{"id":"https://openalex.org/W4410357445","doi":"https://doi.org/10.1145/3672608.3707821","title":"An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack","display_name":"An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4410357445","doi":"https://doi.org/10.1145/3672608.3707821"},"language":"en","primary_location":{"id":"doi:10.1145/3672608.3707821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672608.3707821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065178811","display_name":"Thi-Hanh Le","orcid":null},"institutions":[{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Thi-Hanh Le","raw_affiliation_strings":["VNU-University of Engineering and Technology, Hanoi, Vietnam","Viettel AI, Viettel Group, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"VNU-University of Engineering and Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I67868205"]},{"raw_affiliation_string":"Viettel AI, Viettel Group, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069883625","display_name":"Padipat Sitkrongwong","orcid":"https://orcid.org/0000-0002-2585-2379"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Padipat Sitkrongwong","raw_affiliation_strings":["National Institute of Informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034683400","display_name":"Panagiotis Andriotis","orcid":"https://orcid.org/0000-0002-3490-3123"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Panagiotis Andriotis","raw_affiliation_strings":["University of Birmingham, Birmingham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Birmingham, Birmingham, United Kingdom","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071516373","display_name":"Quang-Thuy Ha","orcid":"https://orcid.org/0000-0002-3901-3357"},"institutions":[{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Quang-Thuy Ha","raw_affiliation_strings":["VNU-University of Engineering and Technology, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"VNU-University of Engineering and Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I67868205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087434029","display_name":"Atsuhiro Takasu","orcid":"https://orcid.org/0000-0002-9061-7949"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Atsuhiro Takasu","raw_affiliation_strings":["National Institute of Informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065178811"],"corresponding_institution_ids":["https://openalex.org/I67868205"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13770776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2061","last_page":"2068"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7632458806037903},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6752731204032898},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.5349705219268799},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34132668375968933},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19897004961967468}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7632458806037903},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6752731204032898},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.5349705219268799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34132668375968933},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19897004961967468},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3672608.3707821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672608.3707821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/6d13d76c-e48f-416c-ad44-1465c4e91539","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/6d13d76c-e48f-416c-ad44-1465c4e91539","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Le, T-H, Sitkrongwong, P, Andriotis, P, Ha, Q-T & Takasu, A 2025, An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack. in SAC '25 : Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing. SAC: Symposium on Applied Computing, vol. 25, Association for Computing Machinery (ACM), pp. 2061-2068, The 40th ACM/SIGAPP Symposium On Applied Computing, Catania, Italy, 31/03/25. https://doi.org/10.1145/3672608.3707821","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1977290284","https://openalex.org/W2020701179","https://openalex.org/W2072651985","https://openalex.org/W2180246528","https://openalex.org/W2578245359","https://openalex.org/W2798868970","https://openalex.org/W2890884621","https://openalex.org/W2897167574","https://openalex.org/W2903665338","https://openalex.org/W2963085847","https://openalex.org/W2972965281","https://openalex.org/W2997340900","https://openalex.org/W2998431760","https://openalex.org/W3012794253","https://openalex.org/W3025378468","https://openalex.org/W3048511744","https://openalex.org/W3087849807","https://openalex.org/W3093673989","https://openalex.org/W3104774544","https://openalex.org/W3104956872","https://openalex.org/W3171665710","https://openalex.org/W3175142666","https://openalex.org/W4384644330","https://openalex.org/W4386728819"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"Recommender":[0],"systems":[1],"(RSs)":[2],"are":[3,24],"extensively":[4],"utilized":[5],"in":[6,165],"e-commerce":[7],"to":[8,26,50,70,95,116],"predict":[9],"users'":[10],"future":[11],"preferences":[12],"for":[13],"unseen":[14],"items":[15],"based":[16],"on":[17],"historical":[18,123],"user-item":[19,124],"interactions.":[20,125],"These":[21],"systems,":[22],"however,":[23],"vulnerable":[25],"manipulations":[27],"by":[28,46,161],"malicious":[29],"actors,":[30],"such":[31],"as":[32,113,136],"unsolicited":[33],"users":[34],"or":[35,52,56],"vendors,":[36],"through":[37],"various":[38,158],"shilling":[39,75,187],"attacks.":[40,188],"Such":[41],"attacks":[42,76],"intentionally":[43],"skew":[44],"recommendations":[45],"injecting":[47],"biased":[48],"data":[49],"promote":[51],"demote":[53],"certain":[54],"products":[55],"services.":[57],"To":[58],"address":[59],"this":[60],"issue,":[61],"we":[62,168],"propose":[63],"a":[64,84,91,110,129],"generative":[65],"model":[66,88,112,173],"called":[67],"Diff-WassGAN,":[68],"designed":[69],"mitigate":[71],"the":[72,97,103,114,118,166],"impact":[73],"of":[74,86,100,106],"within":[77],"an":[78],"adversarial":[79,98],"learning":[80],"framework.":[81],"Diff-WassGAN":[82,172],"uses":[83],"combination":[85],"Diffusion":[87],"(DiffRec)":[89],"and":[90,102,121,154,180],"GAN":[92,101],"framework":[93],"(CFGAN)":[94],"leverage":[96],"advantages":[99,105],"personalization":[104],"DiffRec.":[107],"We":[108,140],"employ":[109],"diffusion":[111],"generator":[115],"process":[117],"inherently":[119],"noisy":[120],"sparse":[122],"The":[126],"discriminator":[127],"is":[128],"multi-layer":[130],"perceptron":[131],"that":[132,170],"employs":[133],"Wasserstein":[134],"distance":[135],"its":[137],"loss":[138],"function.":[139],"conducted":[141],"preliminary":[142],"experiments":[143],"using":[144],"four":[145],"well-known":[146],"evaluation":[147],"datasets:":[148],"MovieLens":[149,151],"100K,":[150],"1M,":[152],"Amazon-apps,":[153],"Yelp.":[155],"By":[156],"simulating":[157],"attack":[159,181],"scenarios":[160],"integrating":[162],"fake":[163],"interactions":[164],"dataset,":[167],"demonstrate":[169],"our":[171],"outperforms":[174],"baseline":[175],"models":[176],"across":[177],"most":[178],"datasets":[179],"types,":[182],"showing":[183],"better":[184],"resistance":[185],"against":[186]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
