{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T13:23:25Z","timestamp":1769347405400,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Microsoft Azure"},{"name":"Georgia Institute of Technology Institute for Data Engineering and Science"},{"DOI":"10.13039\/100006778","name":"Georgia Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006778","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557425","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:22:22Z","timestamp":1665883342000},"page":"1584-1594","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Rank List Sensitivity of Recommender Systems to Interaction Perturbations"],"prefix":"10.1145","author":[{"given":"Sejoon","family":"Oh","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Berk","family":"Ustun","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Julian","family":"McAuley","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Srijan","family":"Kumar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Reddit data dump. http:\/\/files.pushshift.io\/reddit\/.  2020. Reddit data dump. http:\/\/files.pushshift.io\/reddit\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Wikipedia edit history dump. https:\/\/meta.wikimedia.org\/wiki\/Data_ dumps.  2020. Wikipedia edit history dump. https:\/\/meta.wikimedia.org\/wiki\/Data_ dumps."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462630"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462848"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159727"},{"key":"e_1_3_2_1_6_1","volume-title":"Leave-one-out Unfairness. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 285--295","author":"Black Emily","year":"2021","unstructured":"Emily Black and Matt Fredrikson . 2021 . Leave-one-out Unfairness. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 285--295 . Emily Black and Matt Fredrikson. 2021. Leave-one-out Unfairness. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 285--295."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401196"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.373"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441757"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. PMLR, 2144--2155","author":"Coston Amanda","year":"2021","unstructured":"Amanda Coston , Ashesh Rambachan , and Alexandra Chouldechova . 2021 . Characterizing fairness over the set of good models under selective labels . In International Conference on Machine Learning. PMLR, 2144--2155 . Amanda Coston, Ashesh Rambachan, and Alexandra Chouldechova. 2021. Characterizing fairness over the set of good models under selective labels. In International Conference on Machine Learning. PMLR, 2144--2155."},{"key":"e_1_3_2_1_13_1","volume-title":"Alberto Freitas, Filipa Canario Almeida, Rong Chen, and Altamiro Costa-Pereira.","author":"Cruz-Correia Ricardo Jo","year":"2009","unstructured":"Ricardo Jo ao Cruz-Correia , Pedro Pereira Rodrigues , Alberto Freitas, Filipa Canario Almeida, Rong Chen, and Altamiro Costa-Pereira. 2009 . Data quality and integration issues in electronic health records. In Information discovery on electronic health records. Chapman and Hall\/CRC , 73--114. Ricardo Jo ao Cruz-Correia, Pedro Pereira Rodrigues, Alberto Freitas, Filipa Canario Almeida, Rong Chen, and Altamiro Costa-Pereira. 2009. Data quality and integration issues in electronic health records. In Information discovery on electronic health records. Chapman and Hall\/CRC, 73--114."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988451"},{"key":"e_1_3_2_1_15_1","unstructured":"Alexander D'Amour Katherine Heller Dan Moldovan Ben Adlam Babak Alipanahi Alex Beutel Christina Chen Jonathan Deaton Jacob Eisenstein Matthew D Hoffman etal 2020. Underspecification Presents Challenges for Credibility in Modern Machine Learning. Journal of Machine Learning Research (2020).  Alexander D'Amour Katherine Heller Dan Moldovan Ben Adlam Babak Alipanahi Alex Beutel Christina Chen Jonathan Deaton Jacob Eisenstein Matthew D Hoffman et al. 2020. Underspecification Presents Challenges for Credibility in Modern Machine Learning. Journal of Machine Learning Research (2020)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109877"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_20_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations.","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Machine Learning. PMLR, 2484--2493","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo , Jacob Gardner , Yurong You , Andrew Gordon Wilson , and Kilian Weinberger . 2019 a. Simple black-box adversarial attacks . In International Conference on Machine Learning. PMLR, 2484--2493 . Chuan Guo, Jacob Gardner, Yurong You, Andrew Gordon Wilson, and Kilian Weinberger. 2019a. Simple black-box adversarial attacks. In International Conference on Machine Learning. PMLR, 2484--2493."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330839"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412248"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467390"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_5"},{"key":"e_1_3_2_1_26_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation , Vol. 9 , 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_27_1","volume-title":"Rashomon Capacity: A Metric for Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01295","author":"Hsu Hsiang","year":"2022","unstructured":"Hsiang Hsu and Flavio du Pin Calmon . 2022 . Rashomon Capacity: A Metric for Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01295 (2022). Hsiang Hsu and Flavio du Pin Calmon. 2022. Rashomon Capacity: A Metric for Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01295 (2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330979"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24525"},{"key":"e_1_3_2_1_30_1","volume-title":"The distribution of the flora in the alpine zone. 1. New phytologist","author":"Jaccard Paul","year":"1912","unstructured":"Paul Jaccard . 1912. The distribution of the flora in the alpine zone. 1. New phytologist , Vol. 11 , 2 ( 1912 ), 37--50. Paul Jaccard. 1912. The distribution of the flora in the alpine zone. 1. New phytologist, Vol. 11, 2 (1912), 37--50."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290958"},{"key":"e_1_3_2_1_32_1","unstructured":"Maurice George Kendall. 1948. Rank correlation methods. (1948).  Maurice George Kendall. 1948. Rank correlation methods. (1948)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-0038-1666844"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186141"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783367"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"e_1_3_2_1_38_1","volume-title":"Diversify and Disambiguate: Learning From Underspecified Data. arXiv:2202.03418","author":"Lee Yoonho","year":"2022","unstructured":"Yoonho Lee , Huaxiu Yao , and Chelsea Finn . 2022. Diversify and Disambiguate: Learning From Underspecified Data. arXiv:2202.03418 ( 2022 ). Yoonho Lee, Huaxiu Yao, and Chelsea Finn. 2022. Diversify and Disambiguate: Learning From Underspecified Data. arXiv:2202.03418 (2022)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403258"},{"key":"e_1_3_2_1_40_1","volume-title":"Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems","author":"Li Bo","year":"1885","unstructured":"Bo Li , Yining Wang , Aarti Singh , and Yevgeniy Vorobeychik . 2016. Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems , Vol. 29 , 1885 --1893. Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems, Vol. 29, 1885--1893."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371786"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00041"},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Machine Learning. PMLR, 4042--4050","author":"Liu Fang","year":"2019","unstructured":"Fang Liu and Ness Shroff . 2019 . Data poisoning attacks on stochastic bandits . In International Conference on Machine Learning. PMLR, 4042--4050 . Fang Liu and Ness Shroff. 2019. Data poisoning attacks on stochastic bandits. In International Conference on Machine Learning. PMLR, 4042--4050."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449891"},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Machine Learning. PMLR, 6765--6774","author":"Marx Charles","year":"2020","unstructured":"Charles Marx , Flavio Calmon , and Berk Ustun . 2020 . Predictive multiplicity in classification . In International Conference on Machine Learning. PMLR, 6765--6774 . Charles Marx, Flavio Calmon, and Berk Ustun. 2020. Predictive multiplicity in classification. In International Conference on Machine Learning. PMLR, 6765--6774."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3418479"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.117"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512133"},{"key":"e_1_3_2_1_51_1","volume-title":"IACN: Influence-Aware and Attention-Based Co-evolutionary Network for Recommendation. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 561--574","author":"Pandey Shalini","year":"2021","unstructured":"Shalini Pandey , George Karypis , and Jaideep Srivasatava . 2021 . IACN: Influence-Aware and Attention-Based Co-evolutionary Network for Recommendation. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 561--574 . Shalini Pandey, George Karypis, and Jaideep Srivasatava. 2021. IACN: Influence-Aware and Attention-Based Co-evolutionary Network for Recommendation. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 561--574."},{"key":"e_1_3_2_1_52_1","volume-title":"Conference on Uncertainty in Artificial Intelligence. PMLR, 809--818","author":"Pawelczyk Martin","year":"2020","unstructured":"Martin Pawelczyk , Klaus Broelemann , and Gjergji Kasneci . 2020 . On counterfactual explanations under predictive multiplicity . In Conference on Uncertainty in Artificial Intelligence. PMLR, 809--818 . Martin Pawelczyk, Klaus Broelemann, and Gjergji Kasneci. 2020. On counterfactual explanations under predictive multiplicity. In Conference on Uncertainty in Artificial Intelligence. PMLR, 809--818."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347000"},{"key":"e_1_3_2_1_54_1","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Pruthi Garima","year":"2020","unstructured":"Garima Pruthi , Frederick Liu , Satyen Kale , and Mukund Sundararajan . 2020 . Estimating Training Data Influence by Tracing Gradient Descent . Advances in Neural Information Processing Systems , Vol. 33 . Garima Pruthi, Frederick Liu, Satyen Kale, and Mukund Sundararajan. 2020. Estimating Training Data Influence by Tracing Gradient Descent. Advances in Neural Information Processing Systems, Vol. 33."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014806"},{"key":"e_1_3_2_1_56_1","volume-title":"Understanding Prediction Discrepancies in Machine Learning Classifiers. arXiv:2104.05467","author":"Renard Xavier","year":"2021","unstructured":"Xavier Renard , Thibault Laugel , and Marcin Detyniecki . 2021. Understanding Prediction Discrepancies in Machine Learning Classifiers. arXiv:2104.05467 ( 2021 ). Xavier Renard, Thibault Laugel, and Marcin Detyniecki. 2021. Understanding Prediction Discrepancies in Machine Learning Classifiers. arXiv:2104.05467 (2021)."},{"key":"e_1_3_2_1_57_1","volume-title":"UPSET and ANGRI: Breaking high performance image classifiers. arXiv:1707.01159","author":"Sarkar Sayantan","year":"2017","unstructured":"Sayantan Sarkar , Ankan Bansal , Upal Mahbub , and Rama Chellappa . 2017. UPSET and ANGRI: Breaking high performance image classifiers. arXiv:1707.01159 ( 2017 ). Sayantan Sarkar, Ankan Bansal, Upal Mahbub, and Rama Chellappa. 2017. UPSET and ANGRI: Breaking high performance image classifiers. arXiv:1707.01159 (2017)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems. 3520--3532","author":"Steinhardt Jacob","year":"2017","unstructured":"Jacob Steinhardt , Pang Wei Koh , and Percy Liang . 2017 . Certified defenses for data poisoning attacks . In Proceedings of the 31st International Conference on Neural Information Processing Systems. 3520--3532 . Jacob Steinhardt, Pang Wei Koh, and Percy Liang. 2017. Certified defenses for data poisoning attacks. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 3520--3532."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4302425"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.305"},{"key":"e_1_3_2_1_63_1","volume-title":"Revisiting Adversarially Learned Injection Attacks Against Recommender Systems. In Fourteenth ACM Conference on Recommender Systems. 318--327","author":"Tang Jiaxi","year":"2020","unstructured":"Jiaxi Tang , Hongyi Wen , and Ke Wang . 2020 . Revisiting Adversarially Learned Injection Attacks Against Recommender Systems. In Fourteenth ACM Conference on Recommender Systems. 318--327 . Jiaxi Tang, Hongyi Wen, and Ke Wang. 2020. Revisiting Adversarially Learned Injection Attacks Against Recommender Systems. In Fourteenth ACM Conference on Recommender Systems. 318--327."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-020-00633-6"},{"key":"e_1_3_2_1_65_1","volume-title":"Text Retrieval Conference","volume":"99","author":"Ellen","unstructured":"Ellen M Voorhees et al. 1999. The trec-8 question answering track report . In Text Retrieval Conference , Vol. 99 . 77--82. Ellen M Voorhees et al. 1999. The trec-8 question answering track report. In Text Retrieval Conference, Vol. 99. 77--82."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.13"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330989"},{"key":"e_1_3_2_1_68_1","volume-title":"Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01131","author":"Watson-Daniels Jamelle","year":"2022","unstructured":"Jamelle Watson-Daniels , David C Parkes , and Berk Ustun . 2022. Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01131 ( 2022 ). Jamelle Watson-Daniels, David C Parkes, and Berk Ustun. 2022. Predictive Multiplicity in Probabilistic Classification. arXiv:2206.01131 (2022)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852102.1852106"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph110302580"},{"key":"e_1_3_2_1_71_1","volume-title":"Breakthroughs in statistics","author":"Wilcoxon Frank","unstructured":"Frank Wilcoxon . 1992. Individual comparisons by ranking methods . In Breakthroughs in statistics . Springer , 196--202. Frank Wilcoxon. 1992. Individual comparisons by ranking methods. In Breakthroughs in statistics. Springer, 196--202."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467335"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462914"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098094"},{"key":"e_1_3_2_1_75_1","volume-title":"Generative poisoning attack method against neural networks. arXiv:1703.01340","author":"Yang Chaofei","year":"2017","unstructured":"Chaofei Yang , Qing Wu , Hai Li , and Yiran Chen . 2017b. Generative poisoning attack method against neural networks. arXiv:1703.01340 ( 2017 ). Chaofei Yang, Qing Wu, Hai Li, and Yiran Chen. 2017b. Generative poisoning attack method against neural networks. arXiv:1703.01340 (2017)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869861"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484030"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661983"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.08.004"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474275"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3379992"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Y. Li B. Ding and Jing Gao. 2020b. Practical Data Poisoning Attack against Next-Item Recommendation. In TheWebConf.  Hengtong Zhang Y. Li B. Ding and Jing Gao. 2020b. Practical Data Poisoning Attack against Next-Item Recommendation. In TheWebConf.","DOI":"10.1145\/3366423.3379992"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467233"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.485"},{"key":"e_1_3_2_1_85_1","volume-title":"Proc. 2nd Int. Workshop Personalization Recommender Syst. 1--10","author":"D\u00e1vid","year":"2016","unstructured":"D\u00e1vid Zibriczky12. 2016 . Recommender systems meet finance: a literature review . In Proc. 2nd Int. Workshop Personalization Recommender Syst. 1--10 . D\u00e1vid Zibriczky12. 2016. Recommender systems meet finance: a literature review. In Proc. 2nd Int. Workshop Personalization Recommender Syst. 1--10."}],"event":{"name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","location":"Atlanta GA USA","acronym":"CIKM '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:55Z","timestamp":1750182535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":85,"alternative-id":["10.1145\/3511808.3557425","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557425","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}