{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:27:35Z","timestamp":1767706055741,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401046","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"951-960","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["How Dataset Characteristics Affect the Robustness of Collaborative Recommendation Models"],"prefix":"10.1145","author":[{"given":"Yashar","family":"Deldjoo","sequence":"first","affiliation":[{"name":"Polytechnic University of Bari, Bari, Italy"}]},{"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bari, Bari, Italy"}]},{"given":"Eugenio","family":"Di Sciascio","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bari, Bari, Italy"}]},{"given":"Felice Antonio","family":"Merra","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bari, Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151163.2151166"},{"volume-title":"Recommender Systems - The Textbook","author":"Aggarwal Charu C.","key":"e_1_3_2_2_3_1","unstructured":"Charu C. Aggarwal . 2016. Recommender Systems - The Textbook . Springer . Charu C. Aggarwal. 2016. Recommender Systems - The Textbook. Springer."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Mehmet Aktukmak Yasin Yilmaz and Ismail Uysal. 2019. Quick and accurate attack detection in recommender systems through user attributes. In RecSys. ACM 348--352.  Mehmet Aktukmak Yasin Yilmaz and Ismail Uysal. 2019. Quick and accurate attack detection in recommender systems through user attributes. In RecSys. ACM 348--352.","DOI":"10.1145\/3298689.3347050"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905862"},{"volume-title":"The long tail: Why the future of business is selling less of more","author":"Anderson Chris","key":"e_1_3_2_2_6_1","unstructured":"Chris Anderson . 2006. The long tail: Why the future of business is selling less of more . Hachette Books . Chris Anderson. 2006. The long tail: Why the future of business is selling less of more. Hachette Books."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49461-2_18"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/545151.545178"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Robin D. Burke. 2007. Hybrid Web Recommender Systems. In The Adaptive Web Methods and Strategies of Web Personalization. 377--408.  Robin D. Burke. 2007. Hybrid Web Recommender Systems. In The Adaptive Web Methods and Strategies of Web Personalization. 377--408.","DOI":"10.1007\/978-3-540-72079-9_12"},{"volume-title":"Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems","author":"Burke Robin D.","key":"e_1_3_2_2_10_1","unstructured":"Robin D. Burke , Bamshad Mobasher , Runa Bhaumik , and Chad Williams . 2005. Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems . In ICDM. IEEE Computer Society , 577--580. Robin D. Burke, Bamshad Mobasher, Runa Bhaumik, and Chad Williams. 2005. Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems. In ICDM. IEEE Computer Society, 577--580."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Paul-Alexandru Chirita Wolfgang Nejdl and Cristian Zamfir. 2005. Preventing shilling attacks in online recommender systems. In WIDM. ACM 67--74.  Paul-Alexandru Chirita Wolfgang Nejdl and Cristian Zamfir. 2005. Preventing shilling attacks in online recommender systems. In WIDM. ACM 67--74.","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864721"},{"key":"e_1_3_2_2_13_1","volume-title":"Cross-Domain Recommender Systems. In ICDM Workshops. IEEE Computer Society, 496--503","author":"Cremonesi Paolo","year":"2011","unstructured":"Paolo Cremonesi , Antonio Tripodi , and Roberto Turrin . 2011 . Cross-Domain Recommender Systems. In ICDM Workshops. IEEE Computer Society, 496--503 . Paolo Cremonesi, Antonio Tripodi, and Roberto Turrin. 2011. Cross-Domain Recommender Systems. In ICDM Workshops. IEEE Computer Society, 496--503."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_2_15_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Deldjoo Yashar","year":"2019","unstructured":"Yashar Deldjoo , Tommaso Di Noia, and Felice Antonio Merra . 2019 . Assessing the Impact of a User-Item Collaborative Attack on Class of Users. In ImpactRS@RecSys, Vol. 2462 . CEUR-WS. org. Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2019. Assessing the Impact of a User-Item Collaborative Attack on Class of Users. In ImpactRS@RecSys, Vol. 2462. CEUR-WS.org."},{"key":"e_1_3_2_2_16_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Deldjoo Yashar","year":"2020","unstructured":"Yashar Deldjoo , Tommaso Di Noia, and Felice Antonio Merra . 2020 . Adversarial Machine Learning in Recommender Systems : State of the art and Challenges. CoRR , Vol. abs\/ 2005 .10322 (2020). arxiv: 2005.10322 Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2020. Adversarial Machine Learning in Recommender Systems: State of the art and Challenges. CoRR, Vol. abs\/2005.10322 (2020). arxiv: 2005.10322"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843948"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_2_20_1","volume-title":"Konstan","author":"Maxwell Harper F.","year":"2016","unstructured":"F. Maxwell Harper and Joseph A . Konstan . 2016 . The MovieLens Datasets: History and Context. TiiS , Vol. 5 , 4 (2016), 19:1--19:19. F. Maxwell Harper and Joseph A. Konstan. 2016. The MovieLens Datasets: History and Context. TiiS, Vol. 5, 4 (2016), 19:1--19:19."},{"key":"e_1_3_2_2_21_1","unstructured":"Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. ACM 355--364.  Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. ACM 355--364."},{"key":"e_1_3_2_2_22_1","volume-title":"Collaborative Recommender Systems. In 2010 AAAI Spring Symposium Series.","author":"Heitmann Benjamin","year":"2010","unstructured":"Benjamin Heitmann and Conor Hayes . 2010 . Using Linked Data to Build Open , Collaborative Recommender Systems. In 2010 AAAI Spring Symposium Series. Benjamin Heitmann and Conor Hayes. 2010. Using Linked Data to Build Open, Collaborative Recommender Systems. In 2010 AAAI Spring Symposium Series."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130348.3130372"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358995"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000035471.28235.6d"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963775"},{"key":"e_1_3_2_2_27_1","unstructured":"Nicolas Hug. 2017. Surprise a Python library for recommender systems.  Nicolas Hug. 2017. Surprise a Python library for recommender systems."},{"volume-title":"Recommender Systems - An Introduction","author":"Jannach Dietmar","key":"e_1_3_2_2_28_1","unstructured":"Dietmar Jannach , Markus Zanker , Alexander Felfernig , and Gerhard Friedrich . 2010. Recommender Systems - An Introduction . Cambridge University Press . Dietmar Jannach, Markus Zanker, Alexander Felfernig, and Gerhard Friedrich. 2010. Recommender Systems - An Introduction. Cambridge University Press."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644873.1644874"},{"key":"e_1_3_2_2_30_1","volume-title":"Bell","author":"Koren Yehuda","year":"2015","unstructured":"Yehuda Koren and Robert M . Bell . 2015 . Advances in Collaborative Filtering. In Recommender Systems Handbook . 77--118. Yehuda Koren and Robert M. Bell. 2015. Advances in Collaborative Filtering. In Recommender Systems Handbook. 77--118."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_2_32_1","volume-title":"Lam and John Riedl","author":"Shyong","year":"2004","unstructured":"Shyong K. Lam and John Riedl . 2004 . Shilling recommender systems for fun and profit. In WWW. ACM , 393--402. Shyong K. Lam and John Riedl. 2004. Shilling recommender systems for fun and profit. In WWW. ACM, 393--402."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.024"},{"key":"e_1_3_2_2_34_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NIPS. 1885--1893.  Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NIPS. 1885--1893."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the WebKDD Workshop. Citeseer, 13--23","author":"Mobasher Bamshad","year":"2005","unstructured":"Bamshad Mobasher , Robin Burke , Runa Bhaumik , and Chad Williams . 2005 . Effective attack models for shilling item-based collaborative filtering systems . In Proceedings of the WebKDD Workshop. Citeseer, 13--23 . Bamshad Mobasher, Robin Burke, Runa Bhaumik, and Chad Williams. 2005. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the WebKDD Workshop. Citeseer, 13--23."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010001"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Xia Ning Christian Desrosiers and George Karypis. 2015. A Comprehensive Survey of Neighborhood-Based Recommendation Methods. In Recommender Systems Handbook. 37--76.  Xia Ning Christian Desrosiers and George Karypis. 2015. A Comprehensive Survey of Neighborhood-Based Recommendation Methods. In Recommender Systems Handbook. 37--76.","DOI":"10.1007\/978-1-4899-7637-6_2"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"e_1_3_2_2_43_1","volume-title":"Silvestre","author":"O'Mahony Michael P.","year":"2005","unstructured":"Michael P. O'Mahony , Neil J. Hurley , and Guenole C. M . Silvestre . 2005 . Recommender Systems : Attack Types and Strategies. In AAAI. 334--339. Michael P. O'Mahony, Neil J. Hurley, and Guenole C. M. Silvestre. 2005. Recommender Systems: Attack Types and Strategies. In AAAI. 334--339."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46146-9_49"},{"key":"e_1_3_2_2_45_1","volume-title":"14th Irish Artificial Intelligence and Cognitive Science (AICS 2003) Conference. Citeseer.","author":"O'Mahony Michael P","year":"2003","unstructured":"Michael P O'Mahony , Neil J Hurley , and Guenole CM Silvestre . 2003 . An evaluation of the performance of collaborative filtering . In 14th Irish Artificial Intelligence and Cognitive Science (AICS 2003) Conference. Citeseer. Michael P O'Mahony, Neil J Hurley, and Guenole CM Silvestre. 2003. An evaluation of the performance of collaborative filtering. In 14th Irish Artificial Intelligence and Cognitive Science (AICS 2003) Conference. Citeseer."},{"volume-title":"Linear Statistical Inference and its Applications","author":"Rao C. Radhakrishna","key":"e_1_3_2_2_46_1","unstructured":"C. Radhakrishna Rao . 1973. Linear Statistical Inference and its Applications , Second Editon. Wiley . C. Radhakrishna Rao. 1973. Linear Statistical Inference and its Applications, Second Editon. Wiley."},{"key":"e_1_3_2_2_47_1","volume-title":"BPR: Bayesian Personalized Ranking from Implicit Feedback. 452--461.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2009 . BPR: Bayesian Personalized Ranking from Implicit Feedback. 452--461. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian Personalized Ranking from Implicit Feedback. 452--461."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Francesco Ricci Lior Rokach and Bracha Shapira. 2011. Introduction to Recommender Systems Handbook. In Recommender Systems Handbook. 1--35.  Francesco Ricci Lior Rokach and Bracha Shapira. 2011. Introduction to Recommender Systems Handbook. In Recommender Systems Handbook. 1--35.","DOI":"10.1007\/978-0-387-85820-3_1"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Markus Schedl. 2016. The LFM-1b Dataset for Music Retrieval and Recommendation. In ICMR. ACM 103--110.  Markus Schedl. 2016. The LFM-1b Dataset for Music Retrieval and Recommendation. In ICMR. ACM 103--110.","DOI":"10.1145\/2911996.2912004"},{"key":"e_1_3_2_2_50_1","volume-title":"mbox","author":"Galit Shmueli","year":"2010","unstructured":"Galit Shmueli et al mbox . 2010 . To explain or to predict? Statistical science (2010). Galit Shmueli et almbox. 2010. To explain or to predict? Statistical science (2010)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.72"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783273"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.11.021"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3285029"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.12.137"}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event China","acronym":"SIGIR '20"},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:38Z","timestamp":1750195898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":54,"alternative-id":["10.1145\/3397271.3401046","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401046","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}