year":"2016","unstructured":"Zhou, W., Wen, J., Xiong, Q., Gao, M., Zeng, J.: SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing 210, 197\u2013205 (2016)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49461-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T22:02:58Z","timestamp":1748296978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49461-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494605","9783030494612"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49461-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"27 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESWC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Semantic Web Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion, Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esws2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.eswc-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"166","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Authors could choose to opt in or opt out of being known by the reviewers (i.e., submissions could be anonymous) while reviewers could choose to opt in or opt out of being known by the authors (i.e., reviews could be anonymous). The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}