{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:38:48Z","timestamp":1766504328411,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401087","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"419-428","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Certifiable Robustness to Discrete Adversarial Perturbations for Factorization Machines"],"prefix":"10.1145","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Xianzhuo","family":"Xia","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Liang","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Xiangnan","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Carl","family":"Yang","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta, GA, USA"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Maksym Andriushchenko and Matthias Hein. 2019. Provably robust boosted decision stumps and trees against adversarial attacks. In NeurIPS. 12997--13008. Maksym Andriushchenko and Matthias Hein. 2019. Provably robust boosted decision stumps and trees against adversarial attacks. In NeurIPS. 12997--13008."},{"key":"e_1_3_2_1_2_1","volume-title":"Frappe: Understanding the Usage and Perception of Mobile App Recommendations In-The-Wild. CoRR abs\/1505.03014","author":"Baltrunas Linas","year":"2015","unstructured":"Linas Baltrunas , Karen Church , Alexandros Karatzoglou , and Nuria Oliver . 2015 . Frappe: Understanding the Usage and Perception of Mobile App Recommendations In-The-Wild. CoRR abs\/1505.03014 (2015). Linas Baltrunas, Karen Church, Alexandros Karatzoglou, and Nuria Oliver. 2015. Frappe: Understanding the Usage and Perception of Mobile App Recommendations In-The-Wild. CoRR abs\/1505.03014 (2015)."},{"key":"e_1_3_2_1_3_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In NeurIPS. 8317--8328. Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In NeurIPS. 8317--8328."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Stefano Calzavara Claudio Lucchese and Gabriele Tolomei. 2019. Adversarial Training of Gradient-Boosted Decision Trees. In CIKM. 2429--2432. Stefano Calzavara Claudio Lucchese and Gabriele Tolomei. 2019. Adversarial Training of Gradient-Boosted Decision Trees. In CIKM. 2429--2432.","DOI":"10.1145\/3357384.3358149"},{"key":"e_1_3_2_1_5_1","unstructured":"Hongge Chen Huan Zhang Duane S. Boning and Cho-Jui Hsieh. 2019. Robust Decision Trees Against Adversarial Examples. In ICML. 1122--1131. Hongge Chen Huan Zhang Duane S. Boning and Cho-Jui Hsieh. 2019. Robust Decision Trees Against Adversarial Examples. In ICML. 1122--1131."},{"key":"e_1_3_2_1_6_1","unstructured":"Hongge Chen Huan Zhang Si Si Yang Li Duane S. Boning and Cho-Jui Hsieh. 2019. Robustness Verification of Tree-based Models. In NeurIPS. 12317--12328. Hongge Chen Huan Zhang Si Si Yang Li Duane S. Boning and Cho-Jui Hsieh. 2019. Robustness Verification of Tree-based Models. In NeurIPS. 12317--12328."},{"key":"e_1_3_2_1_7_1","volume-title":"Yu","author":"Chen Liang","year":"2018","unstructured":"Liang Chen , Yang Liu , Zibin Zheng , and Philip S . Yu . 2018 . Heterogeneous Neural Attentive Factorization Machine for Rating Prediction. In CIKM. 833--842. Liang Chen, Yang Liu, Zibin Zheng, and Philip S. Yu. 2018. Heterogeneous Neural Attentive Factorization Machine for Rating Prediction. In CIKM. 833--842."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial attacks on an oblivious recommender. In RecSys. 322--330. Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial attacks on an oblivious recommender. In RecSys. 322--330.","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_9_1","unstructured":"Francesco Croce Maksym Andriushchenko and Matthias Hein. 2019. Provable Robustness of ReLU networks via Maximization of Linear Regions. In AISTATS. 2057--2066. Francesco Croce Maksym Andriushchenko and Matthias Hein. 2019. Provable Robustness of ReLU networks via Maximization of Linear Regions. In AISTATS. 2057--2066."},{"key":"e_1_3_2_1_10_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. In ICML. 1123--1132. Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. In ICML. 1123--1132."},{"key":"e_1_3_2_1_11_1","volume-title":"Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. arXiv preprint arXiv:1902.08226","author":"Feng Fuli","year":"2019","unstructured":"Fuli Feng , Xiangnan He , Jie Tang , and Tat-Seng Chua . 2019. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. arXiv preprint arXiv:1902.08226 ( 2019 ). Fuli Feng, Xiangnan He, Jie Tang, and Tat-Seng Chua. 2019. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. arXiv preprint arXiv:1902.08226 (2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"Vechev","author":"Gehr Timon","year":"2018","unstructured":"Timon Gehr , Matthew Mirman , Dana Drachsler-Cohen , Petar Tsankov , Swarat Chaudhuri , and Martin T . Vechev . 2018 . AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In IEEE S &P. 3--18. Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin T. Vechev. 2018. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In IEEE S&P. 3--18."},{"key":"e_1_3_2_1_13_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR. Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Gregory Goren Oren Kurland Moshe Tennenholtz and Fiana Raiber. 2018. Ranking Robustness Under Adversarial Document Manipulations. In SIGIR. 395--404. Gregory Goren Oren Kurland Moshe Tennenholtz and Fiana Raiber. 2018. Ranking Robustness Under Adversarial Document Manipulations. In SIGIR. 395--404.","DOI":"10.1145\/3209978.3210012"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: A Factorization-Machine based Neural Network for CTR Prediction. In IJCAI. 1725--1731. Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: A Factorization-Machine based Neural Network for CTR Prediction. In IJCAI. 1725--1731.","DOI":"10.24963\/ijcai.2017\/239"},{"key":"e_1_3_2_1_16_1","volume-title":"McAuley","author":"He Ruining","year":"2016","unstructured":"Ruining He and Julian J . McAuley . 2016 . Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering. In WWW. 507--517. Ruining He and Julian J. McAuley. 2016. Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering. In WWW. 507--517."},{"key":"e_1_3_2_1_17_1","unstructured":"Xiangnan He and Tat-Seng Chua. 2017. Neural Factorization Machines for Sparse Predictive Analytics. In SIGIR. 355--364. Xiangnan He and Tat-Seng Chua. 2017. Neural Factorization Machines for Sparse Predictive Analytics. In SIGIR. 355--364."},{"key":"e_1_3_2_1_18_1","unstructured":"Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. 355--364. Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. 355--364."},{"key":"e_1_3_2_1_19_1","unstructured":"Matthias Hein and Maksym Andriushchenko. 2017. Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation. In NIPS. 2266--2276. Matthias Hein and Maksym Andriushchenko. 2017. Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation. In NIPS. 2266--2276."},{"key":"e_1_3_2_1_20_1","volume-title":"BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. In SDM. 495--503.","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi , Neil Shah , Alex Beutel , Stephan G\u00fcnnemann , Leman Akoglu , Mohit Kumar , Disha Makhija , and Christos Faloutsos . 2016 . BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. In SDM. 495--503. Bryan Hooi, Neil Shah, Alex Beutel, Stephan G\u00fcnnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. In SDM. 495--503."},{"key":"e_1_3_2_1_21_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In ICLR. Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR."},{"key":"e_1_3_2_1_22_1","volume-title":"Hoi","author":"Liu Chenghao","year":"2019","unstructured":"Chenghao Liu , Teng Zhang , Jundong Li , Jianwen Yin , Peilin Zhao , Jianling Sun , and Steven C. H . Hoi . 2019 . Robust Factorization Machine: A Doubly Capped Norms Minimization. In SDM. 738--746. Chenghao Liu, Teng Zhang, Jundong Li, Jianwen Yin, Peilin Zhao, Jianling Sun, and Steven C. H. Hoi. 2019. Robust Factorization Machine: A Doubly Capped Norms Minimization. In SDM. 738--746."},{"key":"e_1_3_2_1_23_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICLR. Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICLR."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Surabhi Punjabi and Priyanka Bhatt. 2018. Robust Factorization Machines for User Response Prediction. In WWW. 669--678. Surabhi Punjabi and Priyanka Bhatt. 2018. Robust Factorization Machines for User Response Prediction. In WWW. 669--678.","DOI":"10.1145\/3178876.3186148"},{"key":"e_1_3_2_1_25_1","unstructured":"Aditi Raghunathan Jacob Steinhardt and Percy Liang. 2018. Semidefinite relaxations for certifying robustness to adversarial examples. In NeurIPS. 10900--10910. Aditi Raghunathan Jacob Steinhardt and Percy Liang. 2018. Semidefinite relaxations for certifying robustness to adversarial examples. In NeurIPS. 10900--10910."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Steffen Rendle. 2010. Factorization Machines. In ICDM. 995--1000. Steffen Rendle. 2010. Factorization Machines. In ICDM. 995--1000.","DOI":"10.1109\/ICDM.2010.127"},{"key":"e_1_3_2_1_27_1","volume-title":"Factorization Machines with libFM. ACM TIST 3, 3","author":"Rendle Steffen","year":"2012","unstructured":"Steffen Rendle . 2012. Factorization Machines with libFM. ACM TIST 3, 3 ( 2012 ), 57:1--57:22. Steffen Rendle. 2012. Factorization Machines with libFM. ACM TIST 3, 3 (2012), 57:1--57:22."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Chuan Shi Zhiqiang Zhang Ping Luo Philip S. Yu Yading Yue and Bin Wu. 2015. Semantic Path based Personalized Recommendation on Weighted Heterogeneous Information Networks. In CIKM. 453--462. Chuan Shi Zhiqiang Zhang Ping Luo Philip S. Yu Yading Yue and Bin Wu. 2015. Semantic Path based Personalized Recommendation on Weighted Heterogeneous Information Networks. In CIKM. 453--462.","DOI":"10.1145\/2806416.2806528"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_1_30_1","volume-title":"McDaniel","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r , Alexey Kurakin , Nicolas Papernot , Ian J. Goodfellow , Dan Boneh , and Patrick D . McDaniel . 2018 . Ensemble Adversarial Training: Attacks and Defenses. In ICLR. Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, and Patrick D. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In ICLR."},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Deep & Cross Network for Ad Click Predictions","volume":"12","author":"Wang Ruoxi","year":"2017","unstructured":"Ruoxi Wang , Bin Fu , Gang Fu , and Mingliang Wang . 2017 . Deep & Cross Network for Ad Click Predictions . In ADKDD. 12 : 1 -- 12 :7. Ruoxi Wang, Bin Fu, Gang Fu, and Mingliang Wang. 2017. Deep & Cross Network for Ad Click Predictions. In ADKDD. 12:1--12:7.","journal-title":"ADKDD."},{"key":"e_1_3_2_1_32_1","unstructured":"Eric Wong and J. Zico Kolter. 2018. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. In ICML. 5283--5292. Eric Wong and J. Zico Kolter. 2018. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. In ICML. 5283--5292."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Fenfang Xie Liang Chen Yongjian Ye Yang Liu Zibin Zheng and Xiaola Lin. 2018. A Weighted Meta-graph Based Approach for Mobile Application Recommendation on Heterogeneous Information Networks. In ICSOC. 404--420. Fenfang Xie Liang Chen Yongjian Ye Yang Liu Zibin Zheng and Xiaola Lin. 2018. A Weighted Meta-graph Based Approach for Mobile Application Recommendation on Heterogeneous Information Networks. In ICSOC. 404--420.","DOI":"10.1007\/978-3-030-03596-9_29"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Feng Yuan Lina Yao and Boualem Benatallah. 2019. Adversarial Collaborative Neural Network for Robust Recommendation. In SIGIR. 1065--1068. Feng Yuan Lina Yao and Boualem Benatallah. 2019. Adversarial Collaborative Neural Network for Robust Recommendation. In SIGIR. 1065--1068.","DOI":"10.1109\/IJCNN.2019.8851902"},{"key":"e_1_3_2_1_35_1","volume-title":"Goodfellow","author":"Zheng Stephan","year":"2016","unstructured":"Stephan Zheng , Yang Song , Thomas Leung , and Ian J . Goodfellow . 2016 . Improving the Robustness of Deep Neural Networks via Stability Training. In CVPR. 4480--4488. Stephan Zheng, Yang Song, Thomas Leung, and Ian J. Goodfellow. 2016. Improving the Robustness of Deep Neural Networks via Stability Training. In CVPR. 4480--4488."},{"key":"e_1_3_2_1_36_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD. 1399--1407. Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD. 1399--1407."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial Attacks on Neural Networks for Graph Data. In KDD. 2847--2856. Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial Attacks on Neural Networks for Graph Data. In KDD. 2847--2856.","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD. 246--256. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD. 246--256.","DOI":"10.1145\/3292500.3330905"}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event China","acronym":"SIGIR '20"},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:38Z","timestamp":1750195898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":38,"alternative-id":["10.1145\/3397271.3401087","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401087","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}