{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T01:00:00Z","timestamp":1773450000447,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380072","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"3019-3025","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["Influence Function based Data Poisoning Attacks to Top-N Recommender Systems"],"prefix":"10.1145","author":[{"given":"Minghong","family":"Fang","sequence":"first","affiliation":[{"name":"Iowa State University"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"Iowa State University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[\n  1\n  ]  Amazon Digital Music Dataset.2018. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/  [1] Amazon Digital Music Dataset.2018. http:\/\/jmcauley.ucsd.edu\/data\/amazon\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935914"},{"key":"e_1_3_2_1_3_1","volume-title":"Linear Programming and Network Flows(4 ed.)","author":"Bazaraa S."},{"key":"e_1_3_2_1_4_1","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. In ICML.  Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. In ICML."},{"key":"e_1_3_2_1_5_1","unstructured":"Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. In arxiv.  Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. In arxiv."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1980.10486199"},{"key":"e_1_3_2_1_9_1","volume-title":"Usenix Security Symposium.","author":"Fang Minghong","year":"2020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_11_1","volume-title":"BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In Machine Learning and Computer Security Workshop.","author":"Gu Tianyu","year":"2017"},{"key":"e_1_3_2_1_12_1","volume-title":"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning","author":"Jagielski Matthew"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_14_1","unstructured":"Pang\u00a0Wei Koh Kai-Siang Ang Hubert\u00a0HK Teo and Percy Liang. 2019. On the Accuracy of Influence Functions for Measuring Group Effects. In Advances in Neural Information Processing Systems (NeurIPS).  Pang\u00a0Wei Koh Kai-Siang Ang Hubert\u00a0HK Teo and Percy Liang. 2019. On the Accuracy of Influence Functions for Measuring Group Effects. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Machine Learning (ICML). 1885\u20131894","author":"Koh Pang\u00a0Wei","year":"2017"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix Factorization Techniques for Recommender Systems. Computer8(2009) 30\u201337.  Yehuda Koren Robert Bell and Chris Volinsky. 2009. Matrix Factorization Techniques for Recommender Systems. Computer8(2009) 30\u201337.","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_18_1","unstructured":"Agata Lapedriza Hamed Pirsiavash Zoya Bylinskii and Antonio Torralba. 2013. Are All Training Examples Equally Valuable?arXiv preprint arXiv:1311.6510(2013).  Agata Lapedriza Hamed Pirsiavash Zoya Bylinskii and Antonio Torralba. 2013. Are All Training Examples Equally Valuable?arXiv preprint arXiv:1311.6510(2013)."},{"key":"e_1_3_2_1_19_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In Advances in Neural Information Processing Systems (NeurIPS). 1885\u20131893.  Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In Advances in Neural Information Processing Systems (NeurIPS). 1885\u20131893."},{"key":"e_1_3_2_1_20_1","unstructured":"Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai Weihang Wang and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In NDSS.  Yingqi Liu Shiqing Ma Yousra Aafer Wen-Chuan Lee Juan Zhai Weihang Wang and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In NDSS."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390350"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the WebKDD Workshop. Citeseer, 13\u201323","author":"Mobasher Bamshad","year":"2005"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Bamshad Mobasher Robin Burke Runa Bhaumik and Chad Williams. 2007. Toward Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness. In ACM Transactions on Internet Technology (TOIT) Vol.\u00a07. ACM 23.  Bamshad Mobasher Robin Burke Runa Bhaumik and Chad Williams. 2007. Toward Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness. In ACM Transactions on Internet Technology (TOIT) Vol.\u00a07. ACM 23.","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_25_1","unstructured":"B. Nelson M. Barreno F.\u00a0J. Chi A.\u00a0D. Joseph B.\u00a0I.\u00a0P. Rubinstein U. Saini C. Sutton J.\u00a0D. Tygar and K. Xia.2008. Exploiting machine learning to subvert your spam filter. In LEET.  B. Nelson M. Barreno F.\u00a0J. Chi A.\u00a0D. Joseph B.\u00a0I.\u00a0P. Rubinstein U. Saini C. Sutton J.\u00a0D. Tygar and K. Xia.2008. Exploiting machine learning to subvert your spam filter. In LEET."},{"key":"e_1_3_2_1_26_1","volume-title":"An Analysis Of Approximations For Maximizing Submodular Set Functions\u2014I. Mathematical programming 14, 1","author":"Nemhauser L","year":"1978"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Benjamin\u00a0IP Rubinstein Blaine Nelson Ling Huang Anthony\u00a0D Joseph Shing-hon Lau Satish Rao Nina Taft and JD Tygar. 2009. Antidote: understanding and defending against poisoning of anomaly detectors. In ACM IMC.  Benjamin\u00a0IP Rubinstein Blaine Nelson Ling Huang Anthony\u00a0D Joseph Shing-hon Lau Satish Rao Nina Taft and JD Tygar. 2009. Antidote: understanding and defending against poisoning of anomaly detectors. In ACM IMC.","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645722"},{"key":"e_1_3_2_1_29_1","unstructured":"Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS). 6103\u20136113.  Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS). 6103\u20136113."},{"key":"e_1_3_2_1_30_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 3\u201318","author":"Shokri Reza","year":"2017"},{"key":"e_1_3_2_1_31_1","volume-title":"Stealing Hyperparameters in Machine Learning. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 36\u201352","author":"Wang Binghui","year":"2018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang and Neil\u00a0Zhenqiang Gong. 2019. Attacking Graph-based Classification via Manipulating the Graph Structure. In CCS.  Binghui Wang and Neil\u00a0Zhenqiang Gong. 2019. Attacking Graph-based Classification via Manipulating the Graph Structure. In CCS.","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_1_33_1","volume-title":"Data Dropout: Optimizing Training Data for Convolutional Neural Networks. In 2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 39\u201346","author":"Wang Tianyang","year":"2018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507220"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Machine Learning (ICML). 1689\u20131698","author":"Xiao Huang","year":"2015"},{"key":"e_1_3_2_1_36_1","unstructured":"Han Xiao Huang Xiao and Claudia Eckert. 2012. Adversarial Label Flips Attack on Support Vector Machines. In ECAI.  Han Xiao Huang Xiao and Claudia Eckert. 2012. Adversarial Label Flips Attack on Support Vector Machines. In ECAI."},{"key":"e_1_3_2_1_37_1","volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 671\u2013686.","author":"Xing Xingyu"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Guolei Yang Neil\u00a0Zhenqiang Gong and Ying Cai. 2017. Fake Co-visitation Injection Attacks to Recommender Systems. In NDSS.  Guolei Yang Neil\u00a0Zhenqiang Gong and Ying Cai. 2017. Fake Co-visitation Injection Attacks to Recommender Systems. In NDSS.","DOI":"10.14722\/ndss.2017.23020"},{"key":"e_1_3_2_1_39_1","volume-title":"Byzantine-Resilient Stochastic Gradient Descent for Distributed Learning: A Lipschitz-Inspired Coordinate-wise Median Approach. In Conference on Decision and Control (CDC).","author":"Yang Haibo","year":"2019"},{"key":"e_1_3_2_1_40_1","unstructured":"[\n  40\n  ]  Yelp Challenge Dataset.2018. https:\/\/www.yelp.com\/dataset\/challenge  [40] Yelp Challenge Dataset.2018. https:\/\/www.yelp.com\/dataset\/challenge"},{"key":"e_1_3_2_1_41_1","volume-title":"Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning (ICML).","author":"Yin Dong","year":"2018"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Xin Zhang Minghong Fang Jia Liu and Zhengyuan Zhu. 2020. Private and Communication-Efficient Edge Learning: A Sparse Differential Gaussian-Masking Distributed SGD Approach. arXiv preprint arXiv:2001.03836(2020).  Xin Zhang Minghong Fang Jia Liu and Zhengyuan Zhu. 2020. Private and Communication-Efficient Edge Learning: A Sparse Differential Gaussian-Masking Distributed SGD Approach. arXiv preprint arXiv:2001.03836(2020).","DOI":"10.1145\/3397166.3409123"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:16Z","timestamp":1750199596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":43,"alternative-id":["10.1145\/3366423.3380072","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380072","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}