{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:55:41Z","timestamp":1773442541426,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"General Research Fund from the Hong Kong Research Grants Council","award":["PolyU 15200021"],"award-info":[{"award-number":["PolyU 15200021"]}]},{"name":"APRC - CityU New Research Initiatives","award":["9610565"],"award-info":[{"award-number":["9610565"]}]},{"name":"SIRG - CityU Strategic Interdisciplinary Research Grant","award":["7020046;7020074"],"award-info":[{"award-number":["7020046;7020074"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20210181"],"award-info":[{"award-number":["BK20210181"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Tencent Open Fund"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102335;62102177;U1811461"],"award-info":[{"award-number":["62102335;62102177;U1811461"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["BE2021729"],"award-info":[{"award-number":["BE2021729"]}]},{"name":"Open Research Projects of Zhejiang Lab","award":["2022PG0AB07"],"award-info":[{"award-number":["2022PG0AB07"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539359","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"108-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Knowledge-enhanced Black-box Attacks for Recommendations"],"prefix":"10.1145","author":[{"given":"Jingfan","family":"Chen","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Wenqi","family":"Fan","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Guanghui","family":"Zhu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Xiangyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]},{"given":"Chunfeng","family":"Yuan","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Yihua","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77385-4_37"},{"key":"e_1_3_2_2_2_1","volume-title":"Translating embeddings for modeling multi-relational data. NeurIPS 2013","author":"Bordes Antoine","year":"2013","unstructured":"Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. NeurIPS 2013 (2013)."},{"key":"e_1_3_2_2_3_1","volume-title":"Automated Machine Learning for Deep Recommender Systems: A Survey. arXiv preprint arXiv:2204.01390","author":"Chen Bo","year":"2022","unstructured":"Bo Chen, Xiangyu Zhao, Yejing Wang, Wenqi Fan, Huifeng Guo, and Ruiming Tang. 2022. Automated Machine Learning for Deep Recommender Systems: A Survey. arXiv preprint arXiv:2204.01390 (2022)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial Attacks on an Oblivious Recommender. In RecSys 2019 .","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Tyler Derr Yao Ma Jianping Wang Jiliang Tang and Qing Li. 2019 a. Deep Adversarial Social Recommendation. In IJCAI. 1351--1357.","DOI":"10.24963\/ijcai.2019\/187"},{"key":"e_1_3_2_2_8_1","volume-title":"ICDE 2021 .","author":"Fan Wenqi","year":"2020","unstructured":"Wenqi Fan, Tyler Derr, Xiangyu Zhao, Yao Ma, Hui Liu, Jianping Wang, Jiliang Tang, and Qing Li. 2020 a. Attacking Black-box Recommendations via Copying Cross-domain User Profiles. In ICDE 2021 ."},{"key":"e_1_3_2_2_9_1","unstructured":"Wenqi Fan Wei Jin Xiaorui Liu Han Xu Xianfeng Tang Suhang Wang Qing Li Jiliang Tang Jianping Wang and C. Aggarwal. 2021. Jointly Attacking Graph Neural Network and its Explanations. arXiv preprint arXiv:2108.03388 (2021)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12132"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Xiaorui Liu Wei Jin Xiangyu Zhao Jiliang Tang and Qing Li. 2022. Graph Trend Filtering Networks for Recommendations. In SIGIR.","DOI":"10.1145\/3477495.3531985"},{"key":"e_1_3_2_2_12_1","volume-title":"WWW","author":"Fan Wenqi","year":"2019","unstructured":"Wenqi Fan, Yao Ma, Qing Li, Yuan He, Eric Zhao, Jiliang Tang, and Dawei Yin. 2019 b. Graph neural networks for social recommendation. In WWW 2019. 417--426."},{"key":"e_1_3_2_2_13_1","volume-title":"TKDE 2020","author":"Fan Wenqi","year":"2020","unstructured":"Wenqi Fan, Yao Ma, Qing Li, Jianping Wang, Guoyong Cai, Jiliang Tang, and Dawei Yin. 2020 b. A graph neural network framework for social recommendations. TKDE 2020 (2020)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347011"},{"key":"e_1_3_2_2_15_1","volume-title":"Neil Zhenqiang Gong, and Jia Liu","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Neil Zhenqiang Gong, and Jia Liu. 2020. Influence Function Based Data Poisoning Attacks to Top-N Recommender Systems. In WWW 2020."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_2_17_1","volume-title":"WWW","author":"He Xiangnan","year":"2017","unstructured":"Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW 2017."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24525"},{"key":"e_1_3_2_2_19_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In ICLR","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR 2017."},{"key":"e_1_3_2_2_20_1","volume-title":"NeurIPS","author":"Li Bo","year":"2016","unstructured":"Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NeurIPS 2016."},{"key":"e_1_3_2_2_21_1","volume-title":"ICLR","author":"Lillicrap Timothy P","year":"2016","unstructured":"Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. 2016. Continuous control with deep reinforcement learning. In ICLR 2016."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_2_23_1","volume-title":"Trustworthy ai: A computational perspective. arXiv preprint arXiv:2107.06641","author":"Liu Haochen","year":"2021","unstructured":"Haochen Liu, Yiqi Wang, Wenqi Fan, Xiaorui Liu, Yaxin Li, Shaili Jain, Yunhao Liu, Anil K Jain, and Jiliang Tang. 2021. Trustworthy ai: A computational perspective. arXiv preprint arXiv:2107.06641 (2021)."},{"key":"e_1_3_2_2_24_1","volume-title":"Asynchronous Methods for Deep Reinforcement Learning. In ICML","author":"Mnih Volodymyr","year":"2016","unstructured":"Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. 2016. Asynchronous Methods for Deep Reinforcement Learning. In ICML 2016."},{"key":"e_1_3_2_2_25_1","volume-title":"Leveraging Knowledge Graphs of Movies and Their Content for Web-Scale Analysis. In SITIS","author":"Orlandi Fabrizio","year":"2018","unstructured":"Fabrizio Orlandi, Jeremy Debattista, Islam A. Hassan, Clare Conran, Majid Latifi, Matthew Nicholson, Fahim A. Salim, Daniel Turner, Owen Conlan, Declan O'sullivan, and Jian Tang. 2018. Leveraging Knowledge Graphs of Movies and Their Content for Web-Scale Analysis. In SITIS 2018."},{"key":"e_1_3_2_2_26_1","volume-title":"Proximal policy optimization algorithms. arXiv preprint:1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint:1707.06347 (2017)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"e_1_3_2_2_28_1","volume-title":"PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems. In ICDE 2020 .","author":"Song Junshuai","year":"2020","unstructured":"Junshuai Song, Zhao Li, Zehong Hu, Yucheng Wu, Zhenpeng Li, Jian Li, and Jun Gao. 2020. PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems. In ICDE 2020 ."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Zhu Sun Di Yu Hui Fang Jie Yang Xinghua Qu Jie Zhang and Cong Geng. 2020. Are We Evaluating Rigorously? Benchmarking Recommendation for Reproducible Evaluation and Fair Comparison. In RecSys 2020 .","DOI":"10.1145\/3383313.3412489"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.02.005"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271739"},{"key":"e_1_3_2_2_33_1","volume-title":"Knowledge Graph Convolutional Networks for Recommender Systems. In WWW","author":"Wang Hongwei","year":"2019","unstructured":"Hongwei Wang, Miao Zhao, Xing Xie, Wenjie Li, and Minyi Guo. 2019 b. Knowledge Graph Convolutional Networks for Recommender Systems. In WWW 2019."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331267"},{"key":"e_1_3_2_2_35_1","volume-title":"Triple Adversarial Learning for Influence Based Poisoning Attack in Recommender Systems","author":"Wu Chenwang","year":"1830","unstructured":"Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2021. Triple Adversarial Learning for Influence Based Poisoning Attack in Recommender Systems. Association for Computing Machinery, New York, NY, USA, 1830--1840."},{"key":"e_1_3_2_2_36_1","volume-title":"Graph Convolutional Neural Networks for Web-Scale Recommender Systems. In KDD","author":"Ying Rex","year":"2018","unstructured":"Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec. 2018. Graph Convolutional Neural Networks for Web-Scale Recommender Systems. In KDD 2018."},{"key":"e_1_3_2_2_37_1","unstructured":"Zhenrui Yue Zhankui He Huimin Zeng and Julian McAuley. 2021. Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction. In RecSys."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Xiangyu Zhao Haochen Liu Wenqi Fan Hui Liu Jiliang Tang and Chong Wang. 2021 a. Autoloss: Automated loss function search in recommendations. In ACM KDD. 3959--3967.","DOI":"10.1145\/3447548.3467208"},{"key":"e_1_3_2_2_39_1","volume-title":"2021 b. Autoemb: Automated embedding dimensionality search in streaming recommendations","author":"Zhao Xiangyu","unstructured":"Xiangyu Zhao, Haochen Liu, Wenqi Fan, Hui Liu, Jiliang Tang, Chong Wang, Ming Chen, Xudong Zheng, Xiaobing Liu, and Xiwang Yang. 2021 b. Autoemb: Automated embedding dimensionality search in streaming recommendations. In ICDM. IEEE, 896--905."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330668"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:47Z","timestamp":1750186967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":40,"alternative-id":["10.1145\/3534678.3539359","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539359","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}