{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:57:40Z","timestamp":1752101860855,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2023,7,31]]},"DOI":"10.1145\/3579995","type":"journal-article","created":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T13:51:10Z","timestamp":1675777870000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthy Recommendation and Search: Introduction to the Special Issue - Part 1"],"prefix":"10.1145","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-261X","authenticated-orcid":false,"given":"Hongzhi","family":"Yin","sequence":"first","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1812-6843","authenticated-orcid":false,"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4493-6663","authenticated-orcid":false,"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8312-0694","authenticated-orcid":false,"given":"Evangelos","family":"Kanoulas","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, XH, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,2,7]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1145\/3437963.3441762","volume-title":"WSDM","author":"Chen Hongxu","year":"2021","unstructured":"Hongxu Chen, Yicong Li, Xiangguo Sun, Guandong Xu, and Hongzhi Yin. 2021. Temporal meta-path guided explainable recommendation. In WSDM. 1056\u20131064."},{"key":"e_1_3_1_3_1","article-title":"Bias and debias in recommender system: A survey and future directions","author":"Chen Jiawei","year":"2020","unstructured":"Jiawei Chen, Hande Dong, Xiang Wang, Fuli Feng, Meng Wang, and Xiangnan He. 2020a. Bias and debias in recommender system: A survey and future directions. arXiv preprint arXiv:2010.03240 (2020).","journal-title":"arXiv preprint arXiv:2010.03240"},{"key":"e_1_3_1_4_1","first-page":"304","volume-title":"ICDE","author":"Chen Tong","year":"2019","unstructured":"Tong Chen, Hongzhi Yin, Hongxu Chen, Rui Yan, Quoc Viet Hung Nguyen, and Xue Li. 2019. AIR: Attentional intention-aware recommender systems. In ICDE. 304\u2013315."},{"key":"e_1_3_1_5_1","article-title":"Sequence-aware factorization machines for temporal predictive analytics","author":"Chen Tong","year":"2020","unstructured":"Tong Chen, Hongzhi Yin, Quoc Viet Hung Nguyen, Wen-Chih Peng, Xue Li, and Xiaofang Zhou. 2020b. Sequence-aware factorization machines for temporal predictive analytics. ICDE (2020).","journal-title":"ICDE"},{"key":"e_1_3_1_6_1","first-page":"891","volume-title":"SIGIR","author":"Chen Tong","year":"2020","unstructured":"Tong Chen, Hongzhi Yin, Guanhua Ye, Zi Huang, Yang Wang, and Meng Wang. 2020c. Try this instead: Personalized and interpretable substitute recommendation. In SIGIR. 891\u2013900."},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569452"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00902-6"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565798"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559757"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560486"},{"key":"e_1_3_1_12_1","first-page":"1054","volume-title":"SIGIR","author":"Li Yunqi","year":"2021","unstructured":"Yunqi Li, Hanxiong Chen, Shuyuan Xu, Yingqiang Ge, and Yongfeng Zhang. 2021. Towards personalized fairness based on causal notion. In SIGIR. 1054\u20131063."},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564286"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555374"},{"key":"e_1_3_1_15_1","first-page":"1548","volume-title":"ICDE","author":"Lyu Yanzhang","year":"2021","unstructured":"Yanzhang Lyu, Hongzhi Yin, Jun Liu, Mengyue Liu, Huan Liu, and Shizhuo Deng. 2021. Reliable recommendation with review-level explanations. In ICDE. 1548\u20131558."},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567420"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569453"},{"key":"e_1_3_1_18_1","first-page":"808","volume-title":"SIGIR","author":"Ren Xuhui","year":"2021","unstructured":"Xuhui Ren, Hongzhi Yin, Tong Chen, Hao Wang, Zi Huang, and Kai Zheng. 2021. Learning to ask appropriate questions in conversational recommendation. In SIGIR. 808\u2013817."},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00700-6"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3547333"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3568954"},{"key":"e_1_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3568396"},{"issue":"9","key":"e_1_3_1_23_1","article-title":"Challenging the long tail recommendation","volume":"5","author":"Yin Hongzhi","year":"2012","unstructured":"Hongzhi Yin, Bin Cui, Jing Li, Junjie Yao, and Chen Chen. 2012. Challenging the long tail recommendation. VLDB Endowment 5, 9 (2012).","journal-title":"VLDB Endowment"},{"key":"e_1_3_1_24_1","article-title":"Federated unlearning for on-device recommendation","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Hongzhi Yin, Fangzhao Wu, Shijie Zhang, Tieke He, and Hao Wang. 2023. Federated unlearning for on-device recommendation. WSDM (2023).","journal-title":"WSDM"},{"key":"e_1_3_1_25_1","article-title":"Membership inference attacks against recommender systems","author":"Zhang Minxing","year":"2021","unstructured":"Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, and Yang Zhang. 2021b. Membership inference attacks against recommender systems. CCS (2021).","journal-title":"CCS"},{"key":"e_1_3_1_26_1","first-page":"634","volume-title":"SIGIR","author":"Zhang Peng-Fei","year":"2021","unstructured":"Peng-Fei Zhang, Yang Li, Zi Huang, and Hongzhi Yin. 2021a. Privacy protection in deep multi-modal retrieval. In SIGIR. 634\u2013643."},{"key":"e_1_3_1_27_1","article-title":"Comprehensive privacy analysis on federated recommender system against attribute inference attacks","author":"Zhang Shijie","year":"2022","unstructured":"Shijie Zhang and Hongzhi Yin. 2022. Comprehensive privacy analysis on federated recommender system against attribute inference attacks. arXiv preprint arXiv:2205.11857 (2022).","journal-title":"arXiv preprint arXiv:2205.11857"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_1_29_1","article-title":"PipAttack: Poisoning federated recommender systems for manipulating item promotion","author":"Zhang Shijie","year":"2022","unstructured":"Shijie Zhang, Hongzhi Yin, Tong Chen, Zi Huang, Quoc Viet Hung Nguyen, and Lizhen Cui. 2022. PipAttack: Poisoning federated recommender systems for manipulating item promotion. WSDM (2022).","journal-title":"WSDM"},{"key":"e_1_3_1_30_1","first-page":"689","volume-title":"SIGIR","author":"Zhang Shijie","year":"2020","unstructured":"Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. GCN-based user representation learning for unifying robust recommendation and fraudster detection. In SIGIR. 689\u2013698."},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559758"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:19Z","timestamp":1750183699000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,7]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7,31]]}},"alternative-id":["10.1145\/3579995"],"URL":"https:\/\/doi.org\/10.1145\/3579995","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"type":"print","value":"1046-8188"},{"type":"electronic","value":"1558-2868"}],"subject":[],"published":{"date-parts":[[2023,2,7]]},"assertion":[{"value":"2023-01-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}