{"id":"https://openalex.org/W4416016879","doi":"https://doi.org/10.1145/3746252.3761034","title":"SC-DAG: Semantic-Constrained Diffusion Attacks for Stealthy Exposure Manipulation in Visually-Aware Recommender Systems","display_name":"SC-DAG: Semantic-Constrained Diffusion Attacks for Stealthy Exposure Manipulation in Visually-Aware Recommender Systems","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4416016879","doi":"https://doi.org/10.1145/3746252.3761034"},"language":null,"primary_location":{"id":"doi:10.1145/3746252.3761034","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746252.3761034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ze Lin","orcid":"https://orcid.org/0009-0005-3078-9270"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ze Lin","raw_affiliation_strings":["Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China"],"raw_orcid":"https://orcid.org/0009-0005-3078-9270","affiliations":[{"raw_affiliation_string":"Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102949393","display_name":"Yuqiu Qian","orcid":"https://orcid.org/0009-0007-8894-3271"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yuqiu Qian","raw_affiliation_strings":["The University of Hong Kong, Hong Kong, Hong Kong"],"raw_orcid":"https://orcid.org/0009-0007-8894-3271","affiliations":[{"raw_affiliation_string":"The University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739725","display_name":"Xiaodong Li","orcid":"https://orcid.org/0000-0002-5985-9886"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Li","raw_affiliation_strings":["Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0002-5985-9886","affiliations":[{"raw_affiliation_string":"Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044695231","display_name":"Ziyu Lyu","orcid":"https://orcid.org/0000-0002-3049-0085"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyu Lyu","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0002-3049-0085","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100423840","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-9139-3855"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0001-9139-3855","affiliations":[{"raw_affiliation_string":"Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, Fujian, China","institution_ids":["https://openalex.org/I191208505"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I191208505"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31709735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1829","last_page":"1838"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.2854999899864197,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.2854999899864197,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.12729999423027039,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.07810000330209732,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.6129000186920166},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5268999934196472},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.49459999799728394},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49000000953674316},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.4032999873161316},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.38769999146461487},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.3644999861717224},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.36239999532699585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8378000259399414},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.6129000186920166},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5268999934196472},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.49459999799728394},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49000000953674316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41659998893737793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40549999475479126},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.4032999873161316},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.38769999146461487},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.36239999532699585},{"id":"https://openalex.org/C177769412","wikidata":"https://www.wikidata.org/wiki/Q278090","display_name":"Prior probability","level":3,"score":0.34869998693466187},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34529998898506165},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.337799996137619},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3149000108242035},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.3116999864578247},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.2540000081062317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3746252.3761034","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746252.3761034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8770911657","display_name":null,"funder_award_id":"62002303, 42171456","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2054141820","https://openalex.org/W2072651985","https://openalex.org/W2890884621","https://openalex.org/W2962907114","https://openalex.org/W3133578111","https://openalex.org/W4210334834","https://openalex.org/W4285252390","https://openalex.org/W4294754026","https://openalex.org/W4360884927","https://openalex.org/W4376132596","https://openalex.org/W4382239922","https://openalex.org/W4391468387","https://openalex.org/W4394994587","https://openalex.org/W4399087926"],"related_works":[],"abstract_inverted_index":{"Visually-aware":[0],"recommender":[1],"system":[2],"(VARS)":[3],"has":[4,51],"become":[5],"increasingly":[6],"prevalent":[7],"in":[8,79,117,157],"various":[9],"online":[10],"services":[11],"by":[12,103],"integrating":[13],"visual":[14,33,63,93,143,206],"features":[15],"of":[16,100,174],"items":[17],"to":[18,36,55,205],"enhance":[19,59],"recommendation":[20,38,172],"quality.":[21],"However,":[22],"VARS":[23,148,192,202],"introduces":[24],"new":[25],"security":[26],"vulnerabilities":[27],"and":[28,76,125,136,167,193],"malicious":[29],"attackers":[30],"can":[31],"perform":[32],"shilling":[34,64,94,144,207],"attacks":[35,145],"manipulate":[37],"lists":[39],"via":[40],"uploading":[41],"generated":[42],"images":[43],"with":[44],"visually":[45],"imperceptible":[46],"perturbations.":[47],"While":[48],"prior":[49],"research":[50],"explored":[52],"such":[53],"threats":[54],"help":[56],"service":[57],"providers":[58],"their":[60],"systems,":[61],"existing":[62],"attack":[65,155],"methods":[66,102],"still":[67],"suffer":[68],"from":[69],"uncontrolled":[70],"pixel-space":[71],"perturbation,":[72],"energy":[73],"dispersion":[74],"dilemma":[75],"semantic":[77,137,184],"misalignment":[78],"reference":[80,129],"selection.":[81],"In":[82],"this":[83],"work,":[84],"we":[85],"present":[86],"Semantic-Constrained":[87],"Diffusion":[88],"Adversarial":[89],"Generation":[90],"(SC-DAG)":[91],"for":[92,186,198],"attacks.":[95,208],"SC-DAG":[96,152],"overcomes":[97],"key":[98],"limitations":[99],"previous":[101],"focusing":[104],"perturbations":[105],"on":[106,141,170],"semantically":[107],"meaningful":[108],"image":[109,130],"regions":[110],"through":[111],"contour-aware":[112],"segmentation,":[113],"guiding":[114],"adversarial":[115,189],"generation":[116],"latent":[118],"space":[119],"using":[120],"a":[121,127],"conditional":[122],"diffusion":[123],"process,":[124],"performing":[126,142],"hybrid":[128],"selection":[131],"strategy":[132],"that":[133,151],"balances":[134],"popularity":[135],"similarity.":[138],"Extensive":[139],"experiments":[140],"against":[146,191],"multiple":[147],"models":[149,203],"show":[150],"achieves":[153],"state-of-the-art":[154],"performance":[156,173],"elevating":[158],"target":[159],"items'":[160],"ranking,":[161],"while":[162],"maintaining":[163],"strong":[164],"perceptual":[165],"indistinguishability":[166],"minimal":[168],"impact":[169],"overall":[171],"the":[175,196],"system.":[176],"Our":[177],"work":[178],"offers":[179],"insights":[180],"into":[181],"leveraging":[182],"structured":[183],"priors":[185],"more":[187,200],"sophisticated":[188],"manipulations":[190],"also":[194],"highlights":[195],"necessity":[197],"developing":[199],"robust":[201],"resilient":[204],"We":[209],"provide":[210],"our":[211],"implementation":[212],"at":[213],"https://github.com/KDEGroup/SC-DAG.":[214]},"counts_by_year":[],"updated_date":"2025-11-08T23:25:12.792448","created_date":"2025-11-08T00:00:00"}
