{"id":"https://openalex.org/W2021644234","doi":"https://doi.org/10.1145/2645710.2645722","title":"Attacking item-based recommender systems with power items","display_name":"Attacking item-based recommender systems with power items","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2021644234","doi":"https://doi.org/10.1145/2645710.2645722","mag":"2021644234"},"language":"en","primary_location":{"id":"doi:10.1145/2645710.2645722","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2645710.2645722","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Recommender systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013092398","display_name":"Carlos E. Seminario","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Carlos E. Seminario","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079350138","display_name":"David C. Wilson","orcid":"https://orcid.org/0000-0003-2582-5159"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David C. Wilson","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013092398"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":13.4115,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.98441521,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530004024505615},{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.8460824489593506},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7683141231536865},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.7669989466667175},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.6304863095283508},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.49895548820495605},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.48475882411003113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36334991455078125},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3498682379722595},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.28571343421936035},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24560874700546265},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13370588421821594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530004024505615},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.8460824489593506},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7683141231536865},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.7669989466667175},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.6304863095283508},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.49895548820495605},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.48475882411003113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36334991455078125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3498682379722595},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.28571343421936035},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24560874700546265},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13370588421821594},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2645710.2645722","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2645710.2645722","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Recommender systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W61758119","https://openalex.org/W127545291","https://openalex.org/W950821216","https://openalex.org/W1487499021","https://openalex.org/W1536558110","https://openalex.org/W1598783518","https://openalex.org/W1969347587","https://openalex.org/W1971040550","https://openalex.org/W1989279326","https://openalex.org/W2042281163","https://openalex.org/W2043281479","https://openalex.org/W2044831856","https://openalex.org/W2061901927","https://openalex.org/W2072651985","https://openalex.org/W2079466849","https://openalex.org/W2082182279","https://openalex.org/W2085937320","https://openalex.org/W2142651607","https://openalex.org/W2144194596","https://openalex.org/W2402919393","https://openalex.org/W4232980324","https://openalex.org/W4244404635"],"related_works":["https://openalex.org/W3177075132","https://openalex.org/W2782904003","https://openalex.org/W2963185427","https://openalex.org/W4401051025","https://openalex.org/W4226434912","https://openalex.org/W2065296176","https://openalex.org/W2118633810","https://openalex.org/W2150953077","https://openalex.org/W2002598339","https://openalex.org/W2920931670"],"abstract_inverted_index":{"Recommender":[0],"Systems":[1],"(RS)":[2],"are":[3],"vulnerable":[4],"to":[5,12,33,53,57,71,110,132,143],"attack":[6,26,94,121,134,163],"by":[7],"malicious":[8],"users":[9,91],"who":[10],"intend":[11],"bias":[13],"the":[14,79,96,111,123,139,153],"recommendations":[15],"for":[16,65],"their":[17],"own":[18],"benefit.":[19],"Research":[20],"in":[21,63],"this":[22,114],"area":[23],"has":[24,68],"developed":[25],"models,":[27],"detection":[28],"methods,":[29],"and":[30,35,49,148],"mitigation":[31],"schemes":[32],"understand":[34],"protect":[36],"against":[37],"such":[38,46],"attacks.":[39],"For":[40],"Collaborative":[41],"Filtering":[42],"RSs,":[43],"model-based":[44,73],"approaches":[45],"as":[47,89,101,103],"item-based":[48,106,157],"matrix-factorization":[50],"were":[51],"found":[52],"be":[54],"more":[55],"robust":[56,109,156],"many":[58],"types":[59],"of":[60],"attack.":[61],"Advice":[62],"designing":[64],"system":[66],"robustness":[67],"thus":[69],"been":[70],"employ":[72],"approaches.":[74],"Our":[75],"recent":[76],"work":[77],"with":[78],"Power":[80,124],"User":[81],"Attack":[82,126],"(PUA),":[83],"however,":[84],"determined":[85],"that":[86,128,138],"attackers":[87],"disguised":[88],"influential":[90,130],"can":[92],"successfully":[93,133],"(from":[95],"attacker's":[97],"viewpoint)":[98],"SVD-based":[99,149],"recommenders,":[100],"well":[102],"user-based.":[104],"But":[105],"systems":[107],"remained":[108],"PUA.":[112],"In":[113],"paper":[115],"we":[116],"investigate":[117],"a":[118,160],"new,":[119],"complementary":[120],"model,":[122],"Item":[125],"(PIA),":[127],"uses":[129],"items":[131],"RSs.":[135],"We":[136],"show":[137],"PIA":[140],"is":[141],"able":[142],"impact":[144],"not":[145],"only":[146],"user-based":[147],"recommenders":[150],"but":[151],"also":[152],"heretofore":[154],"highly":[155],"approach,":[158],"using":[159],"novel":[161],"multi-target":[162],"vector.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
