{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:29:39Z","timestamp":1755797379757,"version":"3.44.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/bigdata59044.2023.10386799","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T13:28:47Z","timestamp":1705930127000},"page":"1299-1307","source":"Crossref","is-referenced-by-count":0,"title":["Improving Adversarially Robust Sequential Recommendation through Generalizable Perturbations"],"prefix":"10.1109","author":[{"given":"Xun","family":"Yao","sequence":"first","affiliation":[{"name":"Wuhan Textile University,China"}]},{"given":"Ruyi","family":"He","sequence":"additional","affiliation":[{"name":"Wuhan Textile University,China"}]},{"given":"Xinrong","family":"Hu","sequence":"additional","affiliation":[{"name":"Wuhan Textile University,China"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Wollongong,Australia"}]},{"given":"Yi","family":"Guo","sequence":"additional","affiliation":[{"name":"Western Sydney University,Australia"}]},{"given":"Zijian","family":"Huang","sequence":"additional","affiliation":[{"name":"Wuhan Textile University,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271761"},{"key":"ref2","article-title":"Session-based recommendations with recurrent neural networks","author":"Hidasi","year":"2015","journal-title":"arXiv preprint arXiv:1511.06939"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018689"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159656"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132926"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482136"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357895"},{"article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"International Conference on Learning Representations","author":"Tram\u00e8r","key":"ref9"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"International Conference on Learning Representations","author":"Goodfellow","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546770"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.04.032"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-023-01214-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.08.021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105214"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2019.1625570"},{"key":"ref18","first-page":"114","article-title":"The douban online social media barometer and the chinese reception of korean popular culture flows","volume":"13","author":"Yecies","year":"2016","journal-title":"Participations: journal of audience and reception studies"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24525"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2687258"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23020"},{"key":"ref25","first-page":"671","article-title":"Take this personally: Pollution attacks on personalized services","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Xing"},{"key":"ref26","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv:1312.6199"},{"key":"ref27","article-title":"On the effectiveness of interval bound propagation for training verifiably robust models","author":"Gowal","year":"2018","journal-title":"arXiv preprint arXiv:1810.12715"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462855"},{"key":"ref29","article-title":"Learning adversary-resistant deep neural networks","author":"Wang","year":"2016","journal-title":"arXiv preprint arXiv:1612.01401"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"volume-title":"Music recommendation and discovery in the long tail","year":"2009","author":"Celma Herrada","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1018"}],"event":{"name":"2023 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2023,12,15]]},"location":"Sorrento, Italy","end":{"date-parts":[[2023,12,18]]}},"container-title":["2023 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385234\/10386078\/10386799.pdf?arnumber=10386799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:30:21Z","timestamp":1755545421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/bigdata59044.2023.10386799","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]}}}