{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T20:29:33Z","timestamp":1744316973936,"version":"3.37.3"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004377","name":"Hong Kong Polytechnic University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/icde51399.2021.00140","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T20:21:20Z","timestamp":1624393280000},"page":"1583-1594","source":"Crossref","is-referenced-by-count":46,"title":["Attacking Black-box Recommendations via Copying Cross-domain User Profiles"],"prefix":"10.1109","author":[{"given":"Wenqi","family":"Fan","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Tyler","family":"Derr","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]},{"given":"Xiangyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Yao","family":"Ma","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Jianping","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"2017","journal-title":"NeuIPS"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/3219819.3219890"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3219819.3219886"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3240323.3240374"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3320496.3320500"},{"year":"2018","author":"sutton","journal-title":"Reinforcement Learning An Introduction","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/MC.2009.263"},{"year":"2015","author":"dulac-arnold","article-title":"Deep reinforcement learning in large discrete action spaces","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/MSP.2017.2743240"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1609\/aaai.v33i01.33013312"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14722\/ndss.2017.23020"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ICDE48307.2020.00021"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3298689.3347031"},{"key":"ref12","first-page":"1885","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"li","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref13","article-title":"Shilling attack detection using rated item correlation for collaborative filtering","author":"chen","year":"2018","journal-title":"SMC"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3274694.3274706"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/988672.988726"},{"key":"ref16","article-title":"Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation","author":"zhang","year":"2015","journal-title":"AAAI"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.knosys.2019.04.001"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2339530.2339684"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-1-4899-7637-6_27"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3219819.3219869"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3336191.3371807"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/CVPR.2018.00175"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3298689.3347011"},{"year":"2014","author":"goodfellow","article-title":"Explaining and harnessing adversarial examples","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3366423.3380072"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3308558.3313488"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3394486.3403049"},{"year":"2019","author":"xu","article-title":"Adversarial attacks and defenses in images, graphs and text: A review","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3038912.3052569"},{"year":"2020","author":"jin","article-title":"Adversarial attacks and defenses on graphs: A review and empirical study","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TKDE.2020.3008732"},{"key":"ref20","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"ICML"},{"key":"ref22","article-title":"Bayesian learning via stochastic gradient langevin dynamics","author":"welling","year":"2011","journal-title":"ICML"},{"key":"ref21","article-title":"Simple black-box adversarial attacks","author":"guo","year":"2019","journal-title":"PMLR"},{"year":"2019","author":"liu","article-title":"Does gender matter? towards fairness in dialogue systems","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1137\/1.9781611976236.40"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.12132","article-title":"Deep modeling of social relations for recommendation","author":"fan","year":"2018","journal-title":"AAAI"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.24963\/ijcai.2019\/187"}],"event":{"name":"2021 IEEE 37th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2021,4,19]]},"location":"Chania, Greece","end":{"date-parts":[[2021,4,22]]}},"container-title":["2021 IEEE 37th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9458599\/9458600\/09458627.pdf?arnumber=9458627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T06:05:27Z","timestamp":1672553127000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9458627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icde51399.2021.00140","relation":{},"subject":[],"published":{"date-parts":[[2021,4]]}}}