{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T04:04:43Z","timestamp":1751169883315,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,16]]},"DOI":"10.1145\/3708319.3733675","type":"proceedings-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T15:17:00Z","timestamp":1749741420000},"page":"98-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Stealthy LLM-Driven Data Poisoning Attacks Against Embedding-Based Retrieval-Augmented Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6683-9453","authenticated-orcid":false,"given":"Fatemeh","family":"Nazary","sequence":"first","affiliation":[{"name":"Department of Electrical and Information Engineering (DEI), Polytechnic University of Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6767-358X","authenticated-orcid":false,"given":"Yashar","family":"Deldjoo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering (DEI), Polytechnic University of Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0939-5462","authenticated-orcid":false,"given":"Tommaso","family":"Di Noia","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Polytechnic University of Bari, Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5484-9945","authenticated-orcid":false,"given":"Eugenio","family":"Di Sciascio","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Polytechnic University of Bari, Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,6,12]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Arijit\u00a0Ghosh Chowdhury Md\u00a0Mofijul Islam Vaibhav Kumar Faysal\u00a0Hossain Shezan Vinija Jain and Aman Chadha. 2024. Breaking down the defenses: A comparative survey of attacks on large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.04786 (2024)."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671474"},{"key":"e_1_3_3_2_4_2","unstructured":"Yashar Deldjoo Zhankui He Julian McAuley Anton Korikov Scott Sanner Arnau Ramisa Rene Vidal Maheswaran Sathiamoorthy Atoosa Kasrizadeh Silvia Milano et\u00a0al. 2024. Recommendation with Generative Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.15173 (2024)."},{"key":"e_1_3_3_2_5_2","unstructured":"Yashar Deldjoo Nikhil Mehta Maheswaran Sathiamoorthy Shuai Zhang Pablo Castells and Julian McAuley. 2025. Toward Holistic Evaluation of Recommender Systems Powered by Generative Models. SIGIR\u201925 (2025)."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Yashar Deldjoo Tommaso\u00a0Di Noia and Felice\u00a0Antonio Merra. 2021. A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. ACM Computing Surveys (CSUR) 54 2 (2021) 1\u201338.","DOI":"10.1145\/3439729"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671470"},{"key":"e_1_3_3_2_8_2","unstructured":"Yi Liu Gelei Deng Yuekang Li Kailong Wang Zihao Wang Xiaofeng Wang Tianwei Zhang Yepang Liu Haoyu Wang Yan Zheng et\u00a0al. 2023. Prompt Injection attack against LLM-integrated Applications. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.05499 (2023)."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-88717-8_18"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"N Reimers. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1908.10084 (2019).","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_3_2_11_2","unstructured":"Yifei Wang Dizhan Xue Shengjie Zhang and Shengsheng Qian. 2024. BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.03007 (2024)."},{"key":"e_1_3_3_2_12_2","unstructured":"Alexander Wei Nika Haghtalab and Jacob Steinhardt. 2024. Jailbroken: How does llm safety training fail? Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_3_2_13_2","unstructured":"Jiaqi Xue Mengxin Zheng Yebowen Hu Fei Liu Xun Chen and Qian Lou. 2024. BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.00083 (2024)."},{"key":"e_1_3_3_2_14_2","unstructured":"Wei Zou Runpeng Geng Binghui Wang and Jinyuan Jia. 2024. Poisonedrag: Knowledge poisoning attacks to retrieval-augmented generation of large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.07867 (2024)."}],"event":{"name":"UMAP '25: 33rd ACM Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"New York City USA","acronym":"UMAP '25"},"container-title":["Adjunct Proceedings of the 33rd ACM Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708319.3733675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T11:18:43Z","timestamp":1751109523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708319.3733675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,12]]},"references-count":13,"alternative-id":["10.1145\/3708319.3733675","10.1145\/3708319"],"URL":"https:\/\/doi.org\/10.1145\/3708319.3733675","relation":{},"subject":[],"published":{"date-parts":[[2025,6,12]]},"assertion":[{"value":"2025-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}