{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T03:31:52Z","timestamp":1772595112539,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T00:00:00Z","timestamp":1689638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,19]]},"DOI":"10.1145\/3539618.3591971","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:22:59Z","timestamp":1689726179000},"page":"1924-1928","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Denoise to Protect: A Method to Robustify Visual Recommenders from Adversaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8429-3487","authenticated-orcid":false,"given":"Felice Antonio","family":"Merra","sequence":"first","affiliation":[{"name":"Amazon, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5567-4307","authenticated-orcid":false,"given":"Vito Walter","family":"Anelli","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0939-5462","authenticated-orcid":false,"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2228-0333","authenticated-orcid":false,"given":"Daniele","family":"Malitesta","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8027-9475","authenticated-orcid":false,"given":"Alberto Carlo Maria","family":"Mancino","sequence":"additional","affiliation":[{"name":"Politecnico di Bari, Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,7,18]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Daniele Malitesta, and Felice Antonio Merra.","author":"Anelli Vito Walter","year":"2021","unstructured":"Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2021b. A Study of Defensive Methods to Protect Visual Recommendation Against Adversarial Manipulation of Images. In SIGIR. ACM, 1094--1103."},{"key":"e_1_3_2_2_2_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Anelli Vito Walter","year":"2021","unstructured":"Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2021a. A Formal Analysis of Recommendation Quality of Adversarially-trained Recommenders. In CIKM. ACM, 2852--2856."},{"key":"e_1_3_2_2_3_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Anelli Vito Walter","year":"2022","unstructured":"Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2022. Adversarial Recommender Systems: Attack, Defense, and Advances. In Recommender Systems Handbook. Springer US, 335--379."},{"key":"e_1_3_2_2_4_1","volume-title":"Hurley","author":"Burke Robin","year":"2015","unstructured":"Robin Burke, Michael P. O'Mahony, and Neil J. Hurley. 2015. Robust Collaborative Recommendation. In Recommender Systems Handbook. Springer, 961--995."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531763"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Jingyuan Chen Hanwang Zhang Xiangnan He Liqiang Nie Wei Liu and Tat-Seng Chua. 2017. Attentive Collaborative Filtering: Multimedia Recommendation with Item- and Component-Level Attention. In SIGIR. ACM.","DOI":"10.1145\/3077136.3080797"},{"key":"e_1_3_2_2_7_1","volume-title":"Dietmar Jannach, and Amihood Amir.","author":"Cohen Rami","year":"2021","unstructured":"Rami Cohen, Oren Sar Shalom, Dietmar Jannach, and Amihood Amir. 2021. A Black-Box Attack Model for Visually-Aware Recommender Systems. In WSDM. ACM, 94--102."},{"key":"e_1_3_2_2_8_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Deldjoo Yashar","year":"2021","unstructured":"Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2021. A Survey on Adversarial Recommender Systems: From Attack\/Defense Strategies to Generative Adversarial Networks. ACM Comput. Surv., Vol. 54, 2 (2021), 35:1--35:38."},{"key":"e_1_3_2_2_9_1","volume-title":"DSN Workshops. IEEE, 1--8.","author":"Noia Tommaso Di","year":"2020","unstructured":"Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2020. TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems. In DSN Workshops. IEEE, 1--8."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"David Elsweiler Christoph Trattner and Morgan Harvey. 2017. Exploiting Food Choice Biases for Healthier Recipe Recommendation. In SIGIR. ACM 575--584.","DOI":"10.1145\/3077136.3080826"},{"key":"e_1_3_2_2_11_1","volume-title":"Learning Image and User Features for Recommendation in Social Networks","author":"Geng Xue","unstructured":"Xue Geng, Hanwang Zhang, Jingwen Bian, and Tat-Seng Chua. 2015. Learning Image and User Features for Recommendation in Social Networks. In ICCV. IEEE Computer Society, 4274--4282."},{"key":"e_1_3_2_2_12_1","volume-title":"Deep Residual Learning for Image Recognition","author":"He Kaiming","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In CVPR. IEEE Computer Society, 770--778."},{"key":"e_1_3_2_2_13_1","volume-title":"McAuley","author":"He Ruining","year":"2016","unstructured":"Ruining He and Julian J. McAuley. 2016a. Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering. In WWW 2016."},{"key":"e_1_3_2_2_14_1","volume-title":"McAuley","author":"He Ruining","year":"2016","unstructured":"Ruining He and Julian J. McAuley. 2016b. VBPR: Visual Bayesian Personalized Ranking from Implicit Feedback. In AAAI. AAAI Press, 144--150."},{"key":"e_1_3_2_2_15_1","unstructured":"Xiangnan He Zhankui He Xiaoyu Du and Tat-Seng Chua. 2018. Adversarial Personalized Ranking for Recommendation. In SIGIR. ACM 355--364."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural Collaborative Filtering. In WWW. ACM 173--182.","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_2_17_1","volume-title":"Davis","author":"Hu Yang","year":"2015","unstructured":"Yang Hu, Xi Yi, and Larry S. Davis. 2015. Collaborative Fashion Recommendation: A Functional Tensor Factorization Approach. In ACM Multimedia. ACM, 129--138."},{"key":"e_1_3_2_2_18_1","volume-title":"Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser","author":"Liao Fangzhou","unstructured":"Fangzhou Liao, Ming Liang, Yinpeng Dong, Tianyu Pang, Xiaolin Hu, and Jun Zhu. 2018. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. In CVPR. Computer Vision Foundation \/ IEEE Computer Society, 1778--1787."},{"key":"e_1_3_2_2_19_1","volume-title":"Larson","author":"Liu Zhuoran","year":"2021","unstructured":"Zhuoran Liu and Martha A. Larson. 2021. Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start. In WWW. ACM \/ IW3C2, 3590--3602."},{"key":"e_1_3_2_2_20_1","volume-title":"Image-Based Recommendations on Styles and Substitutes. In SIGIR","author":"McAuley Julian J.","year":"2015","unstructured":"Julian J. McAuley, Christopher Targett, Qinfeng Shi, and Anton van den Hengel. 2015. Image-Based Recommendations on Styles and Substitutes. In SIGIR 2015."},{"key":"e_1_3_2_2_21_1","volume-title":"MICCAI (3) (Lecture Notes in Computer Science","author":"Ronneberger Olaf","unstructured":"Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-Net: Convolutional Networks for Biomedical Image Segmentation. In MICCAI (3) (Lecture Notes in Computer Science, Vol. 9351). Springer, 234--241."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Chenwang Wu Defu Lian Yong Ge Zhihao Zhu Enhong Chen and Senchao Yuan. 2021. Fight Fire with Fire: Towards Robust Recommender Systems via Adversarial Poisoning Training. In SIGIR. ACM 1074--1083.","DOI":"10.1145\/3404835.3462914"}],"event":{"name":"SIGIR '23: The 46th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Taipei Taiwan","acronym":"SIGIR '23","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3539618.3591971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3539618.3591971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:48Z","timestamp":1750178268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3539618.3591971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,18]]},"references-count":24,"alternative-id":["10.1145\/3539618.3591971","10.1145\/3539618"],"URL":"https:\/\/doi.org\/10.1145\/3539618.3591971","relation":{},"subject":[],"published":{"date-parts":[[2023,7,18]]},"assertion":[{"value":"2023-07-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}