{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:01:17Z","timestamp":1775815277554,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274706","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"381-392","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":170,"title":["Poisoning Attacks to Graph-Based Recommender Systems"],"prefix":"10.1145","author":[{"given":"Minghong","family":"Fang","sequence":"first","affiliation":[{"name":"Iowa State University"}]},{"given":"Guolei","family":"Yang","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Iowa State University"}]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"Iowa State University"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Cambridge Analytica. https:\/\/www.theguardian.com\/technology\/2018\/mar\/17\/facebook-cambridge-analytica-kogan-data-algorithm  2018. Cambridge Analytica. https:\/\/www.theguardian.com\/technology\/2018\/mar\/17\/facebook-cambridge-analytica-kogan-data-algorithm"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Instant Video Dataset. 2018. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/  Amazon Instant Video Dataset. 2018. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935914"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864770"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.46"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security Symposium.","author":"Gong Neil Zhenqiang","year":"2016","unstructured":"Neil Zhenqiang Gong and Bin Liu . 2016 . You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors . In USENIX Security Symposium. Neil Zhenqiang Gong and Bin Liu. 2016. You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors. In USENIX Security Symposium."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154793"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594455"},{"key":"e_1_3_2_1_12_1","unstructured":"Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. A Graph-based Push Service Platform. In DASFAA.  Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. A Graph-based Push Service Platform. In DASFAA."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363858"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium.","author":"Jia Jinyuan","year":"2018","unstructured":"Jinyuan Jia and Neil Zhenqiang Gong . 2018 . AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning . In USENIX Security Symposium. Jinyuan Jia and Neil Zhenqiang Gong. 2018. AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_18_1","volume-title":"Private traits and attributes are predictable from digital records of human behavior. PNAS","author":"Kosinski Michal","year":"2013","unstructured":"Michal Kosinski , David Stillwell , and Thore Graepel . 2013. Private traits and attributes are predictable from digital records of human behavior. PNAS ( 2013 ). Michal Kosinski, David Stillwell, and Thore Graepel. 2013. Private traits and attributes are predictable from digital records of human behavior. PNAS (2013)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_20_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NIPS.   Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NIPS."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345169"},{"key":"e_1_3_2_1_23_1","unstructured":"MovieLens Dataset. 2018. https:\/\/grouplens.org\/datasets\/movielens\/  MovieLens Dataset. 2018. https:\/\/grouplens.org\/datasets\/movielens\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"e_1_3_2_1_25_1","unstructured":"Thomas Pinckney. 2013a. Graph-based Recommendation Systems at eBay. https:\/\/www.youtube.com\/watch?t=2400&v=Tg3dP2fZGSM  Thomas Pinckney. 2013a. Graph-based Recommendation Systems at eBay. https:\/\/www.youtube.com\/watch?t=2400&v=Tg3dP2fZGSM"},{"key":"e_1_3_2_1_26_1","volume-title":"Planet Cassandra: Graph Based Recommendation Systems at eBay","author":"Pinckney Thomas","year":"2013","unstructured":"Thomas Pinckney . 2013 b. Planet Cassandra: Graph Based Recommendation Systems at eBay . http:\/\/www.slideshare.net\/planetcassandra\/e-bay-nyc Thomas Pinckney. 2013b. Planet Cassandra: Graph Based Recommendation Systems at eBay. http:\/\/www.slideshare.net\/planetcassandra\/e-bay-nyc"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_28_1","volume-title":"EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In Usenix Security.","author":"Stringhini Gianluca","year":"2015","unstructured":"Gianluca Stringhini , Pierre Mourlanne , Gregoire Jacob , Manuel Egele , Christopher Kruegel , and Giovanni Vigna . 2015 . EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In Usenix Security. Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In Usenix Security."},{"key":"e_1_3_2_1_29_1","volume-title":"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium.","author":"Thomas Kurt","year":"2013","unstructured":"Kurt Thomas , Damon McCoy , Chris Grier , Alek Kolcz , and Vern Paxson . 2013 . Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium. Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"Neil Zhenqiang Gong, and Hao Fu","author":"Wang Binghui","year":"2017","unstructured":"Binghui Wang , Neil Zhenqiang Gong, and Hao Fu . 2017 . GANG : Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs. In IEEE ICDM. Binghui Wang, Neil Zhenqiang Gong, and Hao Fu. 2017. GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs. In IEEE ICDM."},{"key":"e_1_3_2_1_31_1","volume-title":"Structure-based Sybil Detection in Social Networks via Local Rule-based Propagation","author":"Wang Binghui","year":"2018","unstructured":"Binghui Wang , Jinyuan Jia , Le Zhang , and Neil Zhenqiang Gong . 2018. Structure-based Sybil Detection in Social Networks via Local Rule-based Propagation . IEEE TNSE ( 2018 ). Binghui Wang, Jinyuan Jia, Le Zhang, and Neil Zhenqiang Gong. 2018. Structure-based Sybil Detection in Social Networks via Local Rule-based Propagation. IEEE TNSE (2018)."},{"key":"e_1_3_2_1_32_1","unstructured":"Gang Wang Tristan Konolige Christo Wilson and Xiao Wang. 2013. You are How You Click: Clickstream Analysis for Sybil Detection. In Usenix Security.   Gang Wang Tristan Konolige Christo Wilson and Xiao Wang. 2013. You are How You Click: Clickstream Analysis for Sybil Detection. In Usenix Security."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365989"},{"key":"e_1_3_2_1_34_1","unstructured":"Xinyu Xing Wei Meng Dan Doozan Alex C Snoeren Nick Feamster and Wenke Lee. 2013. Take This Personally: Pollution Attacks on Personalized Services. In USENIX Security. 671--686.   Xinyu Xing Wei Meng Dan Doozan Alex C Snoeren Nick Feamster and Wenke Lee. 2013. Take This Personally: Pollution Attacks on Personalized Services. In USENIX Security. 671--686."},{"key":"e_1_3_2_1_35_1","volume-title":"Neil Zhenqiang Gong, and Ying Cai","author":"Yang Guolei","year":"2017","unstructured":"Guolei Yang , Neil Zhenqiang Gong, and Ying Cai . 2017 . Fake Co-visitation Injection Attacks to Recommender Systems. In NDSS. Guolei Yang, Neil Zhenqiang Gong, and Ying Cai. 2017. Fake Co-visitation Injection Attacks to Recommender Systems. In NDSS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_37_1","volume-title":"Felten","author":"Zeller William","year":"2008","unstructured":"William Zeller and Edward W . Felten . 2008 . Cross-Site Request Forgeries: Exploitation and Prevention. Technical Report. Princeton University . William Zeller and Edward W. Felten. 2008. Cross-Site Request Forgeries: Exploitation and Prevention. Technical Report. Princeton University."}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA","acronym":"ACSAC '18","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274706"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":37,"alternative-id":["10.1145\/3274694.3274706","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274706","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}