{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:45:46Z","timestamp":1770137146792,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557189","type":"print"},{"value":"9789819557196","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5719-6_37","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:33:39Z","timestamp":1769718819000},"page":"581-595","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Shilling Attacks on\u00a0GNN-Based Recommender Systems with\u00a0Graph Contrastive Learning"],"prefix":"10.1007","author":[{"given":"Qixin","family":"Guan","sequence":"first","affiliation":[]},{"given":"Shunmei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Davidson, J., et\u00a0al.: The youtube video recommendation system. In: Proceedings of the Fourth ACM Conference on Recommender Systems, pp. 293\u2013296 (2010)","DOI":"10.1145\/1864708.1864770"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Du, L., et al.: Parl: poisoning attacks against reinforcement learning-based recommender systems. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1331\u20131344 (2024)","DOI":"10.1145\/3634737.3637660"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Fang, M., Yang, G., Gong, N.Z., Liu, J.: Poisoning attacks to graph-based recommender systems. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 381\u2013392 (2018)","DOI":"10.1145\/3274694.3274706"},{"issue":"1","key":"37_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3568022","volume":"1","author":"C Gao","year":"2023","unstructured":"Gao, C., et al.: A survey of graph neural networks for recommender systems: challenges, methods, and directions. ACM Trans. Recommender Syst. 1(1), 1\u201351 (2023)","journal-title":"ACM Trans. Recommender Syst."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Guo, S., Bai, T., Deng, W.: Targeted shilling attacks on gnn-based recommender systems. In: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, pp. 649\u2013658 (2023)","DOI":"10.1145\/3583780.3615073"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"He, X., Deng, K., Wang, X., Li, Y., Zhang, Y., Wang, M.: Lightgcn: simplifying and powering graph convolution network for recommendation. In: Proceedings of the 43rd International ACM SIGIR conference on Research and Development in Information Retrieval, pp. 639\u2013648 (2020)","DOI":"10.1145\/3397271.3401063"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"He, X., Liao, L., Zhang, H., Nie, L., Hu, X., Chua, T.S.: Neural collaborative filtering. In: Proceedings of the 26th International Conference on World Wide Web, pp. 173\u2013182 (2017)","DOI":"10.1145\/3038912.3052569"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Hu, Y., Koren, Y., Volinsky, C.: Collaborative filtering for implicit feedback datasets. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 263\u2013272. Ieee (2008)","DOI":"10.1109\/ICDM.2008.22"},{"key":"37_CR9","unstructured":"Ibrahim, O.A.S., Younis, E.M., Mohamed, E.A., Ismail, W.N.: Revisiting recommender systems: an investigative survey. Neural Comput. Appli., 1\u201329 (2025)"},{"issue":"8","key":"37_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(8), 30\u201337 (2009)","journal-title":"Computer"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web, pp. 393\u2013402 (2004)","DOI":"10.1145\/988672.988726"},{"key":"37_CR12","unstructured":"Li, B., Wang, Y., Singh, A., Vorobeychik, Y.: Data poisoning attacks on factorization-based collaborative filtering. Adv. Neural Inform. Process. Syst. 29 (2016)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Lin, C., Chen, S., Li, H., Xiao, Y., Li, L., Yang, Q.: Attacking recommender systems with augmented user profiles. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 855\u2013864 (2020)","DOI":"10.1145\/3340531.3411884"},{"issue":"1","key":"37_CR14","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/TNNLS.2022.3183210","volume":"35","author":"C Lin","year":"2022","unstructured":"Lin, C., Chen, S., Zeng, M., Zhang, S., Gao, M., Li, H.: Shilling black-box recommender systems by learning to generate fake user profiles. IEEE Trans. Neural Netw. Learn. Syst. 35(1), 1305\u20131319 (2022)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"5","key":"37_CR15","doi-asserted-by":"publisher","first-page":"3399","DOI":"10.1007\/s00521-024-10798-8","volume":"37","author":"S Liu","year":"2025","unstructured":"Liu, S., Yu, S., Li, H., Yang, Z., Duan, M., Liao, X.: A novel shilling attack on black-box recommendation systems for multiple targets. Neural Comput. Appl. 37(5), 3399\u20133417 (2025)","journal-title":"Neural Comput. Appl."},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans. Internet Techno. (TOIT) 7(4), 23\u2013es (2007)","DOI":"10.1145\/1278366.1278372"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Nawara, D., Aly, A., Kashef, R.: Shilling attacks and fake reviews injection: principles, models, and datasets. IEEE Trans. Comput. Soc. Syst. (2024)","DOI":"10.1109\/TCSS.2024.3465008"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., et al.: Manipulating recommender systems: a survey of poisoning attacks and countermeasures. ACM Comput. Surv.57(1), 1\u201339 (2024)","DOI":"10.1145\/3677328"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen\u00a0Thanh, T., et al.: Poisoning gnn-based recommender systems with generative surrogate-based attacks. ACM Trans. Inform. Syst. 41(3), 1\u201324 (2023)","DOI":"10.1145\/3567420"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web, pp. 285\u2013295 (2001)","DOI":"10.1145\/371920.372071"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Wang, X., He, X., Wang, M., Feng, F., Chua, T.S.: Neural graph collaborative filtering. In: Proceedings of the 42nd international ACM SIGIR conference on Research and development in Information Retrieval, pp. 165\u2013174 (2019)","DOI":"10.1145\/3331184.3331267"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yu, J., Gao, M., Yin, H., Cui, B., Sadiq, S.: Unveiling vulnerabilities of contrastive recommender systems to poisoning attacks. In: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3311\u20133322 (2024)","DOI":"10.1145\/3637528.3671795"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Yu, J., Yin, H., Xia, X., Chen, T., Cui, L., Nguyen, Q.V.H.: Are graph augmentations necessary? simple graph contrastive learning for recommendation. In: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1294\u20131303 (2022)","DOI":"10.1145\/3477495.3531937"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"79358","DOI":"10.1109\/ACCESS.2023.3289404","volume":"11","author":"RA Zayed","year":"2023","unstructured":"Zayed, R.A., Ibrahim, L.F., Hefny, H.A., Salman, H.A., AlMohimeed, A.: Experimental and theoretical study for the popular shilling attacks detection methods in collaborative recommender system. IEEE Access 11, 79358\u201379369 (2023)","journal-title":"IEEE Access"},{"issue":"6","key":"37_CR25","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.3233\/IDA-230575","volume":"28","author":"F Zhang","year":"2024","unstructured":"Zhang, F., Chan, P.P., He, Z.M., Yeung, D.S.: Unsupervised contaminated user profile identification against shilling attack in recommender system. Intell. Data Analy. 28(6), 1411\u20131426 (2024)","journal-title":"Intell. Data Analy."},{"issue":"5","key":"37_CR26","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/s10489-025-06254-2","volume":"55","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Hao, Q., Zheng, W., Xiao, Y.: User similarity-based graph convolutional neural network for shilling attack detection. Appl. Intell. 55(5), 340 (2025)","journal-title":"Appl. Intell."}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5719-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:33:45Z","timestamp":1769718825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5719-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557189","9789819557196"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5719-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2025.sau.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}