{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:03:42Z","timestamp":1753887822124,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1145\/3383313.3411447","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:28:21Z","timestamp":1600482501000},"page":"738-741","source":"Crossref","is-referenced-by-count":6,"title":["Adversarial Learning for Recommendation: Applications for Security and Generative Tasks \u2014 Concept to Code"],"prefix":"10.1145","author":[{"given":"Vito Walter","family":"Anelli","sequence":"first","affiliation":[{"name":"Polytechnic University of Bari, Italy"}]},{"given":"Yashar","family":"Deldjoo","sequence":"additional","affiliation":[{"name":"SisInf Lab Department of Electrical Engineering and Information Technology Polytechnic University of Bari, Italy"}]},{"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bari, Italy"}]},{"given":"Felice Antonio","family":"Merra","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49461-2_18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240383"},{"volume-title":"Robust Collaborative Recommendation","author":"Burke Robin","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Dong-Kyu Chae Jin-Soo Kang Sang-Wook Kim and Jaeho Choi. 2019. Rating Augmentation with Generative Adversarial Networks towards Accurate Collaborative Filtering. In WWW. ACM 2616\u20132622.  Dong-Kyu Chae Jin-Soo Kang Sang-Wook Kim and Jaeho Choi. 2019. Rating Augmentation with Generative Adversarial Networks towards Accurate Collaborative Filtering. In WWW. ACM 2616\u20132622.","DOI":"10.1145\/3308558.3313413"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271743"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Huiyuan Chen and Jing Li. 2019. Adversarial tensor factorization for context-aware recommendation. In RecSys. ACM 363\u2013367.  Huiyuan Chen and Jing Li. 2019. Adversarial tensor factorization for context-aware recommendation. In RecSys. ACM 363\u2013367.","DOI":"10.1145\/3298689.3346987"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401046"},{"volume-title":"Proceedings of the 1st Workshop on the Impact of Recommender Systems co-located with 13th ACM Conference on Recommender Systems, ImpactRS@RecSys","year":"2019","author":"Deldjoo Yashar","key":"e_1_3_2_1_8_1"},{"volume-title":"The Thirteenth ACM International Conference on Web Search and Data Mining","year":"2020","author":"Deldjoo Yashar","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Yashar Deldjoo Tommaso\u00a0Di Noia and Felice\u00a0Antonio Merra. 2020. Adversarial Machine Learning in Recommender Systems: State of the art and Challenges. CoRR abs\/2005.10322(2020). arxiv:2005.10322https:\/\/arxiv.org\/abs\/2005.10322  Yashar Deldjoo Tommaso\u00a0Di Noia and Felice\u00a0Antonio Merra. 2020. Adversarial Machine Learning in Recommender Systems: State of the art and Challenges. CoRR abs\/2005.10322(2020). arxiv:2005.10322https:\/\/arxiv.org\/abs\/2005.10322"},{"volume-title":"Recommender Systems Leveraging Multimedia Content. Comput. Surveys","year":"2020","author":"Deldjoo Yashar","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2887018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/187"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_17_1","unstructured":"Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. ACM 355\u2013364.  Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. ACM 355\u2013364."},{"volume-title":"Recommender systems handbook","author":"Koren Yehuda","key":"e_1_3_2_1_18_1"},{"volume-title":"Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016","year":"2016","author":"Li Bo","key":"e_1_3_2_1_19_1"},{"volume-title":"UAI 2009, Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, Montreal, QC","year":"2009","author":"Rendle Steffen","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/286013.286035"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556270"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"J. Tang X. Du X. He F. Yuan Q. Tian and T. Chua. 2019. Adversarial Training Towards Robust Multimedia Recommender System. IEEE Transactions on Knowledge and Data Engineering (2019) 1\u20131. https:\/\/doi.org\/10.1109\/TKDE.2019.2893638  J. Tang X. Du X. He F. Yuan Q. Tian and T. Chua. 2019. Adversarial Training Towards Robust Multimedia Recommender System. IEEE Transactions on Knowledge and Data Engineering (2019) 1\u20131. https:\/\/doi.org\/10.1109\/TKDE.2019.2893638","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080786"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Qinyong Wang Hongzhi Yin Zhiting Hu Defu Lian Hao Wang and Zi Huang. 2018. Neural Memory Streaming Recommender Networks with Adversarial Training. In KDD. ACM 2467\u20132475.  Qinyong Wang Hongzhi Yin Zhiting Hu Defu Lian Hao Wang and Zi Huang. 2018. Neural Memory Streaming Recommender Networks with Adversarial Training. In KDD. ACM 2467\u20132475.","DOI":"10.1145\/3219819.3220004"},{"volume-title":"Adversarial Collaborative Auto-encoder for Top-N Recommendation. In International Joint Conference on Neural Networks, IJCNN 2019 Budapest","year":"2019","author":"Yuan Feng","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3379992"},{"volume-title":"PLASTIC: Prioritize Long and Short-term Information in Top-n Recommendation using Adversarial Training. In IJCAI. ijcai.org, 3676\u20133682.","year":"2018","author":"Zhao Wei","key":"e_1_3_2_1_28_1"}],"event":{"name":"RecSys '20: Fourteenth ACM Conference on Recommender Systems","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGecom Special Interest Group on Economics and Computation"],"location":"Virtual Event Brazil","acronym":"RecSys '20"},"container-title":["Fourteenth ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383313.3411447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383313.3411447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:02Z","timestamp":1750197722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383313.3411447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":28,"alternative-id":["10.1145\/3383313.3411447","10.1145\/3383313"],"URL":"https:\/\/doi.org\/10.1145\/3383313.3411447","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]}}}