{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:14Z","timestamp":1750219814097,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2023,10,31]]},"DOI":"10.1145\/3604776","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T10:11:22Z","timestamp":1690539082000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trustworthy Recommendation and Search: Introduction to the Special Section - Part 2"],"prefix":"10.1145","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-261X","authenticated-orcid":false,"given":"Hongzhi","family":"Yin","sequence":"first","affiliation":[{"name":"The University of Queensland Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1812-6843","authenticated-orcid":false,"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4493-6663","authenticated-orcid":false,"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8312-0694","authenticated-orcid":false,"given":"Evangelos","family":"Kanoulas","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1145\/3437963.3441762","volume-title":"WSDM","author":"Chen Hongxu","year":"2021","unstructured":"Hongxu Chen, Yicong Li, Xiangguo Sun, Guandong Xu, and Hongzhi Yin. 2021. Temporal meta-path guided explainable recommendation. In WSDM. 1056\u20131064."},{"key":"e_1_3_1_3_1","article-title":"Bias and debias in recommender system: A survey and future directions","author":"Chen Jiawei","year":"2020","unstructured":"Jiawei Chen, Hande Dong, Xiang Wang, Fuli Feng, Meng Wang, and Xiangnan He. 2020a. Bias and debias in recommender system: A survey and future directions. arXiv preprint arXiv:2010.03240 (2020).","journal-title":"arXiv preprint arXiv:2010.03240"},{"key":"e_1_3_1_4_1","first-page":"304","volume-title":"ICDE","author":"Chen Tong","year":"2019","unstructured":"Tong Chen, Hongzhi Yin, Hongxu Chen, Rui Yan, Quoc Viet Hung Nguyen, and Xue Li. 2019. Air: Attentional intention-aware recommender systems. In ICDE. 304\u2013315."},{"key":"e_1_3_1_5_1","first-page":"1405","volume-title":"ICDE","author":"Chen Tong","year":"2020","unstructured":"Tong Chen, Hongzhi Yin, Quoc Viet Hung Nguyen, Wen-Chih Peng, Xue Li, and Xiaofang Zhou. 2020b. Sequence-aware factorization machines for temporal predictive analytics. In ICDE. 1405\u20131416."},{"key":"e_1_3_1_6_1","first-page":"891","volume-title":"SIGIR","author":"Chen Tong","year":"2020","unstructured":"Tong Chen, Hongzhi Yin, Guanhua Ye, Zi Huang, Yang Wang, and Meng Wang. 2020c. Try this instead: Personalized and interpretable substitute recommendation. In SIGIR. 891\u2013900."},{"key":"e_1_3_1_7_1","article-title":"PRADA: Practical black-box adversarial attacks against neural ranking models","author":"Chen Wu","year":"2022","unstructured":"Wu Chen, Ruqing Zhang, Jiafeng Guo, Maarten De Rijke, Yixing Fan, and Xueqi Cheng. 2022. PRADA: Practical black-box adversarial attacks against neural ranking models. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00902-6"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569086"},{"key":"e_1_3_1_10_1","article-title":"Automated prompting for non-overlapping cross-domain sequential recommendation","author":"Guo Lei","year":"2023","unstructured":"Lei Guo, Chunxiao Wang, Xinhua Wang, Lei Zhu, and Hongzhi Yin. 2023. Automated prompting for non-overlapping cross-domain sequential recommendation. arXiv preprint arXiv:2304.04218 (2023).","journal-title":"arXiv preprint arXiv:2304.04218"},{"key":"e_1_3_1_11_1","first-page":"1","article-title":"Reinforcement learning-enhanced shared-account cross-domain sequential recommendation","author":"Guo Lei","year":"2022","unstructured":"Lei Guo, Jinyu Zhang, Tong Chen, Xinhua Wang, and Hongzhi Yin. 2022b. Reinforcement learning-enhanced shared-account cross-domain sequential recommendation. IEEE Transactions on Knowledge and Data Engineering (2022), 1\u201314.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_12_1","first-page":"1","article-title":"Time interval-enhanced graph neural network for shared-account cross-domain sequential recommendation","author":"Guo Lei","year":"2022","unstructured":"Lei Guo, Jinyu Zhang, Li Tang, Tong Chen, Lei Zhu, and Hongzhi Yin. 2022c. Time interval-enhanced graph neural network for shared-account cross-domain sequential recommendation. IEEE Transactions on Neural Networks and Learning Systems (2022), 1\u201315.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_1_13_1","article-title":"Disentangled representations learning for multi-target cross-domain recommendation","author":"Guo Xiaobo","year":"2022","unstructured":"Xiaobo Guo, Shaoshuai Li, Naicheng Guo, Jiangxia Cao, Xiaolei Liu, Qiongxu Ma, Runsheng Gan, and Yunan Zhao. 2022a. Disentangled representations learning for multi-target cross-domain recommendation. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_14_1","article-title":"An efficient and robust semantic hashing framework for similar text search","author":"He Liyang","year":"2022","unstructured":"Liyang He, Zhenya Huang, Qi Liu, Shiwei Tong, Hao Wang, Defu Lian, and Shijin Wang. 2022. An efficient and robust semantic hashing framework for similar text search. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560486"},{"key":"e_1_3_1_16_1","article-title":"Extractive explanations for interpretable text ranking","author":"Leonhardt Jurek","year":"2022","unstructured":"Jurek Leonhardt, Koustav Rudra, and Avishek Anand. 2022. Extractive explanations for interpretable text ranking. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_17_1","article-title":"Topic-aware intention network for explainable recommendation with knowledge enhancement","author":"Li Qiming","year":"2022","unstructured":"Qiming Li, Zhao Zhang, Fuzhen Zhuang, Yongjun Xu, and Chao Li. 2022. Topic-aware intention network for explainable recommendation with knowledge enhancement. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_18_1","first-page":"1054","volume-title":"SIGIR","author":"Li Yunqi","year":"2021","unstructured":"Yunqi Li, Hanxiong Chen, Shuyuan Xu, Yingqiang Ge, and Yongfeng Zhang. 2021. Towards personalized fairness based on causal notion. In SIGIR. 1054\u20131063."},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555374"},{"key":"e_1_3_1_20_1","first-page":"1548","volume-title":"ICDE","author":"Lyu Yanzhang","year":"2021","unstructured":"Yanzhang Lyu, Hongzhi Yin, Jun Liu, Mengyue Liu, Huan Liu, and Shizhuo Deng. 2021. Reliable recommendation with review-level explanations. In ICDE. 1548\u20131558."},{"key":"e_1_3_1_21_1","article-title":"Recognize news transition from collective behavior for news recommendation","author":"Meng Qing","year":"2022","unstructured":"Qing Meng, Hui Yan, Bo Liu, Xiangguo Sun, Mingrui Hu, and Jiuxin Cao. 2022. Recognize news transition from collective behavior for news recommendation. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_22_1","first-page":"1749","volume-title":"ICDE","author":"Nguyen Quoc Viet Hung","year":"2018","unstructured":"Quoc Viet Hung Nguyen, Huu Viet Huynh, Thanh Tam Nguyen, Matthias Weidlich, Hongzhi Yin, and Xiaofang Zhou. 2018. Computing crowd consensus with partial agreement. In ICDE. 1749\u20131750."},{"key":"e_1_3_1_23_1","first-page":"808","volume-title":"SIGIR","author":"Ren Xuhui","year":"2021","unstructured":"Xuhui Ren, Hongzhi Yin, Tong Chen, Hao Wang, Zi Huang, and Kai Zheng. 2021. Learning to ask appropriate questions in conversational recommendation. In SIGIR. 808\u2013817."},{"key":"e_1_3_1_24_1","article-title":"Quotation recommendation for multi-party online conversations based on semantic and topic fusion","author":"Wang Lingzhi","year":"2022","unstructured":"Lingzhi Wang, Xingshan Zeng, and Kam-Fai Wong. 2022b. Quotation recommendation for multi-party online conversations based on semantic and topic fusion. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00700-6"},{"key":"e_1_3_1_26_1","article-title":"On the vulnerability of graph learning based collaborative filtering","author":"Xu Senrong","year":"2022","unstructured":"Senrong Xu, Liangyue Li, Zenan Li, Yuan Yao, Feng Xu, Zulong Chen, Quan Lu, and Hanghang Tong. 2022. On the vulnerability of graph learning based collaborative filtering. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572028"},{"issue":"9","key":"e_1_3_1_28_1","article-title":"Challenging the long tail recommendation","volume":"5","author":"Yin Hongzhi","year":"2012","unstructured":"Hongzhi Yin, Bin Cui, Jing Li, Junjie Yao, and Chen Chen. 2012. Challenging the long tail recommendation. VLDB Endowment 5, 9 (2012).","journal-title":"VLDB Endowment"},{"key":"e_1_3_1_29_1","first-page":"1294","volume-title":"SIGIR","author":"Yu Junliang","year":"2022","unstructured":"Junliang Yu, Hongzhi Yin, Xin Xia, Tong Chen, Lizhen Cui, and Quoc Viet Hung Nguyen. 2022. Are graph augmentations necessary? Simple graph contrastive learning for recommendation. In SIGIR. 1294\u20131303."},{"key":"e_1_3_1_30_1","article-title":"Manipulating federated recommender systems: Poisoning with synthetic users and its countermeasures","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Quoc Viet Hung Nguyen, Tieke He, Liang Chen, and Hongzhi Yin. 2023a. Manipulating federated recommender systems: Poisoning with synthetic users and its countermeasures. arXiv preprint arXiv:2304.03054 (2023).","journal-title":"arXiv preprint arXiv:2304.03054"},{"key":"e_1_3_1_31_1","article-title":"Interaction-level membership inference attack against federated recommender systems","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Chaoqun Yang, Quoc Viet Hung Nguyen, Lizhen Cui, Tieke He, and Hongzhi Yin. 2023b. Interaction-level membership inference attack against federated recommender systems. arXiv preprint arXiv:2301.10964 (2023).","journal-title":"arXiv preprint arXiv:2301.10964"},{"key":"e_1_3_1_32_1","article-title":"Federated unlearning for on-device recommendation","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Hongzhi Yin, Fangzhao Wu, Shijie Zhang, Tieke He, and Hao Wang. 2023c. Federated unlearning for on-device recommendation. WSDM (2023).","journal-title":"WSDM"},{"key":"e_1_3_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578361"},{"key":"e_1_3_1_34_1","article-title":"Membership inference attacks against recommender systems","author":"Zhang Minxing","year":"2021","unstructured":"Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, and Yang Zhang. 2021b. Membership inference attacks against recommender systems. CCS (2021).","journal-title":"CCS"},{"key":"e_1_3_1_35_1","first-page":"634","volume-title":"SIGIR","author":"Zhang Peng-Fei","year":"2021","unstructured":"Peng-Fei Zhang, Yang Li, Zi Huang, and Hongzhi Yin. 2021a. Privacy protection in deep multi-modal retrieval. In SIGIR. 634\u2013643."},{"key":"e_1_3_1_36_1","article-title":"Comprehensive privacy analysis on federated recommender system against attribute inference attacks","author":"Zhang Shijie","year":"2022","unstructured":"Shijie Zhang and Hongzhi Yin. 2022. Comprehensive privacy analysis on federated recommender system against attribute inference attacks. arXiv preprint arXiv:2205.11857 (2022).","journal-title":"arXiv preprint arXiv:2205.11857"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_1_38_1","article-title":"PipAttack: Poisoning federated recommender systems for manipulating item promotion","author":"Zhang Shijie","year":"2022","unstructured":"Shijie Zhang, Hongzhi Yin, Tong Chen, Zi Huang, Quoc Viet Hung Nguyen, and Lizhen Cui. 2022b. PipAttack: Poisoning federated recommender systems for manipulating item promotion. WSDM (2022).","journal-title":"WSDM"},{"key":"e_1_3_1_39_1","first-page":"689","volume-title":"SIGIR","author":"Zhang Shijie","year":"2020","unstructured":"Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. Gcn-based user representation learning for unifying robust recommendation and fraudster detection. In SIGIR. 689\u2013698."},{"key":"e_1_3_1_40_1","article-title":"AdaTaskRec: An adaptive task recommendation framework in spatial crowdsourcing","author":"Zhao Yan","year":"2022","unstructured":"Yan Zhao, Liwei Deng, and Kai Zheng. 2022. AdaTaskRec: An adaptive task recommendation framework in spatial crowdsourcing. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"},{"key":"e_1_3_1_41_1","article-title":"Explainable hyperbolic temporal point process for user-item interaction sequence generation","author":"Zhou Yuchen","year":"2022","unstructured":"Yuchen Zhou, Yannan Cao, Yanmin Shang, Chuan Zhou, Shirui Pan, Zheng Lin, and Qian Li. 2022. Explainable hyperbolic temporal point process for user-item interaction sequence generation. ACM Transactions on Information Systems (2022).","journal-title":"ACM Transactions on Information Systems"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:04Z","timestamp":1750178764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,28]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,31]]}},"alternative-id":["10.1145\/3604776"],"URL":"https:\/\/doi.org\/10.1145\/3604776","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"type":"print","value":"1046-8188"},{"type":"electronic","value":"1558-2868"}],"subject":[],"published":{"date-parts":[[2023,7,28]]},"assertion":[{"value":"2023-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}