{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T01:11:22Z","timestamp":1774487482242,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FT210100624,DP190101985,DE200101465"],"award-info":[{"award-number":["FT210100624,DP190101985,DE200101465"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3498386","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"1415-1423","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion"],"prefix":"10.1145","author":[{"given":"Shijie","family":"Zhang","sequence":"first","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"given":"Tong","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"given":"Zi","family":"Huang","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"given":"Quoc Viet Hung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, Australia"}]},{"given":"Lizhen","family":"Cui","sequence":"additional","affiliation":[{"name":"ShanDong University, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Himan Abdollahpouri Robin Burke and Bamshad Mobasher. 2017. Controlling popularity bias in learning-to-rank recommendation. In RecSys . 42--46.","DOI":"10.1145\/3109859.3109912"},{"key":"e_1_3_2_2_2_1","volume-title":"RMSE Workshop .","author":"Abdollahpouri Himan","year":"2019","unstructured":"Himan Abdollahpouri, Masoud Mansoury, Robin Burke, and Bamshad Mobasher. 2019. The unfairness of popularity bias in recommendation. In RMSE Workshop ."},{"key":"e_1_3_2_2_3_1","unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to backdoor federated learning. In AISTATS. 2938--2948."},{"key":"e_1_3_2_2_4_1","unstructured":"Gilad Baruch Moran Baruch and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In NeurIPS . 8632--8642."},{"key":"e_1_3_2_2_5_1","unstructured":"Arjun Nitin Bhagoji Supriyo Chakraborty Prateek Mittal and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In ICML. 634--643."},{"key":"e_1_3_2_2_6_1","volume-title":"Rachid Guerraoui, and Julien Stainer.","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In NeurIPS . 118--128."},{"key":"e_1_3_2_2_7_1","volume-title":"ITWP 2005 . 17--24","author":"Burke Robin","year":"2005","unstructured":"Robin Burke, Bamshad Mobasher, and Runa Bhaumik. 2005. Limited knowledge shilling attacks in collaborative filtering systems. In ITWP 2005 . 17--24."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial attacks on an oblivious recommender. In RecSys. 322--330.","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Tyler Derr Xiangyu Zhao Yao Ma Hui Liu Jianping Wang Jiliang Tang and Qing Li. 2021. Attacking Black-box Recommendations via Copying Cross-domain User Profiles. In ICDE . 1583--1594.","DOI":"10.1109\/ICDE51399.2021.00140"},{"key":"e_1_3_2_2_11_1","unstructured":"Minghong Fang Xiaoyu Cao Jinyuan Jia and Neil Gong. 2020 a. Local model poisoning attacks to byzantine-robust federated learning. In USENIX . 1605--1622."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Minghong Fang Neil Zhenqiang Gong and Jia Liu. 2020 b. Influence function based data poisoning attacks to top-n recommender systems. In WWW . 3019--3025.","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_2_13_1","volume-title":"Neil Zhenqiang Gong, and Jia Liu","author":"Fang Minghong","year":"2018","unstructured":"Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, and Jia Liu. 2018. Poisoning attacks to graph-based recommender systems. In ACSAC. 381--392."},{"key":"e_1_3_2_2_14_1","unstructured":"Rachid Guerraoui S\u00e9bastien Rouault et al. 2018. The hidden vulnerability of distributed learning in byzantium. In ICML. 3521--3530."},{"key":"e_1_3_2_2_15_1","volume-title":"Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review","author":"Gunes Ihsan","year":"2014","unstructured":"Ihsan Gunes, Cihan Kaleli, Alper Bilge, and Huseyin Polat. 2014. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review (2014), 767--799."},{"key":"e_1_3_2_2_16_1","volume-title":"The movielens datasets: History and context. Acm transactions on interactive intelligent systems","author":"Maxwell Harper F","year":"2015","unstructured":"F Maxwell Harper and Joseph A Konstan. 2015. The movielens datasets: History and context. Acm transactions on interactive intelligent systems (2015), 1--19."},{"key":"e_1_3_2_2_17_1","unstructured":"Ruining He and Julian McAuley. 2016. Ups and downs: Modeling the visual evolution of fashion trends with one-class collaborative filtering. In WWW. 507--517."},{"key":"e_1_3_2_2_18_1","unstructured":"Xiangnan He and Tat-Seng Chua. 2017. Neural Factorization Machines for Sparse Predictive Analytics. In SIGIR. 355--364."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182.","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_2_21_1","unstructured":"Xiangnan He Hanwang Zhang Min-Yen Kan and Tat-Seng Chua. 2016. Fast Matrix Factorization for Online Recommendation with Implicit Feedback. In SIGIR . 549--558."},{"key":"e_1_3_2_2_22_1","volume-title":"Nguyen Thanh Tam, Matthias Weidlich, Hongzhi Yin, and Xiaofang Zhou.","author":"Viet Hung Nguyen Quoc","year":"2018","unstructured":"Nguyen Quoc Viet Hung, Huynh Huu Viet, Nguyen Thanh Tam, Matthias Weidlich, Hongzhi Yin, and Xiaofang Zhou. 2018. Computing Crowd Consensus with Partial Agreement. IEEE Transactions on Knowledge and Data Engineering (2018), 1--14."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Srijan Kumar Bryan Hooi Disha Makhija Mohit Kumar Christos Faloutsos and VS Subrahmanian. 2018. Rev2: Fraudulent user prediction in rating platforms. In WSDM. 333--341.","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_2_2_24_1","unstructured":"Shyong K Lam and John Riedl. 2004. Shilling recommender systems for fun and profit. In WWW. 393--402."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Chen Lin Si Chen Hui Li Yanghua Xiao Lianyun Li and Qian Yang. 2020 a. Attacking recommender systems with augmented user profiles. In CIKM. 855--864.","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Yujie Lin Pengjie Ren Zhumin Chen Zhaochun Ren Dongxiao Yu Jun Ma Maarten de Rijke and Xiuzhen Cheng. 2020 b. Meta Matrix Factorization for Federated Rating Predictions. In SIGIR . 981--990.","DOI":"10.1145\/3397271.3401081"},{"key":"e_1_3_2_2_27_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS . 1273--1282."},{"key":"e_1_3_2_2_28_1","volume-title":"Fedfast: Going beyond average for faster training of federated recommender systems. In SIGKDD . 1234--1242.","author":"Muhammad Khalil","year":"2020","unstructured":"Khalil Muhammad, Qinqin Wang, Diarmuid O'Reilly-Morgan, Elias Tragos, Barry Smyth, Neil Hurley, James Geraci, and Aonghus Lawlor. 2020. Fedfast: Going beyond average for faster training of federated recommender systems. In SIGKDD . 1234--1242."},{"key":"e_1_3_2_2_29_1","volume-title":"Thanh Tam Nguyen, Matthias Weidlich, Karl Aberer, Hongzhi Yin, and Xiaofang Zhou.","author":"Nguyen Quoc Viet","year":"2017","unstructured":"Quoc Viet Nguyen, Chi Thang Duong, Thanh Tam Nguyen, Matthias Weidlich, Karl Aberer, Hongzhi Yin, and Xiaofang Zhou. 2017. Argument Discovery via Crowdsourcing. VLDBJ (2017), 511--535."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Tao Qi Fangzhao Wu Chuhan Wu Yongfeng Huang and Xing Xie. 2020. Privacy-Preserving News Recommendation Model Learning. In EMNLP. 1423--1432.","DOI":"10.18653\/v1\/2020.findings-emnlp.128"},{"key":"e_1_3_2_2_31_1","volume-title":"BPR: Bayesian Personalized Ranking from Implicit Feedback. In UAI. 452--461.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian Personalized Ranking from Implicit Feedback. In UAI. 452--461."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Steffen Rendle Zeno Gantner Christoph Freudenthaler and Lars Schmidt-Thieme. 2011. Fast context-aware recommendations with factorization machines. In SIGIR . 635--644.","DOI":"10.1145\/2009916.2010002"},{"key":"e_1_3_2_2_33_1","volume-title":"Fast-adapting and Privacy-preserving Federated Recommender System. VLDBJ","author":"Wang Qinyong","year":"2021","unstructured":"Qinyong Wang, Hongzhi Yin, Tong Chen, Junliang Yu, Alexander Zhou, and Xiangliang Zhang. 2021. Fast-adapting and Privacy-preserving Federated Recommender System. VLDBJ (2021)."},{"key":"e_1_3_2_2_34_1","volume-title":"Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925","author":"Wu Chuhan","year":"2021","unstructured":"Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021)."},{"key":"e_1_3_2_2_35_1","unstructured":"Dong Yin Yudong Chen Ramchandran Kannan and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In ICML . 5650--5659."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Yaliang Li Bolin Ding and Jing Gao. 2020 a. Practical data poisoning attack against next-item recommendation. In WWW . 2458--2464.","DOI":"10.1145\/3366423.3379992"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Shijie Zhang Hongzhi Yin Tong Chen Zi Huang Lizhen Cui and Xiangliang Zhang. 2021 b. Graph Embedding for Recommendation against Attribute Inference Attacks. In WWW . 3002--3014.","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Shijie Zhang Hongzhi Yin Tong Chen Quoc Viet Nguyen Hung Zi Huang and Lizhen Cui. 2020 b. Gcn-based user representation learning for unifying robust recommendation and fraudster detection. In SIGIR. 689--698.","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Yang Zhang Fuli Feng Xiangnan He Tianxin Wei Chonggang Song Guohui Ling and Yongdong Zhang. 2021 a. Causal Intervention for Leveraging Popularity Bias in Recommendation. In SIGIR . 11--20.","DOI":"10.1145\/3404835.3462875"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Yan Zhang Hongzhi Yin Zi Huang Xingzhong Du Guowu Yang and Defu Lian. 2018. Discrete Deep Learning for Fast Content-Aware Recommendation. In WSDM . 717--726.","DOI":"10.1145\/3159652.3159688"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Ziwei Zhu Yun He Xing Zhao Yin Zhang Jianling Wang and James Caverlee. 2021. Popularity-Opportunity Bias in Collaborative Filtering. In WSDM. 85--93.","DOI":"10.1145\/3437963.3441820"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Ziwei Zhu Jianling Wang and James Caverlee. 2020. Measuring and mitigating item under-recommendation bias in personalized ranking systems. In SIGIR . 449--458.","DOI":"10.1145\/3397271.3401177"}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","location":"Virtual Event AZ USA","acronym":"WSDM '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:51Z","timestamp":1750191531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":42,"alternative-id":["10.1145\/3488560.3498386","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3498386","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}