{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T04:21:59Z","timestamp":1778559719299,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["No. 2022YFB4501504"],"award-info":[{"award-number":["No. 2022YFB4501504"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3626772.3657764","type":"proceedings-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T12:40:05Z","timestamp":1720701605000},"page":"1722-1732","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Revisit Targeted Model Poisoning on Federated Recommendation: Optimize via Multi-objective Transport"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6899-4174","authenticated-orcid":false,"given":"Jiajie","family":"Su","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1419-964X","authenticated-orcid":false,"given":"Chaochao","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4115-7667","authenticated-orcid":false,"given":"Weiming","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4222-1594","authenticated-orcid":false,"given":"Zibin","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6134-6601","authenticated-orcid":false,"given":"Shuheng","family":"Shen","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6159-619X","authenticated-orcid":false,"given":"Weiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5483-0366","authenticated-orcid":false,"given":"Xiaolin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Kuan Eeik Tan, and Adrian Flanagan","author":"Ammad-Ud-Din Muhammad","year":"2019","unstructured":"Muhammad Ammad-Ud-Din, Elena Ivannikova, Suleiman A Khan, Were Oyomno, Qiang Fu, Kuan Eeik Tan, and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv preprint arXiv:1901.09888 (2019)."},{"key":"e_1_3_2_1_2_1","series-title":"SIAM journal on mathematical analysis","volume-title":"Minimizing flows for the Monge--Kantorovich problem","author":"Angenent Sigurd","year":"2003","unstructured":"Sigurd Angenent, Steven Haker, and Allen Tannenbaum. 2003. Minimizing flows for the Monge--Kantorovich problem. SIAM journal on mathematical analysis, Vol. 35, 1 (2003), 61--97."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine learning with adversaries: byzantine tolerant gradient descent. Neural Information Processing Systems (Dec","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, ElMahdiEl Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: byzantine tolerant gradient descent. Neural Information Processing Systems (Dec 2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. PMLR, 950--959","author":"Blondel Mathieu","year":"2020","unstructured":"Mathieu Blondel, Olivier Teboul, Quentin Berthet, and Josip Djolonga. 2020. Fast differentiable sorting and ranking. In International Conference on Machine Learning. PMLR, 950--959."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/mis.2020.3014880"},{"key":"e_1_3_2_1_6_1","volume-title":"Federated Meta-Learning with Fast Convergence and Efficient Communication. arXiv: Learning,arXiv: Learning (Feb","author":"Chen Fei","year":"2018","unstructured":"Fei Chen, Mi Luo, Zhenhua Dong, Zhenguo Li, and Xiuqiang He. 2018. Federated Meta-Learning with Fast Convergence and Efficient Communication. arXiv: Learning,arXiv: Learning (Feb 2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems","author":"Cuturi Marco","year":"2013","unstructured":"Marco Cuturi. 2013a. Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems , Vol. 26 (2013)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"2","author":"Cuturi Marco","year":"2013","unstructured":"Marco Cuturi. 2013b. Sinkhorn Distances: Lightspeed Computation of Optimal Transport. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (Lake Tahoe, Nevada) (NIPS'13). Curran Associates Inc., Red Hook, NY, USA, 2292--2300."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107700"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC55868.2022.00014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3546258.3546336"},{"key":"e_1_3_2_1_13_1","volume-title":"Stochastic optimization for large-scale optimal transport. Advances in neural information processing systems","author":"Genevay Aude","year":"2016","unstructured":"Aude Genevay, Marco Cuturi, Gabriel Peyr\u00e9, and Francis Bach. 2016. Stochastic optimization for large-scale optimal transport. Advances in neural information processing systems , Vol. 29 (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.69554\/TCFN5165"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_17_1","volume-title":"Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580","author":"Hinton Geoffrey E","year":"2012","unstructured":"Geoffrey E Hinton, Nitish Srivastava, Alex Krizhevsky, Ilya Sutskever, and Ruslan R Salakhutdinov. 2012. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)."},{"key":"e_1_3_2_1_18_1","volume-title":"Qi Li, Bin Liu, and Mingwei Xu.","author":"Huang Hai","year":"2021","unstructured":"Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, and Mingwei Xu. 2021b. Data poisoning attacks to deep learning based recommender systems. arXiv preprint arXiv:2101.02644 (2021)."},{"key":"e_1_3_2_1_19_1","volume-title":"Feddsr: Daily schedule recommendation in a federated deep reinforcement learning framework","author":"Huang Wei","year":"2021","unstructured":"Wei Huang, Jia Liu, Tianrui Li, Tianqiang Huang, Shenggong Ji, and Jihong Wan. 2021a. Feddsr: Daily schedule recommendation in a federated deep reinforcement learning framework. IEEE Transactions on Knowledge and Data Engineering (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560486"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v8i7.4550"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16546"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3017205"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3478855"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28728"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583366"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531975"},{"key":"e_1_3_2_1_28_1","volume-title":"2023 b. Contrastive proxy kernel stein path alignment for cross-domain cold-start recommendation","author":"Liu Weiming","year":"2023","unstructured":"Weiming Liu, Xiaolin Zheng, Jiajie Su, Longfei Zheng, Chaochao Chen, and Mengling Hu. 2023 b. Contrastive proxy kernel stein path alignment for cross-domain cold-start recommendation. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501815"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645316"},{"key":"e_1_3_2_1_31_1","volume-title":"The Hidden Vulnerability of Distributed Learning in Byzantium. International Conference on Machine Learning (Jul","author":"Mhamdi MahdiEl","year":"2018","unstructured":"ElMahdiEl Mhamdi, Rachid Guerraoui, and S\u00e9bastien Rouault. 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. International Conference on Machine Learning (Jul 2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474262"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108441"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498433"},{"key":"e_1_3_2_1_35_1","volume-title":"Accessed in October","volume":"24","author":"Protection Regulation General Data","year":"2018","unstructured":"General Data Protection Regulation. 2018. General data protection regulation (GDPR). Intersoft Consulting, Accessed in October, Vol. 24, 1 (2018)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/306"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00243"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Machine Learning. PMLR, 29919--29936","author":"Sander Michael Eli","year":"2023","unstructured":"Michael Eli Sander, Joan Puigcerver, Josip Djolonga, Gabriel Peyr\u00e9, and Mathieu Blondel. 2023. Fast, differentiable and sparse top-k: a convex analysis perspective. In International Conference on Machine Learning. PMLR, 29919--29936."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611723"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583247"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570372"},{"key":"e_1_3_2_1_42_1","volume-title":"Fast-adapting and privacy-preserving federated recommender system. The VLDB Journal","author":"Wang Qinyong","year":"2021","unstructured":"Qinyong Wang, Hongzhi Yin, Tong Chen, Junliang Yu, Alexander Zhou, and Xiangliang Zhang. 2021. Fast-adapting and privacy-preserving federated recommender system. The VLDB Journal (2021), 1--20."},{"key":"e_1_3_2_1_43_1","volume-title":"Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925","author":"Wu Chuhan","year":"2021","unstructured":"Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-30714-9"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539119"},{"key":"e_1_3_2_1_46_1","volume-title":"Fedcl: Federated contrastive learning for privacy-preserving recommendation. arXiv preprint arXiv:2204.09850","author":"Wu Chuhan","year":"2022","unstructured":"Chuhan Wu, Fangzhao Wu, Tao Qi, Yongfeng Huang, and Xing Xie. 2022c. Fedcl: Federated contrastive learning for privacy-preserving recommendation. arXiv preprint arXiv:2204.09850 (2022)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481952"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"5659","author":"Yin Dong","year":"2018","unstructured":"Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 80), Jennifer Dy and Andreas Krause (Eds.). PMLR, 5650--5659. https:\/\/proceedings.mlr.press\/v80\/yin18a.html"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25611"},{"key":"e_1_3_2_1_50_1","volume-title":"Tieke He, Liang Chen, and Hongzhi Yin. 2023 a. Manipulating Federated Recommender Systems: Poisoning with Synthetic Users and Its Countermeasures. arXiv preprint arXiv:2304.03054","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Quoc Viet Hung Nguyen, Tieke He, Liang Chen, and Hongzhi Yin. 2023 a. Manipulating Federated Recommender Systems: Poisoning with Synthetic Users and Its Countermeasures. arXiv preprint arXiv:2304.03054 (2023)."},{"key":"e_1_3_2_1_51_1","volume-title":"Lizhen Cui, Tieke He, and Hongzhi Yin. 2023 b. Interaction-level membership inference attack against federated recommender systems. arXiv preprint arXiv:2301.10964","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Chaoqun Yang, Quoc Viet Hung Nguyen, Lizhen Cui, Tieke He, and Hongzhi Yin. 2023 b. Interaction-level membership inference attack against federated recommender systems. arXiv preprint arXiv:2301.10964 (2023)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467233"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498386"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827502419154"}],"event":{"name":"SIGIR 2024: The 47th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Washington DC USA","acronym":"SIGIR 2024","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626772.3657764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626772.3657764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:33:38Z","timestamp":1755840818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626772.3657764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":54,"alternative-id":["10.1145\/3626772.3657764","10.1145\/3626772"],"URL":"https:\/\/doi.org\/10.1145\/3626772.3657764","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}