{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T04:16:51Z","timestamp":1774412211018,"version":"3.50.1"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62176028"],"award-info":[{"award-number":["62176028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing","award":["cx2020097"],"award-info":[{"award-number":["cx2020097"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"crossref","award":["cstc2020jcyj-msxmX0690"],"award-info":[{"award-number":["cstc2020jcyj-msxmX0690"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2022,10,31]]},"abstract":"<jats:p>\n            Recommender systems are essential components of many information services, which aim to find relevant items that match user preferences. Several studies have shown that shilling attacks can significantly weaken the robustness of recommender systems by injecting fake user profiles. Traditional shilling attacks focus on creating hand-engineered fake user profiles, but these profiles can be detected effortlessly by advanced detection methods. Adversarial learning, which has emerged in recent years, can be leveraged to generate powerful and intelligent attack models. To this end, in this article we explore potential risks of recommender systems and shed light on a gray-box shilling attack model based on generative adversarial networks, named\n            <jats:italic>GSA-GANs<\/jats:italic>\n            . Specifically, we aim to generate fake user profiles that can achieve two goals: unnoticeable and offensive. Toward these goals, there are several challenges that we need to address: (1) learning complex user behaviors from user-item rating data, and (2) adversely influencing the recommendation results without knowing the underlying recommendation algorithms. To tackle these challenges, two essential GAN modules are respectively designed to make generated fake profiles more similar to real ones and harmful to recommendation results. Experimental results on three public datasets demonstrate that the proposed GSA-GANs framework outperforms baseline models in attack effectiveness, transferability, and camouflage. In the end, we also provide several possible defensive strategies against GSA-GANs. The exploration and analysis in our work will contribute to the defense research of recommender systems.\n          <\/jats:p>","DOI":"10.1145\/3512352","type":"journal-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T14:20:27Z","timestamp":1647958827000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Gray-Box Shilling Attack: An Adversarial Learning Approach"],"prefix":"10.1145","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9774-4596","authenticated-orcid":false,"given":"Zongwei","family":"Wang","sequence":"first","affiliation":[{"name":"Chongqing University"}]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[{"name":"Chongqing University"}]},{"given":"Jundong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Junwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chongqing University"}]},{"given":"Jiang","family":"Zhong","sequence":"additional","affiliation":[{"name":"Chongqing University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"10","volume-title":"Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP\u201906)","volume":"6","author":"Bhaumik Runa","year":"2006","unstructured":"Runa Bhaumik, Chad Williams, Bamshad Mobasher, and Robin Burke. 2006. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP\u201906), Vol. 6. 10."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2015.7184808"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.04.001"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12037"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313413"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271743"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_9_2","first-page":"Article 9, 23 p","article-title":"Visual interfaces for recommendation systems: Finding similar and dissimilar peers","author":"Du Fan","year":"2019","unstructured":"Fan Du, Catherine Plaisant, Neil Spring, and Ben Shneiderman. 2019. Visual interfaces for recommendation systems: Finding similar and dissimilar peers. ACM Transactions on Intelligent Systems and Technology 10, 1 (2019), Article 9, 23 pages.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/3367032.3367224"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Minghong Fang Neil Zhenqiang Gong and Jia Liu. 2020. Influence function based data poisoning attacks to top-N recommender systems. In Proceedings of the World Wide Web Conference (WWW\u201920) . 3019\u20133025.","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2011.02.003"},{"key":"e_1_3_2_14_2","first-page":"2672","volume-title":"Proceedings of the 2014 Annual Conference on Neural Information Processing Systems","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the 2014 Annual Conference on Neural Information Processing Systems. 2672\u20132680."},{"key":"e_1_3_2_15_2","first-page":"5767","volume-title":"Proceedings of the 2017 Annual Conference on Neural Information Processing Systems","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Mart\u00edn Arjovsky, Vincent Dumoulin, and Aaron C. Courville. 2017. Improved training of Wasserstein GANs. In Proceedings of the 2017 Annual Conference on Neural Information Processing Systems. 5767\u20135777."},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Ihsan Gunes Cihan Kaleli Alper Bilge and Huseyin Polat. 2014. Shilling attacks against recommender systems: A comprehensive survey. Artificial Intelligence Review 42 4 (2014) 767\u2013799.","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.22"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864728"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557072"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_24_2","unstructured":"Xian Yeow Lee Aaron J. Havens Girish Chowdhary and Soumik Sarkar. 2019. Learning to cope with adversarial attacks. arXiv: 1906.12061 (2019)."},{"key":"e_1_3_2_25_2","first-page":"1885","volume-title":"Proceedings of the 2016 Annual Conference on Neural Information Processing Systems","author":"Li Bo","year":"2016","unstructured":"Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In Proceedings of the 2016 Annual Conference on Neural Information Processing Systems. 1885\u20131893."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7500"},{"key":"e_1_3_2_27_2","article-title":"IDSGAN: Generative adversarial networks for attack generation against intrusion detection","author":"Lin Zilong","year":"2018","unstructured":"Zilong Lin, Yong Shi, and Zhi Xue. 2018. IDSGAN: Generative adversarial networks for attack generation against intrusion detection. arXiv:1809.02077 (2018).","journal-title":"arXiv:1809.02077"},{"key":"e_1_3_2_28_2","first-page":"78","article-title":"Auto-painter: Cartoon image generation from sketch by using conditional Wasserstein generative adversarial networks","author":"Liu Yifan","year":"2018","unstructured":"Yifan Liu, Zengchang Qin, Tao Wan, and Zhenbo Luo. 2018. Auto-painter: Cartoon image generation from sketch by using conditional Wasserstein generative adversarial networks. Neurocomputing 311 (2018), 78\u201387.","journal-title":"Neurocomputing"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216307"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9050-4"},{"key":"e_1_3_2_31_2","first-page":"1257","volume-title":"Advances in Neural Information Processing Systems","author":"Mnih Andriy","year":"2008","unstructured":"Andriy Mnih and Ruslan R. Salakhutdinov. 2008. Probabilistic matrix factorization. In Advances in Neural Information Processing Systems. 1257\u20131264."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1360\/N112017-00112"},{"key":"e_1_3_2_35_2","volume-title":"Proceedings of the 4th International Conference on Learning Representations (ICLR\u201916)","author":"Radford Alec","year":"2016","unstructured":"Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In Proceedings of the 4th International Conference on Learning Representations (ICLR\u201916)."},{"key":"e_1_3_2_36_2","unstructured":"Steffen Rendle Christoph Freudenthaler Zeno Gantner and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909) . 452\u2013461."},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.001"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080786"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080786"},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Suhang Wang Jiliang Tang Yilin Wang and Huan Liu. 2018. Exploring hierarchical structures for recommender systems. IEEE Transactions on Knowledge and Data Engineering 30 6 (2018) 1022\u20131035.","DOI":"10.1109\/TKDE.2018.2789443"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16145-3_33"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00102"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271725"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.04.048"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.028"},{"key":"e_1_3_2_46_2","first-page":"2408","volume-title":"Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI\u201915)","author":"Zhang Yongfeng","year":"2015","unstructured":"Yongfeng Zhang, Yunzhi Tan, Min Zhang, Yiqun Liu, Tat-Seng Chua, and Shaoping Ma. 2015. Catch the black sheep: Unified framework for shilling attack detection based on fraudulent action propagation. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI\u201915). 2408\u20132414."}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:42Z","timestamp":1750191102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,14]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10,31]]}},"alternative-id":["10.1145\/3512352"],"URL":"https:\/\/doi.org\/10.1145\/3512352","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,14]]},"assertion":[{"value":"2020-02-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}