{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:03:39Z","timestamp":1770998619599,"version":"3.50.1"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:00:00Z","timestamp":1692316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"General Project of the National Natural Science Foundation of China","award":["61876001"],"award-info":[{"award-number":["61876001"]}]},{"name":"General Project of the Natural Science Foundation of Anhui Province","award":["1808085MF175"],"award-info":[{"award-number":["1808085MF175"]}]},{"name":"Scientific Research Planning Project of Anhui Province","award":["2022AH050072"],"award-info":[{"award-number":["2022AH050072"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>The recommendation performance of deep collaborative filtering models drops sharply under imperceptible adversarial perturbations. Some methods promote the robustness of recommendation systems by adversarial training. However, these methods only study shallow models and lack the exploration of deep models. Furthermore, the way these methods add adversarial noise to the weight parameters of users and items is not fully applicable to deep collaborative filtering models, because the adversarial noise is not sufficient to fully affect its network structure with multiple hidden layers. In this article, we propose a novel adversarial training framework, Random Layer-wise Adversarial Training (RAT), which trains a robust deep collaborative filtering model via adversarial noise propagation. Specifically, we inject adversarial noise into the output of the hidden layer in a random layer-wise manner. The adversarial noise propagates forward from the injected position to obtain more flexible model parameters during the adversarial training process. We validate the effectiveness of RAT on multilayer perceptron (MLP) and implement RAT on MLP-based and convolutional neural networks-based deep collaborative filtering models. Experiments on three publicly available datasets show that the deep collaborative filtering model trained by RAT not only defends against adversarial noise but also guarantees recommendation performance.<\/jats:p>","DOI":"10.1145\/3589000","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T12:53:29Z","timestamp":1692363209000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Training Robust Deep Collaborative Filtering Models via Adversarial Noise Propagation"],"prefix":"10.1145","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9479-4005","authenticated-orcid":false,"given":"Hai","family":"Chen","sequence":"first","affiliation":[{"name":"Anhui University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3811-6995","authenticated-orcid":false,"given":"Fulan","family":"Qian","sequence":"additional","affiliation":[{"name":"Anhui University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1285-6792","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5678-3038","authenticated-orcid":false,"given":"Yanping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Anhui University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-6315","authenticated-orcid":false,"given":"Hang","family":"Su","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7647-3603","authenticated-orcid":false,"given":"Shu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Anhui University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,18]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"1094","volume-title":"SIGIR","author":"Anelli Vito Walter","year":"2021","unstructured":"Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2021. A study of defensive methods to protect visual recommendation against adversarial manipulation of images. In SIGIR. 1094\u20131103."},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1145\/3460231.3478858","volume-title":"RecSys","author":"Anelli Vito Walter","year":"2021","unstructured":"Vito Walter Anelli, Tommaso Di Noia, and Felice Antonio Merra. 2021. The idiosyncratic effects of adversarial training on bias in personalized recommendation learning. In RecSys. 730\u2013735."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115539"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.05.068"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106478"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/3437963.3441757","volume-title":"WSDM","author":"Cohen Rami","year":"2021","unstructured":"Rami Cohen, Oren Sar Shalom, Dietmar Jannach, and Amihood Amir. 2021. A black-box attack model for visually-aware recommender systems. In WSDM. 94\u2013102."},{"key":"e_1_3_2_8_2","article-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with JPEG compression","author":"Das Nilaksh","year":"2017","unstructured":"Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Li Chen, Michael E. Kounavis, and Duen Horng Chau. 2017. Keeping the bad guys out: Protecting and vaccinating deep learning with JPEG compression. arXiv preprint arXiv:1705.02900 (2017).","journal-title":"arXiv preprint arXiv:1705.02900"},{"key":"e_1_3_2_9_2","first-page":"61","volume-title":"AAAI","author":"Deng Zhi-Hong","year":"2019","unstructured":"Zhi-Hong Deng, Ling Huang, Chang-Dong Wang, Jian-Huang Lai, and S. Yu Philip. 2019. DeepCF: A unified framework of representation learning and matching function learning in recommender system. In AAAI, Vol. 33. 61\u201368."},{"key":"e_1_3_2_10_2","first-page":"1","volume-title":"IEEE\/IFIP","author":"Noia Tommaso Di","year":"2020","unstructured":"Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2020. TAAMR: Targeted adversarial attack against multimedia recommender systems. In IEEE\/IFIP. IEEE, 1\u20138."},{"key":"e_1_3_2_11_2","first-page":"9185","volume-title":"CVPR","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting adversarial attacks with momentum. In CVPR. 9185\u20139193."},{"issue":"3","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1109\/TMM.2018.2887018","article-title":"Enhancing the robustness of neural collaborative filtering systems under malicious attacks","volume":"21","author":"Du Y.","year":"2018","unstructured":"Y. Du, M. Fang, J. Yi, C. Xu, J. Cheng, and D. Tao. 2018. Enhancing the robustness of neural collaborative filtering systems under malicious attacks. Trans Multim. 21, 3 (2018), 555\u2013565.","journal-title":"Trans Multim."},{"key":"e_1_3_2_13_2","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"e_1_3_2_14_2","volume-title":"AAAI","author":"He Ruining","year":"2016","unstructured":"Ruining He and Julian McAuley. 2016. VBPR: visual Bayesian personalized ranking from implicit feedback. In AAAI, Vol. 30."},{"key":"e_1_3_2_15_2","first-page":"639","volume-title":"SIGIR","author":"He Xiangnan","year":"2020","unstructured":"Xiangnan He, Kuan Deng, Xiang Wang, Yan Li, Yongdong Zhang, and Meng Wang. 2020. LightGCN: Simplifying and powering graph convolution network for recommendation. In SIGIR. ACM, 639\u2013648."},{"key":"e_1_3_2_16_2","article-title":"Outer product-based neural collaborative filtering","author":"He Xiangnan","year":"2018","unstructured":"Xiangnan He, Xiaoyu Du, Xiang Wang, Feng Tian, Jinhui Tang, and Tat-Seng Chua. 2018. Outer product-based neural collaborative filtering. arXiv preprint arXiv:1808.03912 (2018).","journal-title":"arXiv preprint arXiv:1808.03912"},{"key":"e_1_3_2_17_2","first-page":"355","volume-title":"SIGIR","author":"He Xiangnan","year":"2018","unstructured":"Xiangnan He, Zhankui He, Xiaoyu Du, and Tat-Seng Chua. 2018. Adversarial personalized ranking for recommendation. In SIGIR. ACM, 355\u2013364."},{"key":"e_1_3_2_18_2","first-page":"173","volume-title":"WWW","author":"He Xiangnan","year":"2017","unstructured":"Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173\u2013182."},{"key":"e_1_3_2_19_2","first-page":"549","volume-title":"SIGIR","author":"He Xiangnan","year":"2016","unstructured":"Xiangnan He, Hanwang Zhang, Min-Yen Kan, and Tat-Seng Chua. 2016. Fast matrix factorization for online recommendation with implicit feedback. In SIGIR. 549\u2013558."},{"key":"e_1_3_2_20_2","first-page":"2712","volume-title":"ICML","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks, Kimin Lee, and Mantas Mazeika. 2019. Using pre-training can improve model robustness and uncertainty. In ICML. PMLR, 2712\u20132721."},{"key":"e_1_3_2_21_2","first-page":"2137","volume-title":"ICML","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box adversarial attacks with limited queries and information. In ICML. PMLR, 2137\u20132146."},{"key":"e_1_3_2_22_2","first-page":"233","volume-title":"RecSys","author":"Kim Donghyun","year":"2016","unstructured":"Donghyun Kim, Chanyoung Park, Jinoh Oh, Sungyoung Lee, and Hwanjo Yu. 2016. Convolutional matrix factorization for document context-aware recommendation. In RecSys. 233\u2013240."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1201\/9781351251389-8","volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","year":"2018","unstructured":"Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99\u2013112."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_26_2","first-page":"1139","volume-title":"CIKM","author":"Lee Wonsung","year":"2017","unstructured":"Wonsung Lee, Kyungwoo Song, and Il-Chul Moon. 2017. Augmented variational autoencoders for collaborative filtering with auxiliary information. In CIKM. 1139\u20131148."},{"key":"e_1_3_2_27_2","first-page":"3866","volume-title":"ICML","author":"Li Yandong","year":"2019","unstructured":"Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, and Boqing Gong. 2019. NATTACK: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks. In ICML. PMLR, 3866\u20133876."},{"key":"e_1_3_2_28_2","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin Jiadong","year":"2019","unstructured":"Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, and John E. Hopcroft. 2019. Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281 (2019).","journal-title":"arXiv preprint arXiv:1908.06281"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3082317"},{"key":"e_1_3_2_30_2","first-page":"666","volume-title":"WSDM","author":"Ma Wanqi","year":"2022","unstructured":"Wanqi Ma, Xiancong Chen, Weike Pan, and Zhong Ming. 2022. VAE++ variational autoencoder for heterogeneous one-class collaborative filtering. In WSDM. 666\u2013674."},{"key":"e_1_3_2_31_2","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017).","journal-title":"arXiv preprint arXiv:1706.06083"},{"key":"e_1_3_2_32_2","first-page":"543","volume-title":"Doklady USSR","author":"Nesterov Yurii","year":"1983","unstructured":"Yurii Nesterov. 1983. A method for unconstrained convex minimization problem with the rate of convergence O (1\/k\u03022303 2). In Doklady USSR. Vol. 269. 543\u2013547."},{"key":"e_1_3_2_33_2","first-page":"423","volume-title":"WSDM","author":"Niu Wei","year":"2018","unstructured":"Wei Niu, James Caverlee, and Haokai Lu. 2018. Neural personalized ranking for image recommendation. In WSDM. 423\u2013431."},{"key":"e_1_3_2_34_2","first-page":"7779","article-title":"Boosting adversarial training with hypersphere embedding","volume":"33","author":"Pang Tianyu","year":"2020","unstructured":"Tianyu Pang, Xiao Yang, Yinpeng Dong, Kun Xu, Jun Zhu, and Hang Su. 2020. Boosting adversarial training with hypersphere embedding. Adv. Neural Inf. Process Syst. 33 (2020), 7779\u20137792.","journal-title":"Adv. Neural Inf. Process Syst."},{"key":"e_1_3_2_35_2","first-page":"1443","volume-title":"WWW","author":"Park Dae Hoon","year":"2019","unstructured":"Dae Hoon Park and Yi Chang. 2019. Adversarial sampling and training for semi-supervised information retrieval. In WWW. 1443\u20131453."},{"key":"e_1_3_2_36_2","article-title":"BPR: Bayesian personalized ranking from implicit feedback","author":"Rendle Steffen","year":"2012","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2012. BPR: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618 (2012).","journal-title":"arXiv preprint arXiv:1205.2618"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/2740908.2742726","volume-title":"WWW","author":"Sedhain Suvash","year":"2015","unstructured":"Suvash Sedhain, Aditya Krishna Menon, Scott Sanner, and Lexing Xie. 2015. AutoRec: Autoencoders meet collaborative filtering. In WWW. 111\u2013112."},{"key":"e_1_3_2_38_2","article-title":"Adversarial training for free!","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, and Tom Goldstein. 2019. Adversarial training for free! arXiv preprint arXiv:1904.12843 (2019).","journal-title":"arXiv preprint arXiv:1904.12843"},{"key":"e_1_3_2_39_2","article-title":"Intriguing properties of neural networks","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).","journal-title":"arXiv preprint arXiv:1312.6199"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_41_2","first-page":"565","volume-title":"WSDM","author":"Tang Jiaxi","year":"2018","unstructured":"Jiaxi Tang and Ke Wang. 2018. Personalized top-n sequential recommendation via convolutional sequence embedding. In WSDM. 565\u2013573."},{"key":"e_1_3_2_42_2","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017).","journal-title":"arXiv preprint arXiv:1705.07204"},{"key":"e_1_3_2_43_2","first-page":"5025","volume-title":"ICML","author":"Uesato Jonathan","year":"2018","unstructured":"Jonathan Uesato, Brendan O\u2019Donoghue, Pushmeet Kohli, and Aaron Oord. 2018. Adversarial risk and the dangers of evaluating against weak attacks. In ICML. PMLR, 5025\u20135034."},{"key":"e_1_3_2_44_2","first-page":"172","volume-title":"ICANN","author":"Wang Jiong","year":"2019","unstructured":"Jiong Wang, Neng Gao, Jia Peng, and Jingjie Mo. 2019. DCAR: Deep collaborative autoencoder for recommendation with implicit feedback. In ICANN. Springer, 172\u2013184."},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"7958","DOI":"10.1109\/ACCESS.2019.2963316","article-title":"Adversarial training-based mean Bayesian personalized ranking for recommender system","volume":"8","author":"Wang Jianfang","year":"2019","unstructured":"Jianfang Wang and Pengfei Han. 2019. Adversarial training-based mean Bayesian personalized ranking for recommender system. IEEE Access 8 (2019), 7958\u20137968.","journal-title":"IEEE Access"},{"key":"e_1_3_2_46_2","first-page":"1074","volume-title":"SIGIR","author":"Wu Chenwang","year":"2021","unstructured":"Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, Enhong Chen, and Senchao Yuan. 2021. Fight fire with fire: Towards robust recommender systems via adversarial poisoning training. In SIGIR. ACM, 1074\u20131083."},{"key":"e_1_3_2_47_2","article-title":"Adversarial weight perturbation helps robust generalization","author":"Wu Dongxian","year":"2020","unstructured":"Dongxian Wu, Shu-Tao Xia, and Yisen Wang. 2020. Adversarial weight perturbation helps robust generalization. arXiv preprint arXiv:2004.05884 (2020).","journal-title":"arXiv preprint arXiv:2004.05884"},{"key":"e_1_3_2_48_2","first-page":"153","volume-title":"WISDM","author":"Wu Yao","year":"2016","unstructured":"Yao Wu, Christopher DuBois, Alice X. Zheng, and Martin Ester. 2016. Collaborative denoising auto-encoders for top-n recommender systems. In WISDM. 153\u2013162."},{"key":"e_1_3_2_49_2","first-page":"819","volume-title":"CVPR","author":"Xie Cihang","year":"2020","unstructured":"Cihang Xie, Mingxing Tan, Boqing Gong, Jiang Wang, Alan L. Yuille, and Quoc V. Le. 2020. Adversarial examples improve image recognition. In CVPR. 819\u2013828."},{"key":"e_1_3_2_50_2","article-title":"Mitigating adversarial effects through randomization","author":"Xie Cihang","year":"2017","unstructured":"Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991 (2017).","journal-title":"arXiv preprint arXiv:1711.01991"},{"key":"e_1_3_2_51_2","first-page":"2730","volume-title":"CVPR","author":"Xie Cihang","year":"2019","unstructured":"Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan L. Yuille. 2019. Improving transferability of adversarial examples with input diversity. In CVPR. 2730\u20132739."},{"key":"e_1_3_2_52_2","first-page":"3926","volume-title":"IJCAI","author":"Xin Xin","year":"2019","unstructured":"Xin Xin, Bo Chen, Xiangnan He, Dong Wang, Yue Ding, and Joemon Jose. 2019. CFM: Convolutional factorization machines for context-aware recommendation. In IJCAI, Vol. 19. 3926\u20133932."},{"key":"e_1_3_2_53_2","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017).","journal-title":"arXiv preprint arXiv:1704.01155"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314578"},{"key":"e_1_3_2_55_2","first-page":"3203","volume-title":"IJCAI","author":"Xue Hong-Jian","year":"2017","unstructured":"Hong-Jian Xue, Xinyu Dai, Jianbing Zhang, Shujian Huang, and Jiajun Chen. 2017. Deep matrix factorization models for recommender systems. In IJCAI, Vol. 17. 3203\u20133209."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106687"},{"key":"e_1_3_2_57_2","article-title":"Improved OOD generalization via adversarial training and pre-training","author":"Yi Mingyang","year":"2021","unstructured":"Mingyang Yi, Lu Hou, Jiacheng Sun, Lifeng Shang, Xin Jiang, Qun Liu, and Zhi-Ming Ma. 2021. Improved OOD generalization via adversarial training and pre-training. arXiv preprint arXiv:2105.11144 (2021).","journal-title":"arXiv preprint arXiv:2105.11144"},{"key":"e_1_3_2_58_2","first-page":"1","volume-title":"IJCNN","author":"Yuan Feng","year":"2019","unstructured":"Feng Yuan, Lina Yao, and Boualem Benatallah. 2019. Adversarial collaborative auto-encoder for top-n recommendation. In IJCNN. IEEE, 1\u20138."},{"key":"e_1_3_2_59_2","first-page":"1065","volume-title":"SIGIR","author":"Yuan Feng","year":"2019","unstructured":"Feng Yuan, Lina Yao, and Boualem Benatallah. 2019. Adversarial collaborative neural network for robust recommendation. In SIGIR. 1065\u20131068."},{"key":"e_1_3_2_60_2","volume-title":"IJCAI","author":"Zhang Quangui","year":"2018","unstructured":"Quangui Zhang, Longbing Cao, Chengzhang Zhu, Zhiqiang Li, and Jinguang Sun. 2018. CoupleDCF: Learning explicit and implicit user-item couplings in recommendation for deep collaborative filtering. In IJCAI."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3158369"},{"key":"e_1_3_2_62_2","first-page":"1449","volume-title":"CIKM","author":"Zhang Yongfeng","year":"2017","unstructured":"Yongfeng Zhang, Qingyao Ai, Xu Chen, and W. Bruce Croft. 2017. Joint representation learning for top-n recommendation with heterogeneous information sources. In CIKM. 1449\u20131458."}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:15Z","timestamp":1750178175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,18]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3589000"],"URL":"https:\/\/doi.org\/10.1145\/3589000","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,18]]},"assertion":[{"value":"2022-05-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}