{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:10:05Z","timestamp":1755889805201,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472277, 62072304, 62172275, 62472176, 62172277"],"award-info":[{"award-number":["62472277, 62072304, 62172275, 62472176, 62172277"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai East Talents Program","award":["2023-177"],"award-info":[{"award-number":["2023-177"]}]},{"name":"Shanghai Municipal Science and Technology Commission","award":["21511104700"],"award-info":[{"award-number":["21511104700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,13]]},"DOI":"10.1145\/3726302.3730086","type":"proceedings-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T01:18:36Z","timestamp":1752455916000},"page":"1728-1737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Social Relation-Level Privacy Risks and Preservation in Social Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7120-4857","authenticated-orcid":false,"given":"Xuhao","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5539-0490","authenticated-orcid":false,"given":"Zhongrui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6406-4992","authenticated-orcid":false,"given":"Yanmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8727-6998","authenticated-orcid":false,"given":"Zhaobo","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6874-3299","authenticated-orcid":false,"given":"Wenze","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-9643","authenticated-orcid":false,"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1384-198X","authenticated-orcid":false,"given":"Feilong","family":"Tang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Martin Abadi Andy Chu Ian Goodfellow H Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep learning with differential privacy. In CCS. ACM 308--318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Lars Backstrom and Jure Leskovec. 2011. Supervised random walks: predicting and recommending links in social networks. In WSDM. ACM 635--644.","DOI":"10.1145\/1935826.1935914"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-014-0220-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343038"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ghazaleh Beigi Ahmadreza Mosallanezhad Ruocheng Guo Hamidreza Alvari Alexander Nou and Huan Liu. 2020. Privacy-aware recommendation with private-attribute protection using adversarial learning. In WSDM. ACM 34--42.","DOI":"10.1145\/3336191.3371832"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Kunlin Cai Jinghuai Zhang Zhiqing Hong William Shand Guang Wang Desheng Zhang Jianfeng Chi and Yuan Tian. 2024. Where Have You Been? A Study of Privacy Risk for Point-of-Interest Recommendation. In KDD. ACM 175--186.","DOI":"10.1145\/3637528.3671758"},{"volume-title":"28th USENIX security symposium (USENIX security 19). 267--284.","author":"Carlini Nicholas","key":"e_1_3_2_1_8_1","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th USENIX security symposium (USENIX security 19). 267--284."},{"key":"e_1_3_2_1_9_1","volume-title":"Shuo Wang, and Hongsheng Hu.","author":"Chi Xiaoxiao","year":"2024","unstructured":"Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, and Hongsheng Hu. 2024. Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. In IJCAI. ijcai.org, 5781--5789."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Yao Ma Qing Li Yuan He Eric Zhao Jiliang Tang and Dawei Yin. 2019. Graph neural networks for social recommendation. In WWW. ACM 417--426.","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In CCS. ACM 1322--1333.","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9153"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_1_15_1","volume-title":"Neil Zhenqiang Gong, and Yang Zhang","author":"He Xinlei","year":"2021","unstructured":"Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2021. Stealing links from graph neural networks. In 30th USENIX security symposium (USENIX security 21). 2669--2686."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Qi Hu and Yangqiu Song. 2024. User Consented Federated Recommender System Against Personalized Attribute Inference Attack. In WSDM. ACM 276--285.","DOI":"10.1145\/3616855.3635830"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3409383"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406540"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25566"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"David Liben-Nowell and Jon Kleinberg. 2003. The link prediction problem for social networks. In CIKM. ACM 556--559.","DOI":"10.1145\/956863.956972"},{"key":"e_1_3_2_1_22_1","volume-title":"Quoc Viet Hung Nguyen, and Hongzhi Yin","author":"Long Jing","year":"2024","unstructured":"Jing Long, Tong Chen, Guanhua Ye, Kai Zheng, Quoc Viet Hung Nguyen, and Hongzhi Yin. 2024. Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation. In WWW. ACM, 3379--3387."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Hao Ma Irwin King and Michael R Lyu. 2009. Learning to recommend with social trust ensemble. In SIGIR. ACM 203--210.","DOI":"10.1145\/1571941.1571978"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Hao Ma Dengyong Zhou Chao Liu Michael R Lyu and Irwin King. 2011. Recommender systems with social regularization. In WSDM. ACM 287--296.","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_3_2_1_25_1","volume-title":"Birds of a feather: Homophily in social networks. Annual review of sociology","author":"McPherson Miller","year":"2001","unstructured":"Miller McPherson, Lynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology, Vol. 27, 1 (2001), 415--444."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3126577"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the international multiconference of engineers and computer scientists","volume":"1","author":"Niwattanakul Suphakit","year":"2013","unstructured":"Suphakit Niwattanakul, Jatsada Singthongchai, Ekkachai Naenudorn, and Supachanun Wanapu. 2013. Using of Jaccard coefficient for keywords similarity. In Proceedings of the international multiconference of engineers and computer scientists, Vol. 1. 380--384."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2697854"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/256"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583374"},{"key":"e_1_3_2_1_32_1","volume-title":"BPR: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618","author":"Rendle Steffen","year":"2012","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2012. BPR: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618 (2012)."},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Machine Learning. PMLR, 5558--5567","author":"Sablayrolles Alexandre","year":"2019","unstructured":"Alexandre Sablayrolles, Matthijs Douze, Cordelia Schmid, Yann Ollivier, and Herv\u00e9 J\u00e9gou. 2019. White-box vs black-box: Bayes optimal strategies for membership inference. In International Conference on Machine Learning. PMLR, 5558--5567."},{"key":"e_1_3_2_1_34_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512003"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539392"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.9980"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3048414"},{"key":"e_1_3_2_1_41_1","volume-title":"Lizhen Cui, Tieke He, and Hongzhi Yin.","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Chaoqun Yang, Quoc Viet Hung Nguyen, Lizhen Cui, Tieke He, and Hongzhi Yin. 2023. Interaction-level membership inference attack against federated recommender systems. In WWW. ACM, 1053--1062."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474275"},{"key":"e_1_3_2_1_43_1","volume-title":"Privacy and security for online social networks: challenges and opportunities","author":"Zhang Chi","year":"2010","unstructured":"Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010. Privacy and security for online social networks: challenges and opportunities. IEEE network, Vol. 24, 4 (2010), 13--18."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Minxing Zhang Zhaochun Ren Zihan Wang Pengjie Ren Zhunmin Chen Pengfei Hu and Yang Zhang. 2021. Membership inference attacks against recommender systems. In CCS. ACM 864--879.","DOI":"10.1145\/3460120.3484770"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Sixiao Zhang Hongzhi Yin Hongxu Chen and Cheng Long. 2024. Defense Against Model Extraction Attacks on Recommender Systems. In WSDM. ACM 949--957.","DOI":"10.1145\/3616855.3635751"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3295601"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s44230-023-00016-4"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Da Zhong Xiuling Wang Zhichao Xu Jun Xu and Wendy Hui Wang. 2024. Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution. In CIKM. ACM 3433--3442.","DOI":"10.1145\/3627673.3679804"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Zhihao Zhu Chenwang Wu Rui Fan Defu Lian and Enhong Chen. 2023. Membership Inference Attacks Against Sequential Recommender Systems. In WWW. ACM 1208--1219.","DOI":"10.1145\/3543507.3583447"}],"event":{"name":"SIGIR '25: The 48th International ACM SIGIR Conference on Research and Development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Padua Italy","acronym":"SIGIR '25"},"container-title":["Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726302.3730086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:32:30Z","timestamp":1755887550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726302.3730086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,13]]},"references-count":49,"alternative-id":["10.1145\/3726302.3730086","10.1145\/3726302"],"URL":"https:\/\/doi.org\/10.1145\/3726302.3730086","relation":{},"subject":[],"published":{"date-parts":[[2025,7,13]]},"assertion":[{"value":"2025-07-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}