{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T03:31:53Z","timestamp":1772595113268,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1763620, 1948374, and 2019511"],"award-info":[{"award-number":["1763620, 1948374, and 2019511"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484805","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"51-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Reverse Attack: Black-box Attacks on Collaborative Recommendation"],"prefix":"10.1145","author":[{"given":"Yihe","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Xu","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"given":"Jiadong","family":"Lou","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Li","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Nian-Feng","family":"Tzeng","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"robots.txt. https:\/\/www.airbnb.com\/robots.txt","author":"Airbnb","year":"2021","unstructured":"Airbnb. robots.txt. https:\/\/www.airbnb.com\/robots.txt, 2021."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.amazon.com\/","author":"Amazon","year":"2020","unstructured":"Amazon. Amazon.com. https:\/\/www.amazon.com\/, 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"robots.txt. https:\/\/www.amazon.com\/robots.txt","author":"Amazon","year":"2021","unstructured":"Amazon. robots.txt. https:\/\/www.amazon.com\/robots.txt, 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/aminer.org\/citation\/","author":"Aminer","year":"2020","unstructured":"Aminer. Aminer.org. https:\/\/aminer.org\/citation\/, 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169493"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2016.7738886"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_8_1","first-page":"43","volume-title":"Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence","author":"Breese J. S.","year":"1998","unstructured":"Breese, J. S., Heckerman, D., and Kadie, C. Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (1998), pp. 43--52."},{"key":"e_1_3_2_1_9_1","first-page":"17","volume-title":"Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP), 19th International Joint Conference on Artificial Intelligence (IJCAI)","author":"Burke R.","year":"2005","unstructured":"Burke, R., Mobasher, B., and Bhaumik, R. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP), 19th International Joint Conference on Artificial Intelligence (IJCAI) (2005), pp. 17--24."},{"key":"e_1_3_2_1_10_1","volume-title":"Identifying attack models for secure recommendation. Beyond Personalization","author":"Burke R.","year":"2005","unstructured":"Burke, R., Mobasher, B., Zabicki, R., and Bhaumik, R. Identifying attack models for secure recommendation. Beyond Personalization (2005)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564419"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271743"},{"key":"e_1_3_2_1_13_1","first-page":"141","volume-title":"Proceedings of the 5th ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL'05)","author":"Chen H.","year":"2005","unstructured":"Chen, H., Li, X., and Huang, Z. Link prediction approach to collaborative filtering. In Proceedings of the 5th ACM\/IEEE-CS Joint Conference on Digital Libraries (JCDL'05) (2005), pp. 141--142."},{"key":"e_1_3_2_1_14_1","unstructured":"Christakopoulou K. and Banerjee A. Adversarial recommendation: Attack of the learned fake users."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864770"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273523"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00011"},{"key":"e_1_3_2_1_21_1","volume-title":"US new category structure. https:\/\/ir.ebaystatic.com\/pictures\/aw\/pics\/catchanges\/2021\/May\/NTF-update\/US_New_Structure_(May2021)_NFT-update.csv","author":"Bay","year":"2021","unstructured":"eBay. US new category structure. https:\/\/ir.ebaystatic.com\/pictures\/aw\/pics\/catchanges\/2021\/May\/NTF-update\/US_New_Structure_(May2021)_NFT-update.csv, 2021."},{"key":"e_1_3_2_1_22_1","unstructured":"Fan W. Derr T. Zhao X. Ma Y. Liu H. Wang J. Tang J. and Li Q. Attacking black-box recommendations via copying cross-domain user profiles."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_25_1","volume-title":"collab. https:\/\/docs.fast.ai\/collab.html","year":"2020","unstructured":"fast.ai. collab. https:\/\/docs.fast.ai\/collab.html, 2020."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.46"},{"key":"e_1_3_2_1_27_1","first-page":"2672","volume-title":"Proceedings of the Advances in Neural Information Processing Systems","author":"Goodfellow I.","year":"2014","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. Generative adversarial nets. In Proceedings of the Advances in Neural Information Processing Systems (2014), pp. 2672--2680."},{"key":"e_1_3_2_1_28_1","unstructured":"Goodfellow I. J. Shlens J. and Szegedy C. Explaining and harnessing adversarial examples."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219885"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.026"},{"key":"e_1_3_2_1_31_1","first-page":"5","article-title":"Shilling attacks against memory-based privacy-preserving recommendation algorithms","volume":"7","author":"Gunes I.","year":"2013","unstructured":"Gunes, I., Bilge, A., and Polat, H. Shilling attacks against memory-based privacy-preserving recommendation algorithms. KSII Transactions on Internet & Information Systems 7, 5 (2013).","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_1_33_1","volume-title":"The history of amazon's recommendation algorithm. https:\/\/www.amazon.science\/the-history-of-amazons\u00adrecommendation-algorithm","author":"Hardesty L.","year":"2020","unstructured":"Hardesty, L. The history of amazon's recommendation algorithm. https:\/\/www.amazon.science\/the-history-of-amazons\u00adrecommendation-algorithm, 2020."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883037"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052639"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013539"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24525"},{"key":"e_1_3_2_1_42_1","volume-title":"Food recommender system on amazon","author":"Huang T.","unstructured":"Huang, T., Zhou, H., and Zhou, K. Food recommender system on amazon. San Diego: University of California San Diego (2017)."},{"key":"e_1_3_2_1_43_1","volume-title":"How airbnb uses machine learning to detect host preferences. https:\/\/medium.com\/airbnb-engineering\/how-airbnb-uses\u00admachine-learning-to-detect-host-preferences-18ce07150fa3","author":"Ifrach B.","year":"2020","unstructured":"Ifrach, B. How airbnb uses machine learning to detect host preferences. https:\/\/medium.com\/airbnb-engineering\/how-airbnb-uses\u00admachine-learning-to-detect-host-preferences-18ce07150fa3, 2020."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_46_1","unstructured":"Kurakin A. Goodfellow I. and Bengio S. Adversarial examples in the physical world."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_49_1","first-page":"539","volume-title":"Proceedings of the Annual Conference on Advances in Neural Information Processing Systems (NIPS)","author":"Leskovec J.","year":"2012","unstructured":"Leskovec, J., and Mcauley, J. J. Learning to discover social circles in ego networks. In Proceedings of the Annual Conference on Advances in Neural Information Processing Systems (NIPS) (2012), pp. 539--547."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Annual Conference on Advances in Neural Information Processing Systems 27","author":"Levy O.","year":"2014","unstructured":"Levy, O., and Goldberg, Y. Neural word embedding as implicit matrix factorization. Proceedings of the Annual Conference on Advances in Neural Information Processing Systems 27 (2014), 2177--2185."},{"key":"e_1_3_2_1_51_1","first-page":"1885","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NIPS)","author":"Li B.","year":"2016","unstructured":"Li, B., Wang, Y., Singh, A., and Vorobeychik, Y. Data poisoning attacks on factorization-based collaborative filtering. In Proceedings of the Advances in Neural Information Processing Systems (NIPS) (2016), pp. 1885--1893."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806527"},{"key":"e_1_3_2_1_53_1","unstructured":"Lin C. Chen S. Li H. Xiao Y. Li L. and Yang Q. Attacking recommender systems with augmented user profiles."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Liu D. and Jiang W. Personalized app recommendation based on hierarchical embedding. In Proceedings of the IEEE SmartWorld Ubiquitous Intelligence & Computing Advanced & Trusted Computing Scalable Computing & Communications Cloud & Big Data Computing Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI) (2018) pp. 1323--1328.","DOI":"10.1109\/SmartWorld.2018.00230"},{"key":"e_1_3_2_1_56_1","first-page":"4","article-title":"Social network and tag sources based augmenting collaborative recommender system","volume":"98","author":"Ma T.","year":"2015","unstructured":"Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., and Lee, S. Social network and tag sources based augmenting collaborative recommender system. IEICE Transactions on Information and Systems 98, 4 (2015), 902--910.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_3_2_1_58_1","first-page":"13","volume-title":"Proceedings of the WebKDD Workshop","author":"Mobasher B.","year":"2005","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., and Williams, C. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the WebKDD Workshop (2005), pp. 13--23."},{"key":"e_1_3_2_1_59_1","volume-title":"https:\/\/movielens.org\/","author":"Movielens","year":"2019","unstructured":"Movielens. Movielens. https:\/\/movielens.org\/, 2019."},{"key":"e_1_3_2_1_60_1","volume-title":"Movielens datasets. https:\/\/grouplens.org\/datasets\/movielens\/","author":"Movielens","year":"2019","unstructured":"Movielens. Movielens datasets. https:\/\/grouplens.org\/datasets\/movielens\/, 2019."},{"key":"e_1_3_2_1_61_1","volume-title":"robots.txt. https:\/\/movielens.org\/robots.txt","author":"MovieLens","year":"2021","unstructured":"MovieLens. robots.txt. https:\/\/movielens.org\/robots.txt, 2021."},{"key":"e_1_3_2_1_62_1","volume-title":"https:\/\/www.kaggle.com\/netflix-inc\/netflix-prize-data\/","author":"Netflix","year":"2019","unstructured":"Netflix.com. Netflix. https:\/\/www.kaggle.com\/netflix-inc\/netflix-prize-data\/, 2019."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"e_1_3_2_1_64_1","first-page":"5","volume-title":"Proceedings of KDD Cup and Workshop","volume":"2007","author":"Paterek A.","year":"2007","unstructured":"Paterek, A. Improving regularized singular value decomposition for collaborative filtering. In Proceedings of KDD Cup and Workshop (2007), vol. 2007, pp. 5--8."},{"key":"e_1_3_2_1_65_1","volume-title":"Bpr: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618","author":"Rendle S.","year":"2012","unstructured":"Rendle, S., Freudenthaler, C., Gantner, Z., and Schmidt-Thieme, L. Bpr: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618 (2012)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1137\/1035044"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307630.3342390"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00115"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645722"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.72"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.09.019"},{"key":"e_1_3_2_1_74_1","volume-title":"China's ai-powered netease is music to your ears","author":"Synced","year":"2020","unstructured":"Synced. China's ai-powered netease is music to your ears, 2020."},{"key":"e_1_3_2_1_75_1","article-title":"-S. Adversarial training towards robust multimedia recommender system","author":"Tang J.","year":"2019","unstructured":"Tang, J., Du, X., He, X., Yuan, F., Tian, Q., and Chua, T.-S. Adversarial training towards robust multimedia recommender system. IEEE Transactions on Knowledge and Data Engineering (2019).","journal-title":"IEEE Transactions on Knowledge and Data Engineering ("},{"key":"e_1_3_2_1_76_1","volume-title":"https:\/\/twitter.com\/","author":"Twitter","year":"2020","unstructured":"Twitter. Twitter.com. https:\/\/twitter.com\/, 2020."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11251"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783273"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313417"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080786"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5198-3"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507220"},{"key":"e_1_3_2_1_83_1","first-page":"671","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX)","author":"Xing X.","year":"2013","unstructured":"Xing, X., Meng, W., Doozan, D., Snoeren, A. C., Feamster, N., and Lee, W. Take this personally: Pollution attacks on personalized services. In Proceedings of the 22nd USENIX Security Symposium (USENIX) (2013), pp. 671--686."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23020"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.05.028"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0476-7"},{"key":"e_1_3_2_1_88_1","volume-title":"Complementary item recommendations at ebay scale. https:\/\/tech.ebayinc.com\/engineering\/complementary-item\u00adrecommendations-at-ebay-scale\/","author":"Yuri M. B.","year":"2020","unstructured":"Yuri, M. B. Complementary item recommendations at ebay scale. https:\/\/tech.ebayinc.com\/engineering\/complementary-item\u00adrecommendations-at-ebay-scale\/, 2020."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_23"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11618"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484805","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:46:35Z","timestamp":1763498795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":90,"alternative-id":["10.1145\/3460120.3484805","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484805","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}