{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:31:31Z","timestamp":1765499491763,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176028"],"award-info":[{"award-number":["62176028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Chongqing, China","award":["CSTB2024NSCQ-MSX0617"],"award-info":[{"award-number":["CSTB2024NSCQ-MSX0617"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3761032","type":"proceedings-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:59:18Z","timestamp":1762559958000},"page":"4477-4486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Budget and Frequency Controlled Cost-Aware Model Extraction Attack on Sequential Recommenders"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3970-1020","authenticated-orcid":false,"given":"Lei","family":"Zhou","sequence":"first","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0127-7477","authenticated-orcid":false,"given":"Min","family":"Gao","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9774-4596","authenticated-orcid":false,"given":"Zongwei","family":"Wang","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1087-5751","authenticated-orcid":false,"given":"Yibing","family":"Bai","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1109\/TIFS.2021.3076295"},{"key":"e_1_3_2_2_2_1","volume-title":"Minimum Hellinger distance estimates for parametric models. The annals of Statistics","author":"Beran Rudolf","year":"1977","unstructured":"Rudolf Beran. 1977. Minimum Hellinger distance estimates for parametric models. The annals of Statistics (1977), 445-463."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1145\/3298689.3347031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1109\/ICDE51399.2021.00140"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_2_6_1","volume-title":"Distilling the Knowledge in a Neural Network. CoRR","author":"Hinton Geoffrey E.","year":"2015","unstructured":"Geoffrey E. Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. CoRR, Vol. abs\/1503.02531 (2015). http:\/\/arxiv.org\/abs\/1503.02531 arXiv: 1503.02531."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1145\/3209978.3210017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1109\/ICDM.2018.00035"},{"volume-title":"International Conference on Learning Representations.","author":"Krishna Kalpesh","unstructured":"Kalpesh Krishna, Gaurav Singh Tomar, Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer. [n.d.]. Thieves on Sesame Street! Model Extraction of BERT-based APIs. In International Conference on Learning Representations.","key":"e_1_3_2_2_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.5555\/3157096.3157308"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/3132847.3132926"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1109\/TNNLS.2022.3183210"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1145\/2766462.2767755"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1609\/aaai.v38i18.29966"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.18653\/v1\/D19-1018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1109\/CVPR.2019.00509"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1145\/3626772.3657782"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1109\/ICDE48307.2020.00021"},{"doi-asserted-by":"crossref","unstructured":"Charles Spearman. 1961. The proof and measurement of association between two things. (1961).","key":"e_1_3_2_2_19_1","DOI":"10.1037\/11491-005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1145\/3357384.3357895"},{"doi-asserted-by":"crossref","unstructured":"Jiaxi Tang Hongyi Wen and Ke Wang. 2020. Revisiting adversarially learned injection attacks against recommender systems. In RecSys.","key":"e_1_3_2_2_21_1","DOI":"10.1145\/3383313.3412243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1145\/3583780.3615211"},{"volume-title":"25th USENIX security symposium (USENIX Security 16). 601-618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16). 601-618.","key":"e_1_3_2_2_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/3539618.3591751"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1609\/aaai.v39i12.33392"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1145\/3512352"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1145\/3580305.3599324"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1145\/3726302.3730003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1145\/3701551.3703484"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/3637528.3671795"},{"key":"e_1_3_2_2_31_1","volume-title":"Poisoning attacks and defenses in recommender systems: A survey. arXiv preprint arXiv:2406.01022","author":"Wang Zongwei","year":"2024","unstructured":"Zongwei Wang, Junliang Yu, Min Gao, Wei Yuan, Guanhua Ye, Shazia Sadiq, and Hongzhi Yin. 2024b. Poisoning attacks and defenses in recommender systems: A survey. arXiv preprint arXiv:2406.01022 (2024)."},{"unstructured":"Chenwang Wu Defu Lian Yong Ge Zhihao Zhu and Enhong Chen. 2021b. Triple adversarial learning for influence based poisoning attack in recommender systems. In CIKM.","key":"e_1_3_2_2_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1016\/j.ins.2021.07.041"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1609\/aaai.v38i18.29974"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1145\/3630005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.1145\/3460231.3474275"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_37_1","DOI":"10.1145\/3523227.3546770"},{"doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Yaliang Li Bolin Ding and Jing Gao. 2020. Practical data poisoning attack against next-item recommendation. In WWW.","key":"e_1_3_2_2_38_1","DOI":"10.1145\/3366423.3379992"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1145\/3488560.3498386"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_40_1","DOI":"10.1109\/CVPR42600.2020.00031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_41_1","DOI":"10.48550\/ARXIV.2312.11571"}],"event":{"sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"CIKM '25","name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:26:54Z","timestamp":1765499214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3761032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":41,"alternative-id":["10.1145\/3746252.3761032","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3761032","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}