{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:54:39Z","timestamp":1767707679521,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,8]]},"DOI":"10.1145\/3437963.3441757","type":"proceedings-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T04:36:17Z","timestamp":1615005377000},"page":"94-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["A Black-Box Attack Model for Visually-Aware Recommender Systems"],"prefix":"10.1145","author":[{"given":"Rami","family":"Cohen","sequence":"first","affiliation":[{"name":"Intuit AI &amp; Bar-Ilan University, Ramat Gan, Israel"}]},{"given":"Oren","family":"Sar Shalom","sequence":"additional","affiliation":[{"name":"Facebook, Tel Aviv, Israel"}]},{"given":"Dietmar","family":"Jannach","sequence":"additional","affiliation":[{"name":"University of Klagenfurt, Klagenfurt, Austria"}]},{"given":"Amihood","family":"Amir","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905862"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365964"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20618-9_9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150465"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"e_1_3_2_1_7_1","volume-title":"Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069","author":"Chakraborty Anirban","year":"2018","unstructured":"Anirban Chakraborty , Manaar Alam , Vishal Dey , Anupam Chattopadhyay , and Debdeep Mukhopadhyay . 2018. Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069 ( 2018 ). Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069 (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng , Thong Le , Pin-Yu Chen , Jinfeng Yi , Huan Zhang , and Cho-Jui Hsieh . 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 ( 2018 ). Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, and Cho-Jui Hsieh. 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/1018004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13740-016-0060-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00011"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2887018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0974"},{"key":"e_1_3_2_1_16_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068","author":"Gu Shixiang","year":"2014","unstructured":"Shixiang Gu and Luca Rigazio . 2014. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068 ( 2014 ). Shixiang Gu and Luca Rigazio. 2014. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068 (2014)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_1_19_1","volume-title":"Andrew Gordon Wilson, and Kilian Q Weinberger","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo , Jacob R Gardner , Yurong You , Andrew Gordon Wilson, and Kilian Q Weinberger . 2019 . Simple black-box adversarial attacks. arXiv preprint arXiv:1905.07121 (2019). Chuan Guo, Jacob R Gardner, Yurong You, Andrew Gordon Wilson, and Kilian Q Weinberger. 2019. Simple black-box adversarial attacks. arXiv preprint arXiv:1905.07121 (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_21_1","volume-title":"Sherlock: sparse hierarchical embeddings for visually-aware one-class collaborative filtering. arXiv preprint arXiv:1604.05813","author":"He Ruining","year":"2016","unstructured":"Ruining He , Chunbin Lin , Jianguo Wang , and Julian McAuley . 2016a. Sherlock: sparse hierarchical embeddings for visually-aware one-class collaborative filtering. arXiv preprint arXiv:1604.05813 ( 2016 ). Ruining He, Chunbin Lin, Jianguo Wang, and Julian McAuley. 2016a. Sherlock: sparse hierarchical embeddings for visually-aware one-class collaborative filtering. arXiv preprint arXiv:1604.05813 (2016)."},{"key":"e_1_3_2_1_22_1","volume-title":"AAAI '16","author":"He Ruining","year":"2016","unstructured":"Ruining He and Julian McAuley . 2016 . VBPR: visual bayesian personalized ranking from implicit feedback . In AAAI '16 . Ruining He and Julian McAuley. 2016. VBPR: visual bayesian personalized ranking from implicit feedback. In AAAI '16."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_1_24_1","volume-title":"Black-box adversarial attacks with limited queries and information. arXiv preprint arXiv:1804.08598","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas , Logan Engstrom , Anish Athalye , and Jessy Lin . 2018. Black-box adversarial attacks with limited queries and information. arXiv preprint arXiv:1804.08598 ( 2018 ). Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box adversarial attacks with limited queries and information. arXiv preprint arXiv:1804.08598 (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"IJCAI '11","author":"Iwata Tomoharu","year":"2011","unstructured":"Tomoharu Iwata , Shinji Watanabe , and Hiroshi Sawada . 2011 . Fashion coordinates recommender system using photographs from fashion magazines . In IJCAI '11 . Tomoharu Iwata, Shinji Watanabe, and Hiroshi Sawada. 2011. Fashion coordinates recommender system using photographs from fashion magazines. In IJCAI '11."},{"key":"e_1_3_2_1_26_1","article-title":"Measuring the Business Value of Recommender Systems","volume":"10","author":"Jannach Dietmar","year":"2019","unstructured":"Dietmar Jannach and Michael Jugovac . 2019 . Measuring the Business Value of Recommender Systems . ACM Trans. on Mgt. Inf. Sys. , Vol. 10 , 4 (2019). Dietmar Jannach and Michael Jugovac. 2019. Measuring the Business Value of Recommender Systems. ACM Trans. on Mgt. Inf. Sys., Vol. 10, 4 (2019).","journal-title":"ACM Trans. on Mgt. Inf. Sys."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the ACM RecSys Workshop on the Impact of Recommender Systems (ImpactRS'19)","author":"Jannach Dietmar","year":"2019","unstructured":"Dietmar Jannach , Oren Sar Shalom , and Joseph A Konstan . 2019 . Towards more impactful recommender systems research . In Proceedings of the ACM RecSys Workshop on the Impact of Recommender Systems (ImpactRS'19) . Dietmar Jannach, Oren Sar Shalom, and Joseph A Konstan. 2019. Towards more impactful recommender systems research. In Proceedings of the ACM RecSys Workshop on the Impact of Recommender Systems (ImpactRS'19)."},{"key":"e_1_3_2_1_28_1","first-page":"223","article-title":"On the probability that a random$pm$1-matrix is singular","volume":"8","author":"Kahn Jeff","year":"1995","unstructured":"Jeff Kahn , J\u00e1nos Koml\u00f3s , and Endre Szemer\u00e9di . 1995 . On the probability that a random$pm$1-matrix is singular . Journal of the American Mathematical Society , Vol. 8 , 1 (1995), 223 -- 240 . Jeff Kahn, J\u00e1nos Koml\u00f3s, and Endre Szemer\u00e9di. 1995. On the probability that a random$pm$1-matrix is singular. Journal of the American Mathematical Society, Vol. 8, 1 (1995), 223--240.","journal-title":"Journal of the American Mathematical Society"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.75"},{"key":"e_1_3_2_1_30_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016a. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016a. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_1_31_1","volume-title":"Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016b. Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016b. Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7500"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-0503-0_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080658"},{"key":"e_1_3_2_1_35_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 ( 2017 ). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390350"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270205"},{"key":"e_1_3_2_1_40_1","volume-title":"UAI '09","author":"Rendle Steffen","year":"2012","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2012 . BPR: Bayesian personalized ranking from implicit feedback . UAI '09 (2012). Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2012. BPR: Bayesian personalized ranking from implicit feedback. UAI '09 (2012)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2799670"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337035"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347061"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9655-x"},{"key":"e_1_3_2_1_46_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.119632"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800185"},{"key":"e_1_3_2_1_49_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Chao Tong Xiang Yin Jun Li Tongyu Zhu Renli Lv Liang Sun and Joel JPC Rodrigues. 2018. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. Comput. J. (2018).  Chao Tong Xiang Yin Jun Li Tongyu Zhu Renli Lv Liang Sun and Joel JPC Rodrigues. 2018. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. Comput. J. (2018).","DOI":"10.1093\/comjnl\/bxy008"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2018.8466289"},{"key":"e_1_3_2_1_54_1","unstructured":"Aaron Van den Oord Sander Dieleman and Benjamin Schrauwen. 2013. Deep content-based music recommendation. In NIPS.  Aaron Van den Oord Sander Dieleman and Benjamin Schrauwen. 2013. Deep content-based music recommendation. In NIPS."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4631255"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-007-0013-0"},{"key":"e_1_3_2_1_58_1","unstructured":"Weilin Xu David Evans and Yanjun Qi. [n.d.]. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155.  Weilin Xu David Evans and Yanjun Qi. [n.d.]. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.032"},{"key":"e_1_3_2_1_60_1","volume-title":"On Lipschitz Bounds of General Convolutional Neural Networks","author":"Zou Dongmian","year":"2019","unstructured":"Dongmian Zou , Radu Balan , and Maneesh Singh . 2019. On Lipschitz Bounds of General Convolutional Neural Networks . IEEE Trans. on Information Theory ( 2019 ). Dongmian Zou, Radu Balan, and Maneesh Singh. 2019. On Lipschitz Bounds of General Convolutional Neural Networks. IEEE Trans. on Information Theory (2019)."}],"event":{"name":"WSDM '21: The Fourteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Israel","acronym":"WSDM '21"},"container-title":["Proceedings of the 14th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:35Z","timestamp":1750193255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":60,"alternative-id":["10.1145\/3437963.3441757","10.1145\/3437963"],"URL":"https:\/\/doi.org\/10.1145\/3437963.3441757","relation":{},"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"2021-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}