{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T04:16:49Z","timestamp":1774412209513,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972328"],"award-info":[{"award-number":["61972328"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba Group through Alibaba Innovative Research Program"},{"name":"Joint Innovation Research Program of Fujian Province of China","award":["2020R0130"],"award-info":[{"award-number":["2020R0130"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002303"],"award-info":[{"award-number":["62002303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province of China","doi-asserted-by":"publisher","award":["2020J05001"],"award-info":[{"award-number":["2020J05001"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"China Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["20720210098"],"award-info":[{"award-number":["20720210098"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tnnls.2022.3183210","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T19:34:37Z","timestamp":1656099277000},"page":"1305-1319","source":"Crossref","is-referenced-by-count":45,"title":["Shilling Black-Box Recommender Systems by Learning to Generate Fake User Profiles"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2275-997X","authenticated-orcid":false,"given":"Chen","family":"Lin","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"given":"Si","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6216-3970","authenticated-orcid":false,"given":"Meifang","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"given":"Sheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0127-7477","authenticated-orcid":false,"given":"Min","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9139-3855","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-29659-3","volume-title":"Recommender Systems\u2014The Textbook","author":"Aggarwal","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2556270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3439729"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1360\/N112017-00112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"ref7","first-page":"1885","article-title":"Data poisoning attacks on factorization-based collaborative filtering","volume-title":"Proc. NIPS","author":"Li"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358116"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"ref10","first-page":"671","article-title":"Take this personally: Pollution attacks on personalized services","volume-title":"Proc. USENIX Secur. Symp.","author":"Xing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"issue":"2","key":"ref13","first-page":"3","article-title":"A survey of collaborative recommendation and the robustness of model-based algorithms","volume":"31","author":"Sandvig","year":"2008","journal-title":"IEEE Data Eng. Bull."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref17","article-title":"Adversarial recommendation: Attack of the learned fake users","author":"Christakopoulou","year":"2018","journal-title":"arXiv:1809.08336"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"ref21","first-page":"17","article-title":"Limited knowledge shilling attacks in collaborative filtering systems","volume-title":"Proc. ITWP@IJCAI","author":"Burke"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3158369"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411884"},{"key":"ref25","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. NIPS","author":"Goodfellow"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3145690"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109900"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412263"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512111"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3036164"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357919"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467408"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16533"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3374217"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41822-8_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3301282"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2907430"},{"key":"ref43","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015","journal-title":"arXiv:1511.06434"},{"key":"ref44","article-title":"Wasserstein GAN","author":"Arjovsky","year":"2017","journal-title":"arXiv:1701.07875"},{"key":"ref45","article-title":"Generating natural adversarial examples","author":"Zhao","year":"2018","journal-title":"arXiv:1710.11342"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref47","first-page":"334","article-title":"Recommender systems: Attack types and strategies","volume-title":"Proc. AAAI","author":"OMahony"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507220"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645722"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"ref53","article-title":"A heaviside function approximation for neural network binary classification","author":"Tsoi","year":"2020","journal-title":"arXiv:2009.01367"},{"key":"ref54","first-page":"5767","article-title":"Improved training of Wasserstein GANs","volume-title":"Proc. NIPS","author":"Gulrajani"},{"key":"ref55","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2015","journal-title":"arXiv:1412.6980"},{"key":"ref56","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","volume-title":"Proc. NIPS","author":"Lee"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.43"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742726"},{"key":"ref60","first-page":"2408","article-title":"Catch the black sheep: Unified framework for shilling attack detection based on fraudulent action propagation","volume-title":"Proc. IJCAI","author":"Zhang"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-011-0841-3"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10381493\/09806457.pdf?arnumber=9806457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:01:48Z","timestamp":1705024908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9806457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":62,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2022.3183210","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}