{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:24:21Z","timestamp":1766579061675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1145\/3604915.3608853","type":"proceedings-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T22:40:23Z","timestamp":1694731223000},"page":"947-954","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Stability of Explainable Recommendation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6981-3575","authenticated-orcid":false,"given":"Sairamvinay","family":"Vijayaraghavan","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of California, Davis, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2768-5308","authenticated-orcid":false,"given":"Prasant","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California, Davis, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sanity checks for saliency maps. Advances in neural information processing systems 31","author":"Adebayo Julius","year":"2018","unstructured":"Julius Adebayo, Justin Gilmer, Michael Muelly, Ian Goodfellow, Moritz Hardt, and Been Kim. 2018. Sanity checks for saliency maps. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"Chirag Agarwal Nari Johnson Martin Pawelczyk Satyapriya Krishna Eshika Saxena Marinka Zitnik and Himabindu Lakkaraju. 2022. Rethinking Stability for Attribution-based Explanations. http:\/\/arxiv.org\/abs\/2203.06877 arXiv:2203.06877 [cs]."},{"key":"e_1_3_2_1_3_1","unstructured":"Chirag Agarwal Marinka Zitnik and Himabindu Lakkaraju. 2022. Probing GNN Explainers: A Rigorous Theoretical and Empirical Analysis of GNN Explanation Methods. http:\/\/arxiv.org\/abs\/2106.09078 arXiv:2106.09078 [cs]."},{"key":"e_1_3_2_1_4_1","unstructured":"David Alvarez-Melis and Tommi\u00a0S. Jaakkola. 2018. On the Robustness of Interpretability Methods. http:\/\/arxiv.org\/abs\/1806.08049 arXiv:1806.08049 [cs stat]."},{"key":"e_1_3_2_1_5_1","unstructured":"David Alvarez-Melis and Tommi\u00a0S. Jaakkola. 2018. Towards Robust Interpretability with Self-Explaining Neural Networks. http:\/\/arxiv.org\/abs\/1806.07538 arXiv:1806.07538 [cs stat]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3375624"},{"key":"e_1_3_2_1_7_1","unstructured":"Ali Borji and Sikun Lin. 2019. White Noise Analysis of Neural Networks. arxiv:1912.12106\u00a0[cs.CV]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401042"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/data7070094"},{"key":"e_1_3_2_1_11_1","unstructured":"Ann-Kathrin Dombrowski Maximilian Alber Christopher\u00a0J. Anders Marcel Ackermann Klaus-Robert M\u00fcller and Pan Kessel. 2019. Explanations can be manipulated and geometry is to blame. http:\/\/arxiv.org\/abs\/1906.07983 arXiv:1906.07983 [cs stat]."},{"key":"e_1_3_2_1_12_1","unstructured":"Christian Etmann Sebastian Lunz Peter Maass and Carola-Bibiane Sch\u00f6nlieb. 2019. On the Connection Between Adversarial Robustness and Saliency Map Interpretability. http:\/\/arxiv.org\/abs\/1905.04172 arXiv:1905.04172 [cs stat]."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Wei Jin Xiaorui Liu Han Xu Xianfeng Tang Suhang Wang Qing Li Jiliang Tang Jianping Wang and Charu Aggarwal. 2022. Jointly Attacking Graph Neural Network and its Explanations. http:\/\/arxiv.org\/abs\/2108.03388 arXiv:2108.03388 [cs].","DOI":"10.1109\/ICDE55515.2023.00056"},{"key":"e_1_3_2_1_14_1","volume-title":"A Comprehensive Survey on Trustworthy Recommender Systems. arXiv preprint arXiv:2209.10117","author":"Fan Wenqi","year":"2022","unstructured":"Wenqi Fan, Xiangyu Zhao, Xiao Chen, Jingran Su, Jingtong Gao, Lin Wang, Qidong Liu, Yiqi Wang, Han Xu, Lei Chen, 2022. A Comprehensive Survey on Trustworthy Recommender Systems. arXiv preprint arXiv:2209.10117 (2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"A survey on trustworthy recommender systems. arXiv preprint arXiv:2207.12515","author":"Ge Yingqiang","year":"2022","unstructured":"Yingqiang Ge, Shuchang Liu, Zuohui Fu, Juntao Tan, Zelong Li, Shuyuan Xu, Yunqi Li, Yikun Xian, and Yongfeng Zhang. 2022. A survey on trustworthy recommender systems. arXiv preprint arXiv:2207.12515 (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531973"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. (2014). https:\/\/doi.org\/10.48550\/ARXIV.1412.6572 Publisher: arXiv Version Number: 3.","DOI":"10.48550\/ARXIV.1412.6572"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0558-1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16533"},{"key":"e_1_3_2_1_22_1","unstructured":"Beomsu Kim Junghoon Seo and Taegyun Jeon. 2019. Bridging Adversarial Robustness and Gradient Interpretability. http:\/\/arxiv.org\/abs\/1903.11626 arXiv:1903.11626 [cs stat]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441754"},{"key":"e_1_3_2_1_24_1","unstructured":"Lei Li Yongfeng Zhang and Li Chen. 2021. Personalized Transformer for Explainable Recommendation. http:\/\/arxiv.org\/abs\/2105.11601 arXiv:2105.11601 [cs]."},{"key":"e_1_3_2_1_25_1","unstructured":"Mengchen Liu Shixia Liu Hang Su Kelei Cao and Jun Zhu. 2018. Analyzing the Noise Robustness of Deep Neural Networks. arxiv:1810.03913\u00a0[cs.LG]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00137"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2018.8379110"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2022.3142719"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512029"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2021.101071"},{"key":"e_1_3_2_1_31_1","unstructured":"Avanti Shrikumar Peyton Greenside and Anshul Kundaje. 2019. Learning Important Features Through Propagating Activation Differences. arxiv:1704.02685\u00a0[cs.CV]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Dylan Slack Sophie Hilgard Emily Jia Sameer Singh and Himabindu Lakkaraju. 2020. Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods. http:\/\/arxiv.org\/abs\/1911.02508 arXiv:1911.02508 [cs stat].","DOI":"10.1145\/3375627.3375830"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Akshayvarun Subramanya Vipin Pillai and Hamed Pirsiavash. 2019. Fooling Network Interpretation in Image Classification. http:\/\/arxiv.org\/abs\/1812.02843 arXiv:1812.02843 [cs].","DOI":"10.1109\/ICCV.2019.00211"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462847"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482420"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331234"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6834"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210010"},{"key":"e_1_3_2_1_39_1","unstructured":"Shoujin Wang Xiuzhen Zhang Yan Wang Huan Liu and Francesco Ricci. 2022. Trustworthy Recommender Systems. http:\/\/arxiv.org\/abs\/2208.06265 arXiv:2208.06265 [cs]."},{"key":"e_1_3_2_1_40_1","unstructured":"Bingbing Wen Yunhe Feng Yongfeng Zhang and Chirag Shah. 2022. Towards Generating Robust Fair and Emotion-Aware Explanations for Recommender Systems. http:\/\/arxiv.org\/abs\/2208.08017 arXiv:2208.08017 [cs]."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474240"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00683-z"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331321"},{"volume-title":"29th { USENIX} security symposium ({ USENIX} security 20).","author":"Zhang Xinyang","key":"e_1_3_2_1_44_1","unstructured":"Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang. 2020. Interpretable deep learning under fire. In 29th { USENIX} security symposium ({ USENIX} security 20)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000066"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609579"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609501"},{"key":"e_1_3_2_1_48_1","unstructured":"Yao Zhou Haonan Wang Jingrui He and Haixun Wang. 2021. From Intrinsic to Counterfactual: On the Explainability of Contextualized Recommender Systems. http:\/\/arxiv.org\/abs\/2110.14844 arXiv:2110.14844 [cs]."}],"event":{"name":"RecSys '23: Seventeenth ACM Conference on Recommender Systems","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGecom Special Interest Group on Economics and Computation"],"location":"Singapore Singapore","acronym":"RecSys '23"},"container-title":["Proceedings of the 17th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3608853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604915.3608853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:34Z","timestamp":1750178794000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3608853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":48,"alternative-id":["10.1145\/3604915.3608853","10.1145\/3604915"],"URL":"https:\/\/doi.org\/10.1145\/3604915.3608853","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]},"assertion":[{"value":"2023-09-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}