{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:21:28Z","timestamp":1774945288002,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3449813","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:24:51Z","timestamp":1622748291000},"page":"3002-3014","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":80,"title":["Graph Embedding for Recommendation against Attribute Inference Attacks"],"prefix":"10.1145","author":[{"given":"Shijie","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Queensland, Australia"}]},{"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]},{"given":"Tong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]},{"given":"Zi","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]},{"given":"Lizhen","family":"Cui","sequence":"additional","affiliation":[{"name":"Shandong University, China"}]},{"given":"Xiangliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science &amp; Technology, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. MovieLens. http:\/\/grouplens.org\/datasets\/movielens  2019. MovieLens. http:\/\/grouplens.org\/datasets\/movielens"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Gediminas Adomavicius and Alexander Tuzhilin. 2011. Context-aware recommender systems. In Recommender systems handbook. 217\u2013253.  Gediminas Adomavicius and Alexander Tuzhilin. 2011. Context-aware recommender systems. In Recommender systems handbook. 217\u2013253.","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ghazaleh Beigi Ahmadreza Mosallanezhad Ruocheng Guo Hamidreza Alvari Alexander Nou and Huan Liu. 2020. Privacy-aware recommendation with private-attribute protection using adversarial learning. In WSDM. 34\u201342.  Ghazaleh Beigi Ahmadreza Mosallanezhad Ruocheng Guo Hamidreza Alvari Alexander Nou and Huan Liu. 2020. Privacy-aware recommendation with private-attribute protection using adversarial learning. In WSDM. 34\u201342.","DOI":"10.1145\/3336191.3371832"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Arnaud Berlioz Arik Friedman Mohamed\u00a0Ali Kaafar Roksana Boreli and Shlomo Berkovsky. 2015. Applying differential privacy to matrix factorization. In RECSYS. 107\u2013114.  Arnaud Berlioz Arik Friedman Mohamed\u00a0Ali Kaafar Roksana Boreli and Shlomo Berkovsky. 2015. Applying differential privacy to matrix factorization. In RECSYS. 107\u2013114.","DOI":"10.1145\/2792838.2800173"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Gjorgjina Cenikj and Sonja Gievska. 2020. Boosting Recommender Systems with Advanced Embedding Models. In WWW Companion. 385\u2013389.  Gjorgjina Cenikj and Sonja Gievska. 2020. Boosting Recommender Systems with Advanced Embedding Models. In WWW Companion. 385\u2013389.","DOI":"10.1145\/3366424.3383300"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_1_9_1","volume-title":"Differentially private empirical risk minimization. Journal of Machine Learning Research3","author":"Chaudhuri Kamalika","year":"2011","unstructured":"Kamalika Chaudhuri , Claire Monteleoni , and Anand\u00a0 D Sarwate . 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research3 ( 2011 ). Kamalika Chaudhuri, Claire Monteleoni, and Anand\u00a0D Sarwate. 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research3 (2011)."},{"key":"e_1_3_2_1_10_1","volume-title":"Quoc Viet\u00a0Hung Nguyen, and Xue Li","author":"Chen Tong","year":"2019","unstructured":"Tong Chen , Hongzhi Yin , Hongxu Chen , Rui Yan , Quoc Viet\u00a0Hung Nguyen, and Xue Li . 2019 . Air : Attentional intention-aware recommender systems. In ICDE. 304\u2013315. Tong Chen, Hongzhi Yin, Hongxu Chen, Rui Yan, Quoc Viet\u00a0Hung Nguyen, and Xue Li. 2019. Air: Attentional intention-aware recommender systems. In ICDE. 304\u2013315."},{"key":"e_1_3_2_1_11_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NeurIPS. 3844\u20133852.  Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In NeurIPS. 3844\u20133852."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. 265\u2013284.  Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. 265\u2013284.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_13_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science ( 2014 ), 211\u2013407. Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science (2014), 211\u2013407."},{"key":"e_1_3_2_1_14_1","unstructured":"Zekeriya Erkin Michael Beye Thijs Veugen and Reginald\u00a0L Lagendijk. 2010. Privacy enhanced recommender system. In SITB. 35\u201342.  Zekeriya Erkin Michael Beye Thijs Veugen and Reginald\u00a0L Lagendijk. 2010. Privacy enhanced recommender system. In SITB. 35\u201342."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_16_1","volume-title":"Gerald Friedland, Robin Sommer, and Renata Teixeira.","author":"Goga Oana","year":"2013","unstructured":"Oana Goga , Howard Lei , Sree Hari\u00a0Krishnan Parthasarathi , Gerald Friedland, Robin Sommer, and Renata Teixeira. 2013 . Exploiting innocuous activity for correlating users across sites. In WWW. 447\u2013458. Oana Goga, Howard Lei, Sree Hari\u00a0Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, and Renata Teixeira. 2013. Exploiting innocuous activity for correlating users across sites. In WWW. 447\u2013458."},{"key":"e_1_3_2_1_17_1","volume-title":"You are who you know and how you behave: Attribute inference attacks via users","author":"Gong Neil\u00a0Zhenqiang","unstructured":"Neil\u00a0Zhenqiang Gong and Bin Liu . 2016. You are who you know and how you behave: Attribute inference attacks via users \u2019 social friends and behaviors. In USENIX. 979\u2013995. Neil\u00a0Zhenqiang Gong and Bin Liu. 2016. You are who you know and how you behave: Attribute inference attacks via users\u2019 social friends and behaviors. In USENIX. 979\u2013995."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Neil\u00a0Zhenqiang Gong and Bin Liu. 2018. Attribute inference attacks in online social networks. ACM Transactions on Privacy and Security(2018) 1\u201330.  Neil\u00a0Zhenqiang Gong and Bin Liu. 2018. Attribute inference attacks in online social networks. ACM Transactions on Privacy and Security(2018) 1\u201330.","DOI":"10.1145\/3154793"},{"key":"e_1_3_2_1_19_1","volume-title":"Emil Stefanov, Elaine Shi, and Dawn Song.","author":"Gong Neil\u00a0Zhenqiang","year":"2014","unstructured":"Neil\u00a0Zhenqiang Gong , Ameet Talwalkar , Lester Mackey , Ling Huang , Eui Chul\u00a0Richard Shin , Emil Stefanov, Elaine Shi, and Dawn Song. 2014 . Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology ( 2014), 1\u201320. Neil\u00a0Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul\u00a0Richard Shin, Emil Stefanov, Elaine Shi, and Dawn Song. 2014. Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology (2014), 1\u201320."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Lei Guo Hongzhi Yin Qinyong Wang Tong Chen Alexander Zhou and Nguyen Quoc Viet\u00a0Hung. 2019. Streaming session-based recommendation. In SIGKDD. 1569\u20131577.  Lei Guo Hongzhi Yin Qinyong Wang Tong Chen Alexander Zhou and Nguyen Quoc Viet\u00a0Hung. 2019. Streaming session-based recommendation. In SIGKDD. 1569\u20131577.","DOI":"10.1145\/3292500.3330839"},{"key":"e_1_3_2_1_21_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS. 1024\u20131034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS. 1024\u20131034."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Jianming He Wesley\u00a0W Chu and Zhenyu\u00a0Victor Liu. 2006. Inferring privacy information from social networks. In ISI. 154\u2013165.  Jianming He Wesley\u00a0W Chu and Zhenyu\u00a0Victor Liu. 2006. Inferring privacy information from social networks. In ISI. 154\u2013165.","DOI":"10.1007\/11760146_14"},{"key":"e_1_3_2_1_23_1","unstructured":"Jinyuan Jia Binghui Wang Le Zhang and Neil\u00a0Zhenqiang Gong. 2017. AttriInfer: Inferring user attributes in online social networks using markov random fields. In WWW. 1561\u20131569.  Jinyuan Jia Binghui Wang Le Zhang and Neil\u00a0Zhenqiang Gong. 2017. AttriInfer: Inferring user attributes in online social networks using markov random fields. In WWW. 1561\u20131569."},{"key":"e_1_3_2_1_24_1","unstructured":"Hua Jingyu Xia Chang and Zhong Sheng. 2015. Differentially Private Matrix Factorization. In IJCAI. 57\u201362.  Hua Jingyu Xia Chang and Zhong Sheng. 2015. Differentially Private Matrix Factorization. In IJCAI. 57\u201362."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Thivya Kandappu Arik Friedman Roksana Boreli and Vijay Sivaraman. 2014. PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation. In MASCOTS. 453\u2013462.  Thivya Kandappu Arik Friedman Roksana Boreli and Vijay Sivaraman. 2014. PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation. In MASCOTS. 453\u2013462.","DOI":"10.1109\/MASCOTS.2014.62"},{"key":"e_1_3_2_1_26_1","unstructured":"Rimma Kats. 2018. Many Facebook Users are Sharing Less Content. In eMarketer https:\/\/www.emarketer.com\/content\/many-facebook-users-are-sharing-less-content-because-of-privacy-concerns.  Rimma Kats. 2018. Many Facebook Users are Sharing Less Content. In eMarketer https:\/\/www.emarketer.com\/content\/many-facebook-users-are-sharing-less-content-because-of-privacy-concerns."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Jinsu Kim Dongyoung Koo Yuna Kim Hyunsoo Yoon Junbum Shin and Sungwook Kim. 2018. Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption. ACM Transactions on Privacy and Security(2018) 1\u201330.  Jinsu Kim Dongyoung Koo Yuna Kim Hyunsoo Yoon Junbum Shin and Sungwook Kim. 2018. Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption. ACM Transactions on Privacy and Security(2018) 1\u201330.","DOI":"10.1145\/3212509"},{"key":"e_1_3_2_1_28_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.  Thomas\u00a0N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_1_29_1","volume-title":"Private traits and attributes are predictable from digital records of human behavior. PNAS","author":"Kosinski Michal","year":"2013","unstructured":"Michal Kosinski , David Stillwell , and Thore Graepel . 2013. Private traits and attributes are predictable from digital records of human behavior. PNAS ( 2013 ), 5802\u20135805. Michal Kosinski, David Stillwell, and Thore Graepel. 2013. Private traits and attributes are predictable from digital records of human behavior. PNAS (2013), 5802\u20135805."},{"key":"e_1_3_2_1_30_1","unstructured":"Jing Lei. 2011. Differentially private m-estimators. In NeurIPS. 361\u2013369.  Jing Lei. 2011. Differentially private m-estimators. In NeurIPS. 361\u2013369."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Jack Lindamood Raymond Heatherly Murat Kantarcioglu and Bhavani Thuraisingham. 2009. Inferring private information using social network data. In WWW. 1145\u20131146.  Jack Lindamood Raymond Heatherly Murat Kantarcioglu and Bhavani Thuraisingham. 2009. Inferring private information using social network data. In WWW. 1145\u20131146.","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_1_32_1","unstructured":"Xiaoqian Liu Qianmu Li Zhen Ni and Jun Hou. 2019. Differentially private recommender system with autoencoders. In iThings. 450\u2013457.  Xiaoqian Liu Qianmu Li Zhen Ni and Jun Hou. 2019. Differentially private recommender system with autoencoders. In iThings. 450\u2013457."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Ziqi Liu Yu-Xiang Wang and Alexander Smola. 2015. Fast differentially private matrix factorization. In RECSYS. 171\u2013178.  Ziqi Liu Yu-Xiang Wang and Alexander Smola. 2015. Fast differentially private matrix factorization. In RECSYS. 171\u2013178.","DOI":"10.1145\/2792838.2800191"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In SIGKDD. 627\u2013636.  Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In SIGKDD. 627\u2013636.","DOI":"10.1145\/1557019.1557090"},{"key":"e_1_3_2_1_35_1","unstructured":"Andriy Mnih and Ruslan\u00a0R Salakhutdinov. 2008. Probabilistic matrix factorization. In NeurIPS. 1257\u20131264.  Andriy Mnih and Ruslan\u00a0R Salakhutdinov. 2008. Probabilistic matrix factorization. In NeurIPS. 1257\u20131264."},{"key":"e_1_3_2_1_36_1","volume-title":"IEEE Symposium on Security and Privacy. 111\u2013125","author":"Naranyanan A","year":"2008","unstructured":"A Naranyanan and V Shmatikov . 2008 . Robust de-anonymization of large datasets . In IEEE Symposium on Security and Privacy. 111\u2013125 . A Naranyanan and V Shmatikov. 2008. Robust de-anonymization of large datasets. In IEEE Symposium on Security and Privacy. 111\u2013125."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Valeria Nikolaenko Stratis Ioannidis Udi Weinsberg Marc Joye Nina Taft and Dan Boneh. 2013. Privacy-preserving matrix factorization. In SIGSAC. 801\u2013812.  Valeria Nikolaenko Stratis Ioannidis Udi Weinsberg Marc Joye Nina Taft and Dan Boneh. 2013. Privacy-preserving matrix factorization. In SIGSAC. 801\u2013812.","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_2_1_38_1","volume-title":"Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems. Entropy","author":"Parra-Arnau Javier","year":"2014","unstructured":"Javier Parra-Arnau , David Rebollo-Monedero , and Jordi Forn\u00e9 . 2014. Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems. Entropy ( 2014 ), 1586\u20131631. Javier Parra-Arnau, David Rebollo-Monedero, and Jordi Forn\u00e9. 2014. Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems. Entropy (2014), 1586\u20131631."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044341"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Al\u00a0Mamunur Rashid Istvan Albert Dan Cosley Shyong\u00a0K Lam Sean\u00a0M McNee Joseph\u00a0A Konstan and John Riedl. 2002. Getting to know you: learning new user preferences in recommender systems. In IUI. 127\u2013134.  Al\u00a0Mamunur Rashid Istvan Albert Dan Cosley Shyong\u00a0K Lam Sean\u00a0M McNee Joseph\u00a0A Konstan and John Riedl. 2002. Getting to know you: learning new user preferences in recommender systems. In IUI. 127\u2013134.","DOI":"10.1145\/502716.502737"},{"key":"e_1_3_2_1_41_1","volume-title":"BPR: Bayesian personalized ranking from implicit feedback. UAI","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2009 . BPR: Bayesian personalized ranking from implicit feedback. UAI (2009), 452\u2013461. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. UAI (2009), 452\u2013461."},{"key":"e_1_3_2_1_42_1","volume-title":"Heterogeneous information network embedding for recommendation","author":"Shi Chuan","year":"2018","unstructured":"Chuan Shi , Binbin Hu , Wayne\u00a0Xin Zhao , and S\u00a0Yu Philip . 2018. Heterogeneous information network embedding for recommendation . IEEE Transactions on Knowledge and Data Engineering ( 2018 ), 357\u2013370. Chuan Shi, Binbin Hu, Wayne\u00a0Xin Zhao, and S\u00a0Yu Philip. 2018. Heterogeneous information network embedding for recommendation. IEEE Transactions on Knowledge and Data Engineering (2018), 357\u2013370."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2805356"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Suhang Wang Jiliang Tang Reza Zafarani and Huan Liu. 2017. User identity linkage across online social networks: A review. Acm SIGKDD Explorations Newsletter(2017) 5\u201317.  Kai Shu Suhang Wang Jiliang Tang Reza Zafarani and Huan Liu. 2017. User identity linkage across online social networks: A review. Acm SIGKDD Explorations Newsletter(2017) 5\u201317.","DOI":"10.1145\/3068777.3068781"},{"key":"e_1_3_2_1_45_1","unstructured":"Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. In ICLR.  Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. In ICLR."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Ning Wang Xiaokui Xiao Yin Yang Jun Zhao Siu\u00a0Cheung Hui Hyejin Shin Junbum Shin and Ge Yu. 2019. Collecting and analyzing multidimensional data with local differential privacy. In ICDE. 638\u2013649.  Ning Wang Xiaokui Xiao Yin Yang Jun Zhao Siu\u00a0Cheung Hui Hyejin Shin Junbum Shin and Ge Yu. 2019. Collecting and analyzing multidimensional data with local differential privacy. In ICDE. 638\u2013649.","DOI":"10.1109\/ICDE.2019.00063"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Qinyong Wang Hongzhi Yin Tong Chen Zi Huang Hao Wang Yanchang Zhao and Nguyen\u00a0Quoc Viet\u00a0Hung. 2020. Next Point-of-Interest Recommendation on Resource-Constrained Mobile Devices. In WWW. 906\u2013916.  Qinyong Wang Hongzhi Yin Tong Chen Zi Huang Hao Wang Yanchang Zhao and Nguyen\u00a0Quoc Viet\u00a0Hung. 2020. Next Point-of-Interest Recommendation on Resource-Constrained Mobile Devices. In WWW. 906\u2013916.","DOI":"10.1145\/3366423.3380170"},{"key":"e_1_3_2_1_48_1","unstructured":"Tianhao Wang Jeremiah Blocki Ninghui Li and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX. 729\u2013745.  Tianhao Wang Jeremiah Blocki Ninghui Li and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX. 729\u2013745."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Xiang Wang Xiangnan He Meng Wang Fuli Feng and Tat-Seng Chua. 2019. Neural graph collaborative filtering. In SIGIR. 165\u2013174.  Xiang Wang Xiangnan He Meng Wang Fuli Feng and Tat-Seng Chua. 2019. Neural graph collaborative filtering. In SIGIR. 165\u2013174.","DOI":"10.1145\/3331184.3331267"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Udi Weinsberg Smriti Bhagat Stratis Ioannidis and Nina Taft. 2012. BlurMe: Inferring and obfuscating user gender based on ratings. In RECSYS. 195\u2013202.  Udi Weinsberg Smriti Bhagat Stratis Ioannidis and Nina Taft. 2012. BlurMe: Inferring and obfuscating user gender based on ratings. In RECSYS. 195\u2013202.","DOI":"10.1145\/2365952.2365989"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Xin Xia Hongzhi Yin Junliang Yu Qinyong Wang Lizhen Cui and Xiangliang Zhang. 2020. Self-Supervised Hypergraph Convolutional Networks for Session-based Recommendation. In AAAI.  Xin Xia Hongzhi Yin Junliang Yu Qinyong Wang Lizhen Cui and Xiangliang Zhang. 2020. Self-Supervised Hypergraph Convolutional Networks for Session-based Recommendation. In AAAI.","DOI":"10.1609\/aaai.v35i5.16578"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Min Xie Hongzhi Yin Hao Wang Fanjiang Xu Weitong Chen and Sen Wang. 2016. Learning graph-based poi embedding for location-based recommendation. In CIKM. 15\u201324.  Min Xie Hongzhi Yin Hao Wang Fanjiang Xu Weitong Chen and Sen Wang. 2016. Learning graph-based poi embedding for location-based recommendation. In CIKM. 15\u201324.","DOI":"10.1145\/2983323.2983711"},{"key":"e_1_3_2_1_53_1","volume-title":"DPNE: Differentially private network embedding. In PAKDD. 235\u2013246.","author":"Xu Depeng","year":"2018","unstructured":"Depeng Xu , Shuhan Yuan , Xintao Wu , and HaiNhat Phan . 2018 . DPNE: Differentially private network embedding. In PAKDD. 235\u2013246. Depeng Xu, Shuhan Yuan, Xintao Wu, and HaiNhat Phan. 2018. DPNE: Differentially private network embedding. In PAKDD. 235\u2013246."},{"key":"e_1_3_2_1_54_1","unstructured":"Hongzhi Yin Qinyong Wang Kai Zheng Zhixu Li Jiali Yang and Xiaofang Zhou. 2019. Social influence-based group representation learning for group recommendation. In ICDE. 566\u2013577.  Hongzhi Yin Qinyong Wang Kai Zheng Zhixu Li Jiali Yang and Xiaofang Zhou. 2019. Social influence-based group representation learning for group recommendation. In ICDE. 566\u2013577."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Rex Ying Ruining He Kaifeng Chen Pong Eksombatchai William\u00a0L Hamilton and Jure Leskovec. 2018. Graph convolutional neural networks for web-scale recommender systems. In SIGKDD. 974\u2013983.  Rex Ying Ruining He Kaifeng Chen Pong Eksombatchai William\u00a0L Hamilton and Jure Leskovec. 2018. Graph convolutional neural networks for web-scale recommender systems. In SIGKDD. 974\u2013983.","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3033673"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"e_1_3_2_1_58_1","volume-title":"Zi Huang, and Lizhen Cui.","author":"Zhang Shijie","year":"2020","unstructured":"Shijie Zhang , Hongzhi Yin , Tong Chen , Quoc Viet\u00a0Nguyen Hung , Zi Huang, and Lizhen Cui. 2020 . GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR. 689\u2013698. Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet\u00a0Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR. 689\u2013698."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Shijie Zhang Hongzhi Yin Qinyong Wang Tong Chen Hongxu Chen and Quoc Viet\u00a0Hung Nguyen. 2019. Inferring Substitutable Products with Deep Network Embedding.. In IJCAI. 4306\u20134312.  Shijie Zhang Hongzhi Yin Qinyong Wang Tong Chen Hongxu Chen and Quoc Viet\u00a0Hung Nguyen. 2019. Inferring Substitutable Products with Deep Network Embedding.. In IJCAI. 4306\u20134312.","DOI":"10.24963\/ijcai.2019\/598"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Cai-Nicolas Ziegler Sean\u00a0M McNee Joseph\u00a0A Konstan and Georg Lausen. 2005. Improving recommendation lists through topic diversification. In WWW. 22\u201332.  Cai-Nicolas Ziegler Sean\u00a0M McNee Joseph\u00a0A Konstan and Georg Lausen. 2005. Improving recommendation lists through topic diversification. In WWW. 22\u201332.","DOI":"10.1145\/1060745.1060754"}],"event":{"name":"WWW '21: The Web Conference 2021","location":"Ljubljana Slovenia","acronym":"WWW '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3449813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:22Z","timestamp":1750195462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":60,"alternative-id":["10.1145\/3442381.3449813","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3449813","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}