{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:08Z","timestamp":1750220228216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3459637.3482046","type":"proceedings-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T18:33:14Z","timestamp":1635618794000},"page":"2852-2856","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Formal Analysis of Recommendation Quality of Adversarially-trained Recommenders"],"prefix":"10.1145","author":[{"given":"Vito Walter","family":"Anelli","sequence":"first","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"given":"Yashar","family":"Deldjoo","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"given":"Felice Antonio","family":"Merra","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109912"},{"volume-title":"Managing Popularity Bias in Recommender Systems with Personalized Re-Ranking. In FLAIRS Conference. AAAI Press, 413--418","year":"2019","author":"Abdollahpouri Himan","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"MSAP: Multi-Step Adversarial Perturbations on Recommender Systems Embeddings. In The International FLAIRS Conference Proceedings (FLAIRS","volume":"34","author":"Anelli Vito Walter","year":"2021"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462848"},{"volume-title":"Tommaso Di Noia, and Felice Antonio Merra. 2021 b. Adversarial Recommender Systems: Attack, Defense, and Advances. the","author":"Anelli Vito Walter","key":"e_1_3_2_1_5_1"},{"volume-title":"Antonio Ferrara, and Fedelucio Narducci. 2021 d. FedeRank: User Controlled Feedback with Federated Recommender Systems. In ECIR (1) (Lecture Notes in Computer Science","author":"Anelli Vito Walter","key":"e_1_3_2_1_6_1"},{"volume-title":"ESWC 2020, Heraklion, Crete, Greece, May 31-June 4, 2020, Proceedings. 307--323","year":"2020","author":"Anelli Vito Walter","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102387"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3346987"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080797"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441757"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313445"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00445"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439729"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401046"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"F. Feng X. He J. Tang and T. Chua. 2019. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. IEEE Transactions on Knowledge and Data Engineering (2019) 1--1. https:\/\/doi.org\/10.1109\/TKDE.2019.2957786  F. Feng X. He J. Tang and T. Chua. 2019. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. IEEE Transactions on Knowledge and Data Engineering (2019) 1--1. https:\/\/doi.org\/10.1109\/TKDE.2019.2957786","DOI":"10.1109\/TKDE.2019.2957786"},{"key":"e_1_3_2_1_17_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR (Poster).  Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR (Poster)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_1_20_1","unstructured":"Bal\u00e1 zs Hidasi Alexandros Karatzoglou Linas Baltrunas and Domonkos Tikk. 2016. Session-based Recommendations with Recurrent Neural Networks. In ICLR (Poster).  Bal\u00e1 zs Hidasi Alexandros Karatzoglou Linas Baltrunas and Domonkos Tikk. 2016. Session-based Recommendations with Recurrent Neural Networks. In ICLR (Poster)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-015-9165-3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371841"},{"key":"e_1_3_2_1_24_1","volume-title":"Adversarial Training for Session-based Item Recommendations. In 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)","volume":"9","author":"Liu D.","year":"2020"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449891"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412152"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"volume-title":"Recommender Systems Handbook","author":"Ning Xia","key":"e_1_3_2_1_28_1"},{"volume-title":"50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2020","year":"2020","author":"Noia Tommaso Di","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313416"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556248"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795114.1795167"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331234"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.05.004"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963316"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331267"},{"volume-title":"Robust graph convolutional networks with directional graph adversarial training. Applied Intelligence","year":"2021","author":"Weibo Hu","key":"e_1_3_2_1_38_1"},{"volume-title":"2019 a. Adversarial Collaborative Auto-encoder for Top-N Recommendation","author":"Yuan Feng","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331321"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411917"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1000488107"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401177"}],"event":{"name":"CIKM '21: The 30th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Queensland Australia","acronym":"CIKM '21"},"container-title":["Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459637.3482046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459637.3482046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:12Z","timestamp":1750188612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459637.3482046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":43,"alternative-id":["10.1145\/3459637.3482046","10.1145\/3459637"],"URL":"https:\/\/doi.org\/10.1145\/3459637.3482046","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}