{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:20:05Z","timestamp":1774495205868,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1145\/3604915.3609490","type":"proceedings-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T22:40:23Z","timestamp":1694731223000},"page":"234-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["RecAD: Towards A Unified Library for Recommender Attack and Defense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0957-638X","authenticated-orcid":false,"given":"CHANGSHENG","family":"WANG","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9095-4947","authenticated-orcid":false,"given":"Jianbai","family":"Ye","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5199-1428","authenticated-orcid":false,"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5187-9196","authenticated-orcid":false,"given":"Chongming","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5828-9842","authenticated-orcid":false,"given":"Fuli","family":"Feng","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8472-7992","authenticated-orcid":false,"given":"Xiangnan","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347050"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning, Doina Precup and Yee\u00a0Whye Teh (Eds.). Vol.\u00a070","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein Generative Adversarial Networks. In Proceedings of the 34th International Conference on Machine Learning, Doina Precup and Yee\u00a0Whye Teh (Eds.). Vol.\u00a070. PMLR, 214\u2013223."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Keqin Bao Jizhi Zhang Yang Zhang Wenjie Wang Fuli Feng and Xiangnan He. 2023. TALLRec: An Effective and Efficient Tuning Framework to Align Large Language Model with Recommendation.","DOI":"10.1145\/3604915.3608857"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP\u201906)","author":"Bhaumik Runa","year":"2006","unstructured":"Runa Bhaumik, Chad Williams, Bamshad Mobasher, and Robin Burke. 2006. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP\u201906), Boston. AAAI, 10."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP), 19th international joint conference on artificial intelligence (IJCAI). IJCAI, 17\u201324","author":"Burke Robin","year":"2005","unstructured":"Robin Burke, Bamshad Mobasher, and Runa Bhaumik. 2005. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP), 19th international joint conference on artificial intelligence (IJCAI). IJCAI, 17\u201324."},{"key":"e_1_3_2_1_6_1","volume-title":"Fifth IEEE International Conference on Data Mining (ICDM\u201905)","author":"Burke R.","unstructured":"R. Burke, B. Mobasher, R. Bhaumik, and C. Williams. 2005. Segment-based injection attacks against collaborative filtering recommender systems. In Fifth IEEE International Conference on Data Mining (ICDM\u201905). IEEE, 4 pp.\u2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0164-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258235"},{"key":"e_1_3_2_1_9_1","volume-title":"Assessing the impact of a user-item collaborative attack on class of users. arXiv preprint arXiv:1908.07968","author":"Deldjoo Yashar","year":"2019","unstructured":"Yashar Deldjoo, Tommaso Di\u00a0Noia, and Felice\u00a0Antonio Merra. 2019. Assessing the impact of a user-item collaborative attack on class of users. arXiv preprint arXiv:1908.07968 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Collaborative Computing: Networking, Applications and Worksharing","author":"Dou Tong","unstructured":"Tong Dou, Junliang Yu, Qingyu Xiong, Min Gao, Yuqi Song, and Qianqi Fang. 2018. Collaborative shilling detection bridging factorization and user embedding. In Collaborative Computing: Networking, Applications and Worksharing. Springer, 459\u2013469."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00140"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_15_1","volume-title":"Cirs: Bursting filter bubbles by counterfactual interactive recommender system. arXiv preprint arXiv:2204.01266","author":"Gao Chongming","year":"2022","unstructured":"Chongming Gao, Wenqiang Lei, Jiawei Chen, Shiqi Wang, Xiangnan He, Shijun Li, Biao Li, Yuan Zhang, and Peng Jiang. 2022. Cirs: Bursting filter bubbles by counterfactual interactive recommender system. arXiv preprint arXiv:2204.01266 (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39445-5_46"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"e_1_3_2_1_19_1","volume-title":"Data poisoning attacks to deep learning based recommender systems. arXiv preprint arXiv:2101.02644","author":"Huang Hai","year":"2021","unstructured":"Hai Huang, Jiaming Mu, Neil\u00a0Zhenqiang Gong, Qi Li, Bin Liu, and Mingwei Xu. 2021. Data poisoning attacks to deep learning based recommender systems. arXiv preprint arXiv:2101.02644 (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1304060.1304521"},{"key":"e_1_3_2_1_21_1","volume-title":"ICICT, Vol.\u00a02","author":"Kaur Parneet","unstructured":"Parneet Kaur and Shivani Goel. 2016. Shilling attack models in recommender system. In ICICT, Vol.\u00a02. IEEE, 1\u20135."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_23_1","volume-title":"Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems 29","author":"Li Bo","year":"2016","unstructured":"Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7500"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3183210"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719970.1719976"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401087"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9050-4"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_1_32_1","volume-title":"Recommender systems: Attack types and strategies","author":"O\u2019Mahony P","unstructured":"Michael\u00a0P O\u2019Mahony, Neil\u00a0J Hurley, and Gu\u00e9nol\u00e9\u00a0CM Silvestre. 2005. Recommender systems: Attack types and strategies. In Association for the Advancement of Artificial Intelligence (AAAI). AAAI, 334\u2013339."},{"key":"e_1_3_2_1_33_1","volume-title":"Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. arXiv preprint arXiv:2204.13594","author":"Rong Dazhong","year":"2022","unstructured":"Dazhong Rong, Qinming He, and Jianhai Chen. 2022. Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. arXiv preprint arXiv:2204.13594 (2022)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00243"},{"key":"e_1_3_2_1_35_1","volume-title":"On Detecting Data Pollution Attacks On Recommender Systems Using Sequential GANs. CoRR abs\/2012.02509","author":"Shahrasbi Behzad","year":"2020","unstructured":"Behzad Shahrasbi, Venugopal Mani, Apoorv\u00a0Reddy Arrabothu, Deepthi Sharma, Kannan Achan, and Sushant Kumar. 2020. On Detecting Data Pollution Attacks On Recommender Systems Using Sequential GANs. CoRR abs\/2012.02509 (2020)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2893638"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"e_1_3_2_1_39_1","unstructured":"Jiongxiao Wang Zichen Liu Keun\u00a0Hee Park Muhao Chen and Chaowei Xiao. 2023. Adversarial Demonstration Attacks on Large Language Models."},{"key":"e_1_3_2_1_40_1","volume-title":"Generative Recommendation: Towards Next-generation Recommender Paradigm.","author":"Wang Wenjie","year":"2023","unstructured":"Wenjie Wang, Xinyu Lin, Fuli Feng, Xiangnan He, and Tat-Seng Chua. 2023. Generative Recommendation: Towards Next-generation Recommender Paradigm."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462914"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043985"},{"key":"e_1_3_2_1_43_1","volume-title":"Take This Personally: Pollution Attacks on Personalized Services. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Xing Xingyu","year":"2013","unstructured":"Xingyu Xing, Wei Meng, Dan Doozan, Alex\u00a0C. Snoeren, Nick Feamster, and Wenke Lee. 2013. Take This Personally: Pollution Attacks on Personalized Services. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, 671\u2013686."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00102"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23020"},{"key":"e_1_3_2_1_46_1","volume-title":"UA-FedRec: Untargeted Attack on Federated News Recommendation. CoRR abs\/2202.06701","author":"Yi Jingwei","year":"2022","unstructured":"Jingwei Yi, Fangzhao Wu, Bin Zhu, Yang Yu, Chao Zhang, Guangzhong Sun, and Xing Xie. 2022. UA-FedRec: Untargeted Attack on Federated News Recommendation. CoRR abs\/2202.06701 (2022)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA52286.2021.9498095"},{"key":"e_1_3_2_1_48_1","volume-title":"Cross-site request forgeries: Exploitation and prevention. The New York Times","author":"Zeller William","year":"2008","unstructured":"William Zeller and Edward\u00a0W Felten. 2008. Cross-site request forgeries: Exploitation and prevention. The New York Times (2008), 1\u201313."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3379992"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Jizhi Zhang Keqin Bao Yang Zhang Wenjie Wang Fuli Feng and Xiangnan He. 2023. Is ChatGPT Fair for Recommendation? Evaluating Fairness in Large Language Model Recommendation.","DOI":"10.1145\/3604915.3608860"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_1_52_1","volume-title":"Targeted Data Poisoning Attack on News Recommendation System. arXiv preprint arXiv:2203.03560","author":"Zhang Xudong","year":"2022","unstructured":"Xudong Zhang, Zan Wang, Jingke Zhao, and Lanjun Wang. 2022. Targeted Data Poisoning Attack on News Recommendation System. arXiv preprint arXiv:2203.03560 (2022)."},{"key":"e_1_3_2_1_53_1","unstructured":"Wayne\u00a0Xin Zhao Shanlei Mu Yupeng Hou Zihan Lin Yushuo Chen Xingyu Pan Kaiyuan Li Yujie Lu Hui Wang Changxin Tian Yingqian Min Zhichao Feng Xinyan Fan Xu Chen Pengfei Wang Wendi Ji Yaliang Li Xiaoling Wang and Ji-Rong Wen. 2021. RecBole: Towards a Unified Comprehensive and Efficient Framework for Recommendation Algorithms. In CIKM. ACM 4653\u20134664."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.12.137"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030073"}],"event":{"name":"RecSys '23: Seventeenth ACM Conference on Recommender Systems","location":"Singapore Singapore","acronym":"RecSys '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 17th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3609490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604915.3609490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:35Z","timestamp":1750178795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604915.3609490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":55,"alternative-id":["10.1145\/3604915.3609490","10.1145\/3604915"],"URL":"https:\/\/doi.org\/10.1145\/3604915.3609490","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]},"assertion":[{"value":"2023-09-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}