{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:29:14Z","timestamp":1766503754693,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["62102335"],"award-info":[{"award-number":["62102335"]}]},{"name":"The Hong Kong Polytechnic University","award":["P0036200 and P0042693"],"award-info":[{"award-number":["P0036200 and P0042693"]}]},{"name":"the Hong Kong Research Grants Council","award":["PolyU 15200021 and 15207322"],"award-info":[{"award-number":["PolyU 15200021 and 15207322"]}]},{"name":"Collaborative Project","award":["P0041282"],"award-info":[{"award-number":["P0041282"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599575","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"5796-5797","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Trustworthy Recommender Systems: Foundations and Frontiers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4049-1233","authenticated-orcid":false,"given":"Wenqi","family":"Fan","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2926-4416","authenticated-orcid":false,"given":"Xiangyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4477-8741","authenticated-orcid":false,"given":"Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-0211","authenticated-orcid":false,"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University &amp; Innovation, Chinese Academy of Sciences, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-5972","authenticated-orcid":false,"given":"Jingtong","family":"Gao","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0751-2602","authenticated-orcid":false,"given":"Qidong","family":"Liu","sequence":"additional","affiliation":[{"name":"City University of Hong Kong &amp; Xi'an Jiaotong University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7389-3810","authenticated-orcid":false,"given":"Shijie","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong SAR, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Survey and Taxonomy. arXiv preprint arXiv:1806.07629","author":"Aghasian Erfan","year":"2018","unstructured":"Erfan Aghasian , Saurabh Garg , and James Montgomery . 2018. User's Privacy in Recommendation Systems Applying Online Social Network Data , A Survey and Taxonomy. arXiv preprint arXiv:1806.07629 ( 2018 ). Erfan Aghasian, Saurabh Garg, and James Montgomery. 2018. User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy. arXiv preprint arXiv:1806.07629 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Jingfan Chen Wenqi Fan Guanghui Zhu Xiangyu Zhao Chunfeng Yuan Qing Li and Yihua Huang. 2022. Knowledge-enhanced Black-box Attacks for Recommendations. In SIGKDD. 108--117.  Jingfan Chen Wenqi Fan Guanghui Zhu Xiangyu Zhao Chunfeng Yuan Qing Li and Yihua Huang. 2022. Knowledge-enhanced Black-box Attacks for Recommendations. In SIGKDD. 108--117.","DOI":"10.1145\/3534678.3539359"},{"key":"e_1_3_2_1_3_1","volume-title":"Fairly Adaptive Negative Sampling for Recommendations. WWW","author":"Chen Xiao","year":"2023","unstructured":"Xiao Chen , Wenqi Fan , Jingfan Chen , Haochen Liu , Zitao Liu , Zhaoxiang Zhang , and Qing Li. 2023. Fairly Adaptive Negative Sampling for Recommendations. WWW ( 2023 ). Xiao Chen, Wenqi Fan, Jingfan Chen, Haochen Liu, Zitao Liu, Zhaoxiang Zhang, and Qing Li. 2023. Fairly Adaptive Negative Sampling for Recommendations. WWW (2023)."},{"volume-title":"Attacking black-box recommendations via copying cross-domain user profiles","author":"Fan Wenqi","key":"e_1_3_2_1_4_1","unstructured":"Wenqi Fan , Tyler Derr , Xiangyu Zhao , Yao Ma , Hui Liu , Jianping Wang , Jiliang Tang , and Qing Li. 2021. Attacking black-box recommendations via copying cross-domain user profiles . In IEEE ICDE. IEEE. Wenqi Fan, Tyler Derr, Xiangyu Zhao, Yao Ma, Hui Liu, Jianping Wang, Jiliang Tang, and Qing Li. 2021. Attacking black-box recommendations via copying cross-domain user profiles. In IEEE ICDE. IEEE."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00056"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Qing Li and Min Cheng. 2018. Deep modeling of social relations for recommendation. In AAAI.  Wenqi Fan Qing Li and Min Cheng. 2018. Deep modeling of social relations for recommendation. In AAAI.","DOI":"10.1609\/aaai.v32i1.12132"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Xiaorui Liu Wei Jin Xiangyu Zhao Jiliang Tang and Qing Li. 2022. Graph trend filtering networks for recommendation. In SIGIR.  Wenqi Fan Xiaorui Liu Wei Jin Xiangyu Zhao Jiliang Tang and Qing Li. 2022. Graph trend filtering networks for recommendation. In SIGIR.","DOI":"10.1145\/3477495.3531985"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Yao Ma Qing Li Yuan He Eric Zhao Jiliang Tang and Dawei Yin. 2019. Graph neural networks for social recommendation. In WWW.  Wenqi Fan Yao Ma Qing Li Yuan He Eric Zhao Jiliang Tang and Dawei Yin. 2019. Graph neural networks for social recommendation. In WWW.","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3008732"},{"key":"e_1_3_2_1_10_1","volume-title":"A Comprehensive Survey on Trustworthy Recommender Systems. arXiv:2209.10117","author":"Fan Wenqi","year":"2022","unstructured":"Wenqi Fan , Xiangyu Zhao , Xiao Chen , Jingran Su , Jingtong Gao , Lin Wang , Qidong Liu , Yiqi Wang , Han Xu , Lei Chen , and Qing Li. 2022. A Comprehensive Survey on Trustworthy Recommender Systems. arXiv:2209.10117 ( 2022 ). Wenqi Fan, Xiangyu Zhao, Xiao Chen, Jingran Su, Jingtong Gao, Lin Wang, Qidong Liu, Yiqi Wang, Han Xu, Lei Chen, and Qing Li. 2022. A Comprehensive Survey on Trustworthy Recommender Systems. arXiv:2209.10117 (2022)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3272652"},{"key":"e_1_3_2_1_12_1","volume-title":"Trustworthy ai: A computational perspective. ACM TIST","author":"Liu Haochen","year":"2022","unstructured":"Haochen Liu , YiqiWang, Wenqi Fan , Xiaorui Liu , Yaxin Li , Shaili Jain , Yunhao Liu , Anil Jain , and Jiliang Tang . 2022. Trustworthy ai: A computational perspective. ACM TIST ( 2022 ). Haochen Liu, YiqiWang,Wenqi Fan, Xiaorui Liu, Yaxin Li, Shaili Jain, Yunhao Liu, Anil Jain, and Jiliang Tang. 2022. Trustworthy ai: A computational perspective. ACM TIST (2022)."}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Long Beach CA USA","acronym":"KDD '23"},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:52Z","timestamp":1750178272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":12,"alternative-id":["10.1145\/3580305.3599575","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599575","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}