{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:28:35Z","timestamp":1777127315344,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Strategic Priority Research Program of the Chinese Academy of Sciences","award":["XDB0680101"],"award-info":[{"award-number":["XDB0680101"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272125, 62102402, U21B2046"],"award-info":[{"award-number":["62272125, 62102402, U21B2046"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,8]]},"DOI":"10.1145\/3640457.3688148","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T11:39:28Z","timestamp":1728387568000},"page":"701-711","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Accelerating the Surrogate Retraining for Poisoning Attacks against Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6994-6791","authenticated-orcid":false,"given":"Yunfan","family":"Wu","sequence":"first","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3454-4789","authenticated-orcid":false,"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6113-6145","authenticated-orcid":false,"given":"Shuchang","family":"Tao","sequence":"additional","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1197-5212","authenticated-orcid":false,"given":"Kaike","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6146-148X","authenticated-orcid":false,"given":"Fei","family":"Sun","sequence":"additional","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1081-8119","authenticated-orcid":false,"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI","author":"Burke Robin","year":"2005","unstructured":"Robin Burke, Bamshad Mobasher, and Runa Bhaumik. 2005. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005). 17\u201324."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539359"},{"key":"e_1_3_2_1_3_1","volume-title":"The dark side of explanations: Poisoning recommender systems with counterfactual examples. arXiv preprint arXiv:2305.00574","author":"Chen Ziheng","year":"2023","unstructured":"Ziheng Chen, Fabrizio Silvestri, Jia Wang, Yongfeng Zhang, and Gabriele Tolomei. 2023. The dark side of explanations: Poisoning recommender systems with counterfactual examples. arXiv preprint arXiv:2305.00574 (2023)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_6_1","volume-title":"Further generalizations of the Jaccard index. arXiv preprint arXiv:2110.09619","author":"Costa Luciano","year":"2021","unstructured":"Luciano da\u00a0F Costa. 2021. Further generalizations of the Jaccard index. arXiv preprint arXiv:2110.09619 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365968"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00140"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/308"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963774"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615062"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Hai Huang Jiaming Mu Neil\u00a0Zhenqiang Gong Qi Li Bin Liu and Mingwei Xu. 2021. Data poisoning attacks to deep learning based recommender systems. In NDSS.","DOI":"10.14722\/ndss.2021.24525"},{"key":"e_1_3_2_1_19_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma P","year":"2013","unstructured":"Diederik\u00a0P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_20_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf N","year":"2016","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_21_1","volume-title":"International conference on machine learning. PMLR","author":"Koh Pang\u00a0Wei","year":"2017","unstructured":"Pang\u00a0Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In International conference on machine learning. PMLR, 1885\u20131894."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_24_1","volume-title":"Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems 29","author":"Li Bo","year":"2016","unstructured":"Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_25_1","first-page":"29989","article-title":"Revisiting Injective Attacks on Recommender Systems","volume":"35","author":"Haoyang LI","year":"2022","unstructured":"Haoyang LI, Shimin DI, and Lei Chen. 2022. Revisiting Injective Attacks on Recommender Systems. Advances in Neural Information Processing Systems 35 (2022), 29989\u201330002.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186150"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_1_28_1","volume-title":"Probabilistic matrix factorization. Advances in neural information processing systems 20","author":"Mnih Andriy","year":"2007","unstructured":"Andriy Mnih and Russ\u00a0R Salakhutdinov. 2007. Probabilistic matrix factorization. Advances in neural information processing systems 20 (2007)."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD, Vol.\u00a02005","author":"Mobasher Bamshad","year":"2005","unstructured":"Bamshad Mobasher, Robin Burke, Runa Bhaumik, and Chad Williams. 2005. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD, Vol.\u00a02005."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 20th national conference on Artificial intelligence-Volume 1. 334\u2013339","author":"O\u2019Mahony P","year":"2005","unstructured":"Michael\u00a0P O\u2019Mahony, Neil\u00a0J Hurley, and Gu\u00e9nol\u00e9\u00a0CM Silvestre. 2005. Recommender systems: attack types and strategies. In Proceedings of the 20th national conference on Artificial intelligence-Volume 1. 334\u2013339."},{"key":"e_1_3_2_1_32_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3248626"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence(UAI \u201909)","author":"Rendle S.","unstructured":"S. Rendle, C. Freudenthaler, Zeno Gantner, and L. Schmidt-Thieme. 2009. BPR: Bayesian Personalized Ranking from Implicit Feedback. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence(UAI \u201909)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412488"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742726"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645722"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"e_1_3_2_1_41_1","volume-title":"A Survey of Collaborative Filtering Techniques. Advances in artificial intelligence (Jan","author":"Su Xiaoyuan","year":"2009","unstructured":"Xiaoyuan Su and Taghi\u00a0M. Khoshgoftaar. 2009. A Survey of Collaborative Filtering Techniques. Advances in artificial intelligence (Jan. 2009)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331267"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591751"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467335"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3274759"},{"key":"e_1_3_2_1_47_1","volume-title":"Attacking Pre-trained Recommendation. arXiv preprint arXiv:2305.03995","author":"Wu Yiqing","year":"2023","unstructured":"Yiqing Wu, Ruobing Xie, Zhao Zhang, Yongchun Zhu, FuZhen Zhuang, Jie Zhou, Yongjun Xu, and Qing He. 2023. Attacking Pre-trained Recommendation. arXiv preprint arXiv:2305.03995 (2023)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Guolei Yang Neil\u00a0Zhenqiang Gong and Ying Cai. 2017. Fake Co-visitation Injection Attacks to Recommender Systems.. In NDSS.","DOI":"10.14722\/ndss.2017.23020"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_50_1","first-page":"11480","article-title":"Tenrec: A Large-scale Multipurpose Benchmark Dataset for Recommender Systems","volume":"35","author":"Yuan Guanghu","year":"2022","unstructured":"Guanghu Yuan, Fajie Yuan, Yudong Li, Beibei Kong, Shujie Li, Lei Chen, Min Yang, Chenyun Yu, Bo Hu, Zang Li, 2022. Tenrec: A Large-scale Multipurpose Benchmark Dataset for Recommender Systems. Advances in Neural Information Processing Systems 35 (2022), 11480\u201311493.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474275"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3379992"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467233"},{"key":"e_1_3_2_1_54_1","volume-title":"Robust Recommender System: A Survey and Future Directions. arXiv preprint arXiv:2309.02057","author":"Zhang Kaike","year":"2023","unstructured":"Kaike Zhang, Qi Cao, Fei Sun, Yunfan Wu, Shuchang Tao, Huawei Shen, and Xueqi Cheng. 2023. Robust Recommender System: A Survey and Future Directions. arXiv preprint arXiv:2309.02057 (2023)."},{"key":"e_1_3_2_1_55_1","volume-title":"A survey on incremental update for neural recommender systems. arXiv preprint arXiv:2303.02851","author":"Zhang Peiyan","year":"2023","unstructured":"Peiyan Zhang and Sunghun Kim. 2023. A survey on incremental update for neural recommender systems. arXiv preprint arXiv:2303.02851 (2023)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 1479\u20131488","author":"Zhang Yang","year":"2020","unstructured":"Yang Zhang, Fuli Feng, Chenxu Wang, Xiangnan He, Meng Wang, Yan Li, and Yongdong Zhang. 2020. How to retrain recommender system? A sequential meta-learning method. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 1479\u20131488."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484805"}],"event":{"name":"RecSys '24: 18th ACM Conference on Recommender Systems","location":"Bari Italy","acronym":"RecSys '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["18th ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640457.3688148","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640457.3688148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T19:48:27Z","timestamp":1767815307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640457.3688148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,8]]},"references-count":57,"alternative-id":["10.1145\/3640457.3688148","10.1145\/3640457"],"URL":"https:\/\/doi.org\/10.1145\/3640457.3688148","relation":{},"subject":[],"published":{"date-parts":[[2024,10,8]]},"assertion":[{"value":"2024-10-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}