{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:00:53Z","timestamp":1771268453820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,22]]},"DOI":"10.1145\/3773966.3777981","type":"proceedings-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:50:01Z","timestamp":1771264201000},"page":"163-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["LLM Agent-based Shilling Attack on Recommender Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7033-0162","authenticated-orcid":false,"given":"Shengkang","family":"Gu","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5654-5902","authenticated-orcid":false,"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3103-8442","authenticated-orcid":false,"given":"Dongsheng","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9853-8268","authenticated-orcid":false,"given":"Guangping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4911-6093","authenticated-orcid":false,"given":"Mingzhe","family":"Han","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1426-3210","authenticated-orcid":false,"given":"Hansu","family":"Gu","sequence":"additional","affiliation":[{"name":"Independent, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9109-4625","authenticated-orcid":false,"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2915-974X","authenticated-orcid":false,"given":"Ning","family":"Gu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3944-7531","authenticated-orcid":false,"given":"Li","family":"Shang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6633-4826","authenticated-orcid":false,"given":"Tun","family":"Lu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International Conference on Data Science (ICDATA). 1.","author":"Bhaumik Runa","year":"2011","unstructured":"Runa Bhaumik, Bamshad Mobasher, and Robin Burke. 2011. A clustering approach to unsupervised attack detection in collaborative recommender systems. In Proceedings of the International Conference on Data Science (ICDATA). 1."},{"key":"e_1_3_2_1_2_1","unstructured":"Craig Boutilier Martin Mladenov and Guy Tennenholtz. 2023. Modeling recommender ecosystems: Research challenges at the intersection of mechanism design reinforcement learning and generative models."},{"key":"e_1_3_2_1_3_1","first-page":"17","volume-title":"Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI","author":"Burke Robin","year":"2005","unstructured":"Robin Burke, Bamshad Mobasher, and Runa Bhaumik. 2005. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005). 17-24."},{"key":"e_1_3_2_1_4_1","unstructured":"Shihao Cai Jizhi Zhang Keqin Bao Chongming Gao Qifan Wang Fuli Feng and Xiangnan He. 2025. Agentic Feedback Loop Modeling Improves Recommendation and User Simulation. arXiv:2410.20027 [cs.IR] https:\/\/arxiv.org\/abs\/2410.20027"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599502"},{"key":"e_1_3_2_1_6_1","volume-title":"Adversarial recommendation: Attack of the learned fake users. arXiv preprint arXiv:1809.08336","author":"Christakopoulou Konstantina","year":"2018","unstructured":"Konstantina Christakopoulou and Arindam Banerjee. 2018. Adversarial recommendation: Attack of the learned fake users. arXiv preprint arXiv:1809.08336 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347031"},{"key":"e_1_3_2_1_8_1","volume-title":"Tommaso Di Noia, and Felice Antonio Merra","author":"Deldjoo Yashar","year":"2019","unstructured":"Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2019. Assessing the impact of a user-item collaborative attack on class of users. arXiv preprint arXiv:1908.07968 (2019)."},{"key":"e_1_3_2_1_9_1","volume-title":"Neural network matrix factorization. arXiv preprint arXiv:1511.06443","author":"Dziugaite Gintare Karolina","year":"2015","unstructured":"Gintare Karolina Dziugaite and Daniel M Roy. 2015. Neural network matrix factorization. arXiv preprint arXiv:1511.06443 (2015)."},{"key":"e_1_3_2_1_10_1","unstructured":"Luke Friedman Sameer Ahuja David Allen Zhenning Tan Hakim Sidahmed Changbo Long Jun Xie Gabriel Schubiner Ajay Patel Harsh Lara et al. 2023. Leveraging large language models in conversational recommender systems."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411939"},{"key":"e_1_3_2_1_12_1","unstructured":"Ian J Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3726302.3729977"},{"key":"e_1_3_2_1_14_1","unstructured":"Chengkai Huang Junda Wu Yu Xia Zixu Yu Ruhan Wang Tong Yu Ruiyi Zhang Ryan A Rossi Branislav Kveton Dongruo Zhou et al. 2025. Towards agentic recommender systems in the era of multimodal large language models. arXiv preprint arXiv:2503.16734 (2025)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505665"},{"key":"e_1_3_2_1_16_1","unstructured":"Xu Huang Jianxun Lian Yuxuan Lei Jing Yao Defu Lian and Xing Xie. 2023. Recommender ai agent: Integrating large language models for interactive recommendations."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"e_1_3_2_1_18_1","unstructured":"Haruka Kiyohara Fan Yao and Sarah Dean. 2025. Policy Design for Two-sided Platforms with Participation Dynamics."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_20_1","volume-title":"Algorithms for non-negative matrix factorization. Advances in neural information processing systems","author":"Lee Daniel","unstructured":"Daniel Lee and H Sebastian Seung. 2000. Algorithms for non-negative matrix factorization. Advances in neural information processing systems, Vol. 13."},{"key":"e_1_3_2_1_21_1","volume-title":"Reasoning abilities of large language models: In-depth analysis on the abstraction and reasoning corpus. ACM Transactions on Intelligent Systems and Technology","author":"Lee Seungpil","year":"2024","unstructured":"Seungpil Lee, Woochang Sim, Donghyeon Shin, Wongyu Seo, Jiwon Park, Seokki Lee, Sanha Hwang, Sejin Kim, and Sundong Kim. 2024. Reasoning abilities of large language models: In-depth analysis on the abstraction and reasoning corpus. ACM Transactions on Intelligent Systems and Technology (2024)."},{"key":"e_1_3_2_1_22_1","unstructured":"Patrick Lewis Ethan Perez Aleksandra Piktus Fabio Petroni Vladimir Karpukhin Naman Goyal Heinrich K\u00fcttler Mike Lewis Wen-tau Yih Tim Rockt\u00e4schel et al. 2020. Retrieval-augmented generation for knowledge-intensive nlp tasks. 9459-9474 pages."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411884"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3183210"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2566-2571","author":"Liu Jiahao","year":"2025","unstructured":"Jiahao Liu, Shengkang Gu, Dongsheng Li, Guangping Zhang, Mingzhe Han, Hansu Gu, Peng Zhang, Tun Lu, Li Shang, and Ning Gu. 2025a. AgentCF++: Memory-enhanced LLM-based Agents for Popularity-aware Cross-domain Recommendations. In Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2566-2571."},{"key":"e_1_3_2_1_26_1","volume-title":"Recommendation unlearning via matrix correction. arXiv preprint arXiv:2307.15960","author":"Liu Jiahao","year":"2023","unstructured":"Jiahao Liu, Dongsheng Li, Hansu Gu, Tun Lu, Jiongran Wu, Peng Zhang, Li Shang, and Ning Gu. 2023a. Recommendation unlearning via matrix correction. arXiv preprint arXiv:2307.15960 (2023)."},{"key":"e_1_3_2_1_27_1","first-page":"27623","article-title":"Parameter-free dynamic graph embedding for link prediction","volume":"35","author":"Liu Jiahao","year":"2022","unstructured":"Jiahao Liu, Dongsheng Li, Hansu Gu, Tun Lu, Peng Zhang, and Ning Gu. 2022. Parameter-free dynamic graph embedding for link prediction. Advances in Neural Information Processing Systems, Vol. 35 (2022), 27623-27635.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583466"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591779"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2555-2559","author":"Liu Jiahao","year":"2025","unstructured":"Jiahao Liu, Dongsheng Li, Hansu Gu, Peng Zhang, Tun Lu, Li Shang, and Ning Gu. 2025b. Unbiased Collaborative Filtering with Fair Sampling. In Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2555-2559."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714850"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2560-2565","author":"Liu Jiahao","year":"2025","unstructured":"Jiahao Liu, Xueshuo Yan, Dongsheng Li, Guangping Zhang, Hansu Gu, Peng Zhang, Tun Lu, Li Shang, and Ning Gu. 2025d. Improving LLM-powered Recommendations with Personalized Information. In Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2560-2565."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614788"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651306"},{"key":"e_1_3_2_1_35_1","first-page":"334","article-title":"Recommender systems: Attack types and strategies","author":"O'Mahony Michael P","year":"2005","unstructured":"Michael P O'Mahony, Neil J Hurley, and Gu\u00e9nol\u00e9 CM Silvestre. 2005. Recommender systems: Attack types and strategies. In AAAI. 334-339.","journal-title":"AAAI."},{"key":"e_1_3_2_1_36_1","unstructured":"Alec Radford Luke Metz and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks."},{"key":"e_1_3_2_1_37_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans Ilya Sutskever et al. 2018. Improving language understanding by generative pre-training. (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_1"},{"key":"e_1_3_2_1_39_1","first-page":"560","article-title":"Nuking Item-Based Collaborative Recommenders with Power Items and Multiple Targets","author":"Seminario Carlos E","year":"2016","unstructured":"Carlos E Seminario and David C Wilson. 2016. Nuking Item-Based Collaborative Recommenders with Power Items and Multiple Targets.. In FLAIRS. 560-565.","journal-title":"FLAIRS."},{"key":"e_1_3_2_1_40_1","unstructured":"Anu Shrestha Francesca Spezzano and Maria Soledad Pera. 2021. An empirical analysis of collaborative recommender systems robustness to shilling attacks."},{"key":"e_1_3_2_1_41_1","volume-title":"A Human-Centered Recommendation Framework With LLM Agents","author":"Shu Yubo","year":"2024","unstructured":"Yubo Shu, Haonan Zhang, Hansu Gu, Peng Zhang, Tun Lu, Dongsheng Li, and Ning Gu. 2024. RAH! RecSys-Assistant-Human: A Human-Centered Recommendation Framework With LLM Agents. IEEE Transactions on Computational Social Systems (2024)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00021"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022962"},{"key":"e_1_3_2_1_44_1","volume-title":"Sequence to sequence learning with neural networks. Advances in neural information processing systems","author":"Sutskever Ilya","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. Advances in neural information processing systems, Vol. 27."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412243"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3708985"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the ECAI","volume":"6","author":"Williams Chad","year":"2006","unstructured":"Chad Williams, Bamshad Mobasher, Robin Burke, Jeff Sandvig, and Runa Bhaumik. 2006. Detection of obfuscated attacks in collaborative recommender systems. In Proceedings of the ECAI, Vol. 6."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 7th ACM conference on Recommender systems. 427-430","author":"Wilson David C","year":"2013","unstructured":"David C Wilson and Carlos E Seminario. 2013. When power users attack: assessing impacts in collaborative recommender systems. In Proceedings of the 7th ACM conference on Recommender systems. 427-430."},{"key":"e_1_3_2_1_49_1","volume-title":"Bidirectional Knowledge Distillation for Enhancing Sequential Recommendation with Large Language Models. arXiv preprint arXiv:2505.18120","author":"Wu Jiongran","year":"2025","unstructured":"Jiongran Wu, Jiahao Liu, Dongsheng Li, Guangping Zhang, Mingzhe Han, Hansu Gu, Peng Zhang, Li Shang, Tun Lu, and Ning Gu. 2025. Bidirectional Knowledge Distillation for Enhancing Sequential Recommendation with Large Language Models. arXiv preprint arXiv:2505.18120 (2025)."},{"key":"e_1_3_2_1_50_1","volume-title":"Instructagent: Building user controllable recommender via llm agent. arXiv preprint arXiv:2502.14662","author":"Xu Wujiang","year":"2025","unstructured":"Wujiang Xu, Yunxiao Shi, Zujie Liang, Xuying Ning, Kai Mei, Kun Wang, Xi Zhu, Min Xu, and Yongfeng Zhang. 2025. Instructagent: Building user controllable recommender via llm agent. arXiv preprint arXiv:2502.14662 (2025)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2018.00102"},{"key":"e_1_3_2_1_52_1","volume-title":"Incorporated Model-Agnostic Profile Injection Attacks on Recommender Systems. In 2023 IEEE International Conference on Data Mining (ICDM). IEEE, 1481-1486","author":"Yang Shiyi","year":"2023","unstructured":"Shiyi Yang, Lina Yao, Chen Wang, Xiwei Xu, and Liming Zhu. 2023. Incorporated Model-Agnostic Profile Injection Attacks on Recommender Systems. In 2023 IEEE International Conference on Data Mining (ICDM). IEEE, 1481-1486."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657844"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management. 4086-4095","author":"Zhang Guangping","year":"2025","unstructured":"Guangping Zhang, Peng Zhang, Jiahao Liu, Zhuoheng Li, Dongsheng Li, Hansu Gu, Tun Lu, and Ning Gu. 2025b. EvalAgent: Towards Evaluating News Recommender Systems with LLM-based Agents. In Proceedings of the 34th ACM International Conference on Information and Knowledge Management. 4086-4095."},{"key":"e_1_3_2_1_55_1","unstructured":"Jizhi Zhang Keqin Bao Wenjie Wang Yang Zhang Wentao Shi Wanhong Xu Fuli Feng and Tat-Seng Chua. 2024a. Prospect personalized recommendation on large language model-based agent platform."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645537"},{"key":"e_1_3_2_1_57_1","first-page":"2408","volume-title":"IJCAI","volume":"15","author":"Zhang Yongfeng","year":"2015","unstructured":"Yongfeng Zhang, Yunzhi Tan, Min Zhang, Yiqun Liu, Tat-Seng Chua, and Shaoping Ma. 2015. Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation.. In IJCAI, Vol. 15. 2408-2414."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Zijian Zhang Shuchang Liu Ziru Liu Rui Zhong Qingpeng Cai Xiangyu Zhao Chunxu Zhang Qidong Liu and Peng Jiang. 2025a. Llm-powered user simulator for recommender system. 13339-13347 pages.","DOI":"10.1609\/aaai.v39i12.33456"},{"key":"e_1_3_2_1_59_1","first-page":"1726","volume-title":"Companion Proceedings of the ACM Web Conference","author":"Zhu Lixi","year":"2024","unstructured":"Lixi Zhu, Xiaowen Huang, and Jitao Sang. 2024. How reliable is your simulator? analysis on the limitations of current llm-based user simulators for conversational recommendation. In Companion Proceedings of the ACM Web Conference 2024. 1726-1732."}],"event":{"name":"WSDM '26:The Nineteenth ACM International Conference on Web Search and Data Mining","location":"Boise ID USA","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval","SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the Nineteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:00:53Z","timestamp":1771264853000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773966.3777981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,21]]},"references-count":59,"alternative-id":["10.1145\/3773966.3777981","10.1145\/3773966"],"URL":"https:\/\/doi.org\/10.1145\/3773966.3777981","relation":{},"subject":[],"published":{"date-parts":[[2026,2,21]]},"assertion":[{"value":"2026-02-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}