<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Empowering shilling attacks with Katz and Exclusivity-based relatedness</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Felice Antonio Merra</string-name>
          <email>felmerra@amazon.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vito Walter Anelli</string-name>
          <email>ter.anelli@poliba.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yashar Deldjoo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tommaso Di Noia</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eugenio Di Sciascio</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Amazon Web Services</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Politecnico di Bari</institution>
          ,
          <addr-line>Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Sixth Knowledge-aware and Conversational Recommender Systems (KaRS) Workshop @ RecSys 2024</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Several domains have widely benefited from the adoption of Knowledge graphs ( ). For recommender systems (RSs), the adoption of  has resulted in accurate, personalized recommendations of items/products according to users' preferences. Among diferent recommendation techniques, collaborative ifltering (CF) is one the most promising approaches to build RSs. Their success is due to the efective exploitation of similarities/correlations encoded in user interaction patterns. Nonetheless, their strength is also their weakness. A malicious agent can add fake user profiles into the platform, altering the genuine similarity values and the corresponding recommendation lists. While the research community has extensively studied  to solve various recommendation problems, including the empowerment of semantic-aware shilling attacks, limited attention has been paid on exploiting  relatedness measures, i.e., Katz and Exclusivity-based, computed considering 1-hop of graph exploration. We performed an extensive experimental evaluation with four state-of-the-art recommendation systems and two well-known recommendation datasets to investigate the efectiveness of introducing relatedness information on semantic-aware shilling attacks. Since the semantics of relations has a crucial role in , we have also analyzed the impact of relations' semantics by grouping them in various classes. Experimental results indicate the benefit of embracing  in favor of the attackers' capability in attacking recommendation systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Shilling Attacks</kwd>
        <kwd>Collaborative Filtering</kwd>
        <kwd>Knowledge Graphs</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The advent of Knowledge Graphs () has changed the way structured information is stored.
It has become much more than that developed to make the Semantic Web a concrete idea. The
core idea of building a semantic network in which information is represented as directed labeled
graphs (RDF graphs) is disarmingly simple. Nevertheless, thanks to the possibilities it paves,
it has been welcomed with several promises and expectancies. Complete interoperability, the
ability to link knowledge across domains, and the possibility to exploit Logical inference and
proofs are just a few of them. In numerous domains, the exploitation of the  information has
become the norm. Thanks to the appearance of wide-ranging Linked Datasets like DBpedia and
Wikidata, we have witnessed the oflurishing of novel techniques in several research fields, like
Machine Learning, Information Retrieval, and Recommender Systems. To date, Recommender
Systems (RSs) are considered the focal solution to assist users’ decision-making process. Since
the volume of the available products on the Web overwhelms the users, RSs support and ease the
decision process. Among them, collaborative filtering (CF) recommendation techniques have
shown very high performance in real-world applications (e.g., Amazon [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]). Their rationale is
to analyze products experienced by similar users to produce tailored recommendations.
Algorithmically speaking, they take advantage of user-user and item-item similarities. Regrettably,
malicious users may want to jeopardize the operation of the recommendation platform. For
example, they might be a rival company or agents who want to increase (or decrease) the
visibility of a particular product. Whatever they are motivated by, the problem is that these
similarities are vulnerable to the insertion of fake profiles. This kind of attack is called the
shilling attack [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which aims to push or nuke the probabilities to recommend an item. The
malicious agent (or adversary) can rely on an extensive list of techniques to conduct the attack.
Researchers and companies have classified them into two broad categories [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]: low-knowledge
and informed attack strategies. In the former attacks, the adversary has poor system-specific
knowledge [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. In the latter, the attacker has an accurate knowledge of the recommendation
model and the data distribution [
        <xref ref-type="bibr" rid="ref4 ref6">4, 6</xref>
        ].
      </p>
      <p>
        Interestingly, despite the astonishing spread of , little attention has been paid to
knowledge-aware strategies to mine RS’s security. Since  provide comprehensive
information on numerous knowledge domains, a malicious agent can decide to attack RSs making use of
the items’ semantic descriptions. One work exploiting publicly available information obtained
from  to generate more influential fake profiles to threaten CF models’ performance is named
semantics-aware shilling attack SAShA [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This work extended state-of-the-art shilling attack
approaches such as Random, BandWagon, and Average profiting from publicly available semantic
information without supposing any additional knowledge about the system. While the previous
study modified these attacks considering the cosine vector similarity between the semantic
description of items, in this work, we identify that SAShA only considers the cosine similarity
across the semantic details, which is not particularly suited to bring out semantic relatedness.
      </p>
      <p>In this work, we have overcome this limitation by going beyond the cosine similarity by
considering Katz centrality and Exclusivity-based relatedness. Finally, to provide a more fine-grained
analysis, we have grouped the semantic relations into three classes: ontological, categorical,
and factual relations.</p>
      <p>
        In detail, this study extends the state-of-the-art approach for the integration of semantics in
the shilling attacks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] in numerous directions:
1. two novel graph topological and semantic approaches to build the set of items from which
the adversary can craft the fake profiles;
2. a novel semantic shilling attack strategy based on BandWagon strategy;
3. a deeper discussion of the experimental results involving several dimensions: type of
considered relation, recommendation model, amount of injected fake profiles, and dataset.
      </p>
      <p>We have conducted extensive experiments to evaluate the impact of proposed attacks against
the recommendation models. To this end, we have exploited two real-world recommender system
datasets (LibraryThing and Yahoo!Movies). Experimental results sharply indicate that 
information is a valuable source of knowledge that improves attacks’ efectiveness. Moreover,
adopting semantic relatedness measures can unleash the full potential of the semantics-aware
attacks.</p>
      <p>The remainder of the paper proceeds as follows. In Section 2, we provide an overview of the
state-of-the-art recommendation models and shilling attacks. Section 3 describes the proposed
extensions to the SAShA by introducing the semantic relatedness measures, and formalizes the
semantic attack strategies. Section 4 focuses on the experimental validation of the proposed
attack scenarios. We also provide an in-depth discussion of the experimental results analyzing
the several dimensions of the study. Finally, in Section 6, we draw some conclusions and
introduce the open challenges.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <sec id="sec-2-1">
        <title>2.1. Recommender Systems</title>
        <p>A recommendation problem can be stated as finding a utility function to automatically predict
how much users will like unknown items.</p>
        <p>Definition 1 (Recommendation Problem). Let  and ℐ denote a set of users and items in a
system, respectively. Each user  ∈  is related to ℐ+, the set of items she has consumed, or her
user profile. Given a utility function  :  × ℐ → R a Recommendation Problem is defined as
∀ ∈  , ′ = argmax (, )
∈ℐ
where ′ denotes an item not consumed by the user  before. We assume that the preference of
user  ∈  on item  ∈ ℐ is encoded with a continuous-valued preference score  ∈ ℛ, where ℛ
represent the set of (, ) pairs for which  is known.</p>
        <p>
          The major class of recommendation models includes content-based filtering (CBF),
collaborative filtering (CF), and hybrid [
          <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
          ]. CBF models build a profile of user interests based on
the content features of the items preferred by that user (liked or consumed), characterizing the
nature of her interests. CF models compute recommendations based on similarities in preference
patterns of like-minded users. They can be classified according to neighborhood-based and
model-based. Neighborhood-based models compute recommendations exclusively based on
correlations in interactions across users (user-based CF [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ]) or items (item-based CF [
          <xref ref-type="bibr" rid="ref11 ref12">12, 11</xref>
          ]),
while model-based approaches learn a model that can be queried in the production phase to
generate recommendations for a given user profile, e.g., MF [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Knowledge-aware RSs</title>
        <p>
          RSs exploit various side information such as metadata (e.g., tags, reviews) [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], social
connections [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], image and audio signal features [16], and users-items contextual data [17] to build
more in-domain [18] (i.e., domain-dependent), cross-domain [19], or context-aware [20, 21]
recommendation models. Among the diverse information sources, Knowledge Graphs ()
are one of the most relevant. A  is a heterogeneous network that encodes multiple
relationships, edges, nodes, and links items at high-level relationships, making them a strong item
representation technique. Thanks to the heterogeneous domains that  cover, the design of
knowledge-based recommendation systems has arisen as a specific research field of its own
in the community of RSs, usually referred to by Knowledge-aware Recommender Systems
(KaRS [22, 23]). Knowledge-aware Recommender Systems have been particularly impactful for
several research domains:
ℎ/graph-embeddings [
          <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19">24, 25, 26, 27, 28, 29, 30</xref>
          ], hybrid collaborative/content-based
recommendation [
          <xref ref-type="bibr" rid="ref20">25, 31</xref>
          ], knowledge-completion, link-prediction, knowledge-discovery [
          <xref ref-type="bibr" rid="ref19 ref21 ref22 ref23 ref24 ref25 ref26 ref27">32,
33, 34, 30, 35, 36, 37, 38</xref>
          ], knowledge-transfer, cross-domain recommendation [
          <xref ref-type="bibr" rid="ref28 ref29">39, 19, 40</xref>
          ],
interpretable/explainable-recommendation [
          <xref ref-type="bibr" rid="ref20 ref30 ref31 ref32 ref33">41, 42, 43, 44, 31</xref>
          ], graph-based recommendation [
          <xref ref-type="bibr" rid="ref34 ref35 ref36 ref37 ref38 ref39">45,
46, 47, 48, 49, 50</xref>
          ], content-based recommendation [
          <xref ref-type="bibr" rid="ref40 ref41">51, 52</xref>
          ].
        </p>
        <p>
          All the former advances have been shown to enhance the recommendation quality or the
overall user experience. Although the algorithms difer on many levels, we can still classify
recommendation techniques into two broad approaches: Path-based methods [
          <xref ref-type="bibr" rid="ref34 ref35 ref36 ref39">45, 46, 47, 50, 53, 54</xref>
          ],
which employ paths and meta-paths to estimate the user-item similarities or the nearest items;
and KG embedding-based techniques [
          <xref ref-type="bibr" rid="ref20 ref34">45, 26, 31, 55, 21, 56</xref>
          ], which leverage  embeddings
(usually obtained through matrix factorization or neural network encoding) for items’
representation.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Security of RSs</title>
        <p>
          Malicious users, the adversaries, can meticulously craft fake profiles to poison the data and alter
the recommendation behavior toward malicious goals [57, 58, 59]. An adversary may execute a
shilling attack (injection of malicious profiles) to achieve a whole diferent set of objectives.
To name a few, she may want to demote competitor products [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], misuse the underlying
recommendation system [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], or increase the recommendability of specific products [60, 61].
        </p>
        <p>
          The research works on shilling attacks explored two main research perspectives: proposing
and investigating attack strategies with their efects on the recommendation performance [
          <xref ref-type="bibr" rid="ref4">4,
62, 63, 64</xref>
          ] and exploring defensive mechanisms [
          <xref ref-type="bibr" rid="ref42">59, 65, 66, 67, 68, 69</xref>
          ].
        </p>
        <p>
          A typical characteristic of the first line of research on shilling attacks is that the adversary’s
knowledge is related only to the recommender system’s user-item interaction matrix.
Furthermore, Anelli et al. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] demonstrate that publicly available  improves adversary’s eficacy,
also in the case of low-informed attacks (e.g., Random). In this work, we extend the SAShA
framework to verify the possible improvement of the adversary’s eficacy when processing the
 information with semantic similarity measures.
        </p>
        <p>
          Note that this work focuses on shilling attacks, that are hand-engineered strategies to study
recommender systems’ security. This research line is diferent from machine-learned data
poisoning attack [
          <xref ref-type="bibr" rid="ref43 ref44 ref45 ref46 ref47">70, 71, 72, 73, 74</xref>
          ] and adversarial machine-learned attacks [
          <xref ref-type="bibr" rid="ref48 ref49 ref50 ref51 ref52">75, 76, 61, 77, 78, 79</xref>
          ]
where adversaries adopt optimization techniques to create perturbations.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Method</title>
      <p>This section introduces the reader to the notations and formalisms that may help understand
the design of shilling attacks against targeted items integrating information obtained from a
knowledge graph ().</p>
      <sec id="sec-3-1">
        <title>3.1. Knowledge Graph Content Extraction</title>
        <p>A knowledge graph is a structured repository of knowledge, designed in the form of a graph,
that encodes various kinds of information:
• Factual. General statements as Rika Dialina was born in Crete or Heraklion is the capital of
Crete that describe an entity by using a controlled vocabulary of predicates that connect
the entity to other entities (or literal values).
• Categorical. These statements connect the entity to a particular category (i.e., the
categories associated with a Wikipedia page). Often, categories are in turn organized as a
hierarchy.
• Ontological. These are formal statements that describe the entity’s nature and its
ontological membership to a specific class. Classes are often organized in a hierarchical
structure. In contrast to categories, sub-classes and super-classes are connected through
IS-A relations.</p>
        <p>
          In a knowledge graph, we can express statements through triplets  →−  , with a subject ( ), a
predicate (or relation) ( ), and an object (). There are several ways to transform the knowledge
coming from a knowledge graph into a feature. We have chosen to represent each distinct path
as an explicit feature [
          <xref ref-type="bibr" rid="ref20">31</xref>
          ].
        </p>
        <p>Given a set of items  = {ℐ1, ℐ2, . . . , ℐ } in a collection and the corresponding triples
⟨, ,  ⟩ in a knowledge graph, the set of 1-hop features is defined as 1- - = {⟨,  ⟩ |
⟨, ,  ⟩ ∈  with  ∈ }.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Entity Similarity/Relatedness in KGs</title>
        <p>
          The keystone of the Knowledge Graph representation is the semantics enclosed in the resource
description and the predicates that connect the diferent resources. Nevertheless, if the metric
to compute similarities between the resources is not carefully chosen, this piece of information
is lost irretrievably. Motivated by this awareness, we decided to consider a broad spectrum of
diverse similarity/relatedness metrics in addition to the cosine vector similarity [
          <xref ref-type="bibr" rid="ref53">80</xref>
          ] (used
in  [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]: Katz centrality [
          <xref ref-type="bibr" rid="ref54">81</xref>
          ] and Exclusivity-based semantic relatedness [
          <xref ref-type="bibr" rid="ref55">82</xref>
          ]. In
general, the three metrics cover diferent aspects of the similarity between the resource a signal
of the overlap of the descriptions and a semantics-aware signal that highlights the specificity of
the relations between the resources.
        </p>
        <p>
          Cosine Vector Similarity is a well-known similarity that is very popular in recommendation
systems. The idea is to measure how similar the two diferent representations are. Suppose a
numerical vector can represent the resource description, with the number of the predicate-object
chains observed in the  being the vector’s cardinality. Mathematically, it measures the cosine
of the angle between two vectors that represent two diferent resources. The smaller the angle,
the higher the cosine similarity is, and thus the similarity. Suppose  and  are two items in the
, and  (· ) is a function that returns the features associated with an entity in the . Hence
(,  ) is a function that returns 1 if entity  is associated with feature  , else 0. The Cosine
Vector Similarity has been already formulated for  as follows [
          <xref ref-type="bibr" rid="ref53">80</xref>
          ]:
(, ) = √︁∑︀∈() (,)2· √︁∑︀∈() (,)2
        </p>
        <p>∑︀∈()∪() (,)· (,)</p>
        <sec id="sec-3-2-1">
          <title>This is the baseline method used in ℎ [7]/</title>
          <p>
            Katz centrality [
            <xref ref-type="bibr" rid="ref54">81</xref>
            ] is a famous graph-centrality measure that inspired several
semanticsaware metrics [
            <xref ref-type="bibr" rid="ref55 ref56">83, 82</xref>
            ]. Katz suggests that the probability of the path between two nodes can
indicate the efectiveness of the link. Given a constant probability for a single-hop path, called
 , the whole path’s overall probability is  , where  is the number of the nodes involved.
Hulpus [
            <xref ref-type="bibr" rid="ref55">82</xref>
            ] exploits the rationale to build a relatedness measure. Therefore, he defined the
Katz relatedness between two items  and  as the accumulated score over the top- shortest
(1)
(2)
(3)
where
          </p>
          <p>() is the set of the top- shortest paths between items  and . This is the first novel
similarity metric tested in this work. Note that the shortest path has a larger implication in
multi-hops experiments; results on these have been reported in .</p>
          <p>
            Exclusivity-based semantic relatedness [
            <xref ref-type="bibr" rid="ref55">82</xref>
            ] is a semantic relatedness measure that takes
into account the type of relations that connect two nodes. The idea is that two concepts are
strongly connected if the type of relations between them is diferent from the type of relations
they have with other concepts. This property of relations, named exclusivity, is defined as
follows.
          </p>
          <p>Suppose a predicate  of type  between two items  and , directed from  to . The exclusivity
of predicate  is the probability of selecting, with a uniform random distribution, a predicate
 ′ of type  among the predicates of type  that exit resource  and enter node , such that
predicate  ′ is exactly the predicate  :
paths between them.
 ) =</p>
          <p>1

|→− *|
+ |*→−
 | − 1
where |→− *|</p>
          <p>|*→−
→−
  is in |→− *|</p>
          <p>and in |*→−
| denotes the number of relations of type  ∈  that enter resource . Since the relation
 |, 1 is subtracted from the denominator. The exclusivity score
denotes the cardinality of relations of type 
∈  that exit resource , and
is defined as:
for a predicate falls inside the (0, 1] interval. The value 1 denotes the extreme case in which the
predicate is the only relation of its type for both  and .</p>
          <p>Given a path through ,  = →1−</p>
          <p>2 →− 2 , . . . ,  with   ∈  ∓ , the weight of the path
relatedness measure is therefore defined as follows:</p>
          <p>∈ (0, 1], can be introduced. The overall exclusivity-based

()
(, ) =</p>
          <p>∑︁  ℎ()ℎ()
∈
This is the second novel similarity metric tested in this work.</p>
          <p>Overview of shilling attack strategies and their profile composition for adversaries’ goal of pushing a
Selection
Random
Random
Random
Random
Semantics-aware
Semantics-aware
Semantics-aware
Semantics-aware (∑︀|∈| |ℐ|)/2</p>
          <p>Filler Items (ℐ )
Number Items
∑︀∈ |ℐ|
∑︀∈|||ℐ| − 1
||</p>
          <p>− 1
∅
∅
∑︀∈ |ℐ| − 1
(∑︀|∈| |ℐ|)/2</p>
          <p>||
∑︀∈ |ℐ| − 1
∑︀∈|||ℐ| − 1
∑︀∈|||ℐ| − 1
||</p>
          <p>Rating

((,  2)) ℐ − ℐ 
(( ,  2))
((,</p>
          <p>2))
((,  2)) ℐ − ℐ 

(( ,  2))
((, 
2))</p>
          <p>ℐ
ℐ − ℐ 
ℐ − ℐ 
ℐ − ℐ 
ℐ − ℐ 
ℐ − ℐ 
ℐ − ℐ 
ℐ − ℐ  − ℐ 
ℐ − ℐ  − ℐ  
(4)
(5)
ℐ









(6)</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Attacks</title>
        <p>target item (ℐ ).</p>
        <p>
          Attack Type
Random [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
Love-Hate [
          <xref ref-type="bibr" rid="ref57">84</xref>
          ]
Popular [
          <xref ref-type="bibr" rid="ref58">85</xref>
          ]
Average [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
Bandwagon [62]
P. Knowledge [57]
SAShA Random
into four sets:
SAShA Love-Hate ∅
SAShA Average
SAShA Bandwagon (∑︀∈ |ℐ|)/2 − 1
        </p>
        <p>||
Number Items</p>
        <p>Selected Items (ℐ)</p>
        <p>Rating
∅
∅
∅
∅
∅
∑︀∈ |ℐ| − 1</p>
        <p>||
∑︀∈ |ℐ| − 1</p>
        <p>||
(∑︀∈ |ℐ|)/2 − 1 
||

 if   &lt;  else  + 1
and maximum rating value.  function generates one integer (i.e., rating) from a discrete uniform distribution.
where ( ,  ) are the dataset average rating and rating variance, ( ,  ) are the filler item ℐ rating average and variance, and  and  are the minimum
Given a Recommendation Problem, a Shilling Profile () is a rating profile partitioned
 = ℐ + ℐ + ℐ + ℐ
items without any ratings.
where ℐ denotes the selected item set containing items identified by the attacker to maximize
the efectiveness of the attack, ℐ is the filler item set, containing a set of randomly selected
items to which rating scores are assigned to make them imperceptible. ℐ is the target item,
for which the recommendation model will make a prediction, aimed to be maximal (for push
attack) or minimum (for nuke attack). Finally, ℐ is the unrated item set, holding a number of</p>
        <p>Note that ℐ and ℐ are chosen depending on the attack strategy, and the attack size is the
number of injected fake user profiles. Throughout this paper, we use  = |ℐ | to represent the
ifller size,  = |ℐ| the selected item set size and  = |ℐ∅| to show the size of unrated items.
Table 1 summarizes the main parameters involved in the implementation of most prominent
shilling attacks against rating-based CF models. For instance, it can be seen that ℎ attacks
are the extension of state-of-the-art shilling attacks, with the diference that selection of the
ifller item set ( ℐ ) is chosen semantically, not randomly.</p>
        <p>
          Semantics-aware Random Attack is an extension of the baseline Random Attack [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. The
baseline version is a naive attack, which uses randomly chosen items ( = 0,  = profile-size ) to
create a fake user profile. The ratings attributed to ℐ are sampled from a uniform distribution
(see Table 1). ℎ modify this attack by selecting the items to complete ℐ with the
cosinesimilarity. In this work, we exploit semantic similarities/relatedness between the items in the
catalog e the target item using -based features (cf. Section 3.1). Afterward, we identify the
most similar items (ℐ ) by considering the first quartile of most similar items, and we extract 
items from this set by adopting a uniform distribution.
        </p>
        <p>
          Semantics-aware Average Attack is an informed attack strategy that extends the
AverageBots attack [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. The baseline attack leverages the mean and variance of the ratings, which
is then used to sample each filer item’s rating from a normal distribution built using these
values. Similar to the previous semantics-aware attack extension, we extract the filler items by
exploiting semantic similarities derived from a . Finally, as before, we consider the items in
the first quartile of the most semantically similar/related to ℐ as the candidate filler items ( ℐ ).
        </p>
        <p>Semantics-aware BandWagon Attack is a low-knowledge attack that extends the standard
BandWagon attack [62]. We leave unchanged the injection of the selected items (ℐ), which are
the most popular ones and on which we associate the maximum possible rating (see Table 1).
However, similarly to the previous two semantic attack extensions, we complete ℐ by taking
into account the semantic similarity/relatedness between the target item ℐ and the rest of the
catalog.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Setting</title>
      <sec id="sec-4-1">
        <title>4.1. Dataset</title>
        <p>
          We tested the proposed approaches on two datasets. The first is LibraryThing [
          <xref ref-type="bibr" rid="ref39">50</xref>
          ] and it is
a popular dataset whose interactions originate from librarything.com, a social cataloging
web application. The dataset contains user-item rating scores ranging from a minimum of 1
to a maximum of 10. As presented in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], we use a reduced version by randomly extracting
the 25% of products in the catalog. Furthermore, we apply a 5-core filtering by removing all
the users with less than five interactions to focus the study on active users. These users are of
adversaries’ interest since they could more likely buy the pushed products.
        </p>
        <p>The second is Yahoo!Movies which is a recommendation dataset released by
research.yahoo.com with ratings collected up to November 2003. The dataset also provides
mappings to the MovieLens and EachMovie catalogs. The recorded interactions consist of
ratings ranging from 1 to 5.</p>
        <p>Both datasets have a mapping between the items in the catalogs and DBpedia knowledge-base
entities. In particular, we use the mappings publicly available at https://github.com/sisinflab/
LinkedDatasets. Table 2 reports the statistics of both datasets.</p>
        <p>Dataset
LibraryThing</p>
        <p>Yahoo!Movies</p>
        <p>Dataset
LibraryThing
Yahoo!Movies
4.1.1. Feature Extraction</p>
        <p>
          Once the items are semantically reconciled with DBpedia entities, we remove the noisy
features whose triples contain one of the following predicates: owl:sameAs, dbo:thumbnail,
foaf:depiction, prov:wasDerivedFrom, foaf:isPrimaryTopicOf. The feature
denoising procedure follows the methodology proposed in [
          <xref ref-type="bibr" rid="ref20 ref31">42, 31</xref>
          ].
4.1.2. Feature Selection
To perform the analysis of the groups (or types) of semantic features, we implement our proposed
semantics-aware attacks by considering three diferent types of features, i.e., categorical (CS),
ontological (OS), and factual (FS), a feature taxonomy commonly adopted in the Semantic Web
community [
          <xref ref-type="bibr" rid="ref20">31</xref>
          ]. We apply the following policies Categorical-1H, we use the features with the
property dcterms:subject, Ontological-1H, we select the features containing the property
rdf:type, and Factual-1H, we consider all the features except ontological and categorical
features.
4.1.3. Feature Filtering
This work aims to study the attack performance diferences up to the first hop. Addressing this
aim, we obtain thousands of features for both LibraryThing and Yahoo!Movies as reported
in the last two columns of Table 2. Measuring semantic similarities across the item catalog would
quickly become unfeasible. However, some features only occur once and provide no useful
informative or collaborative information. Therefore, we decided to drop of irrelevant features
following the filtering technique proposed by Di Noia et al. [
          <xref ref-type="bibr" rid="ref39">50</xref>
          ], Paulheim and Fürnkranz [
          <xref ref-type="bibr" rid="ref59">86</xref>
          ].
In detail, we removed all the features with more than 99.74% of missing values and distinct
values. Table 3 shows the remaining features’ statistics after applying the extraction, selection,
and filtering.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Recommender Models</title>
        <p>
          In this work, we test our attack proposal (see Section 3.3) against four baseline collaborative RSs.
Two neighborhood-based: User-kNN, on which we [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ] set the size of the neighborhood 
to 40, and Item-kNN [
          <xref ref-type="bibr" rid="ref11 ref12">12, 11</xref>
          ], where  = 40 too. Two model-based: Matrix Factorization
(MF) [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], where we set the size of latent vectors to 100, and Neural Matrix Factorization
(NeuMF) [
          <xref ref-type="bibr" rid="ref60">87</xref>
          ], on which we used a deep neural network composed by 4 fully connected dense
layers with {64, 32, 16, 8} hidden units.
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Evaluation Metrics</title>
        <p>We evaluate the attack performance using @ . The metric describes the average presence
of target items in the top- recommendation lists generated for all the users after the attack.
Since we will experiment with the case of push attacks, it follows that the adversary’s goal is to
increase/maximize the HR of the attacked/targeted items.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Evaluation Protocol</title>
        <p>
          We perform 180 experiments for each dataset, totaling 720 experiments. Following the
evaluation procedure used in [
          <xref ref-type="bibr" rid="ref4">60, 4</xref>
          ], we generate the list of recommendations for each recommendation
model before executing the attack. After having measured the position and predicted score
for each target item-user pair, we simulated the attack. Each attack is performed against 50
randomly selected items in each dataset. Furthermore, we perform each attack using three
diferent amounts of injected shilling profiles: 1%, 2.5%, and 5% of the total number of users,
as adopted in [
          <xref ref-type="bibr" rid="ref5 ref7">7, 63, 5</xref>
          ]. Regarding the relatedness measures, we set the  = 0.25 and the -path
length to 10 for both metrics. Datasets and code will be made publicly available.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experimental Results</title>
      <p>RQ1: What is the impact of relatedness-based measures and publicly available semantic
information? Let us consider the experiments on LibraryThing. We can observe that the adoption
of graph-based relatedness generally leads to an attack eficacy improvement over the baseline,
which adopts the cosine similarity metric. For instance, the random attack largely benefits from
the topological information. The same happens for Yahoo!Movies too in Table 5. Indeed, HR
for &lt; User-NN, Random, Categorical, Katz&gt; is 10% better than the baseline, i.e., 0.3725 vs.
0.3512. Beyond random attacks, we can observe some general trends also for informed attacks.
In detail, Table 4 (LibraryThing), we note that categorical information improves both
UserNN and Item-NN. It is worth noticing that the same consideration does not hold for latent
factor-based models. MF and NeuMF suit better cosine vector similarity. This phenomenon is
probably due to the significant diference in how the two recommendation families exploit the
additional information.</p>
      <p>
        Finally, we can focus on the BandWagon attack. In that case, the attack already exploits
the most influential knowledge source for collaborative filtering algorithms: popularity. It
follows that the integration with other knowledge sources, e.g.,  , does not provide any
significant improvement. However, the influence of popularity is so high in this attack that
the final recommendation lists are subject to a strong popularity bias [
        <xref ref-type="bibr" rid="ref61">88</xref>
        ]. Indeed, adding
fake profiles with the maximum ratings, e.g., 5 in
Yahoo!Movies and 10 in LibraryThing,
Hit Ratio ( ) result values evaluated on top-10 recommendation lists for the Yahoo!Movies dataset.
The usage of Cosine similarity is the baseline approach proposed in SAShA.
placed on the most popular/rated items that will form the ℐ (see Table 1) will amplify, even
more, the probability that these items will be recommended in the highest positions of top-
recommendation lists making inefective the adversaries’ pushing goal toward the target items.
As a consequence, it even prevents the attacked recommendation system from suggesting the
target item. All the experimental datasets and all the recommendation models clearly show this
efect.
      </p>
      <p>Another aspect that we want to underline is that increasing the number of fake profiles
injected into the systems unleashes the potential of diferent semantic knowledge types. Let
us take as an example the &lt;LibraryThing, Average, MF&gt;. With 1% injected fake profiles,
we observe the best results with Factual knowledge and Katz centrality. With 2%, the best
results are with Factual knowledge and cosine similarity. Finally, with 5%, the best results come
with Ontological knowledge and cosine similarity. This behavior suggests that the graph-based
similarities have a big impact even in a very sparse scenario. In contrast, with the increase of fake
profiles, the cosine similarity starts leveraging interesting correlations. On the other dimension,
the factual information is massive by nature, and it is crucial in sparse scenarios. However,
when the number of fake profiles increases, the knowledge at a higher level of abstraction
(Categorical and Ontological) finds its way to improve the attack eficacy further.</p>
      <p>RQ2: What is the most impactful type of semantic information?</p>
      <sec id="sec-5-1">
        <title>We start focusing on Cate</title>
        <p>gorical knowledge. The experiments on LibraryThing show that Exclusivity is probably the
relatedness that best suits this information type. However, the results are not that clear for the
Yahoo!Movies dataset. This behavior suggests that semantic information type and relatedness
are not the only members of the equation. Indeed, the extension and the quality of the item
descriptions seem to have a role. Afterward, we focus on Ontological information. Here, we
can draw a general consideration since, for both datasets, it is the cosine similarity metric that
leads to the best results. Lastly, Factual information respects all the general remarks we have
drawn before showing that relatedness is a better source of adversaries’ knowledge to perform
more efective attacks.</p>
        <p>In detail, we found that with low-knowledge attacks, the best relatedness is Exclusivity for
LibraryThing and Katz for Yahoo!Movies. With informed attacks, the best relatedness
metric is the cosine similarity. However, for the sake of electing a similarity that better suits Factual
information, we can note that Exclusivity generally leads to better results with LibraryThing.</p>
        <p>RQ3: What are the most vulnerable recommendation models&gt; Since the neighborhood-based
models directly exploit a similarity to compute the recommendation lists, they are the privileged
victim models to efectively alter the recommendation performance. Slightly more robust are
latent factor models on which the new semantic attacks will still produce an improvement in
the attacker’s performance. Finally, the most robust model is NeuMF. This result is probably due
to the nonlinearity of NeuMF that helps the model avoid learning from the pretended profiles.
In detail, the neural network may learn more sophisticated correlations that the other models
do not capture. We believe that this ability deserves specific further investigation since it may
lead to developing a new line of research on Deep Learning-based semantics-aware attacks that
might exploit non-linear item-item similarities to build more impactful attack methods.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>In this work, we verified how the adoption of stronger semantic similarity measures of structured
and freely accessible knowledge can further improve malicious agents’ ability to attack a
recommendation platform. Starting from the state-of-the-art semantics-aware shilling attacks (SAShA),
this work investigated the impact of graph-based metrics (Katz centrality and Exclusivity-based
relatedness) and semantic information type. As a result, we verified that: (1) the adoption of
structured knowledge generally improves by a large margin the attacker’s performance, (2) the
graph-based metrics can eficiently deal with very sparse scenarios capturing similarities that
are otherwise imperceptible, (3) the type of semantic information to feed the attacking system
with has a significant function in enhancing the adversaries’ efectiveness, (4) neural models are
the sole recommendation techniques to be more robust to semantic attacks. The latter finding
suggests that there is still room for improvements in the semantics-aware attacks investigating
Deep Learning-based semantic attacks.
and Web Data Mining, WSDM 2011, Hong Kong, China, February 9-12, 2011, 2011, pp.
635–644.
[16] Y. Deldjoo, M. F. Dacrema, M. G. Constantin, H. Eghbal-zadeh, S. Cereda, M. Schedl,
B. Ionescu, P. Cremonesi, Movie genome: alleviating new item cold start in movie
recommendation, User Model. User-Adapt. Interact. 29 (2019) 291–343.
[17] V. W. Anelli, V. Bellini, T. Di Noia, W. L. Bruna, P. Tomeo, E. Di Sciascio, An analysis on
time- and session-aware diversification in recommender systems, in: UMAP, ACM, 2017,
pp. 270–274.
[18] Q. Guo, F. Zhuang, C. Qin, H. Zhu, X. Xie, H. Xiong, Q. He, A survey on knowledge
graph-based recommender systems, IEEE Transactions on Knowledge &amp; Data Engineering
(5555) 1–1. doi:10.1109/TKDE.2020.3028705.
[19] I. Fernández-Tobías, I. Cantador, P. Tomeo, V. W. Anelli, T. D. Noia, Addressing the
user cold start with cross-domain collaborative filtering: exploiting item metadata in
matrix factorization, User Model. User Adapt. Interact. 29 (2019) 443–486. URL: https:
//doi.org/10.1007/s11257-018-9217-6. doi:10.1007/s11257-018-9217-6.
[20] Y. Huo, D. F. Wong, L. M. Ni, L. S. Chao, J. Zhang, Knowledge modeling via contextualized
representations for lstm-based personalized exercise recommendation, Inf. Sci. 523 (2020)
266–278. URL: https://doi.org/10.1016/j.ins.2020.03.014. doi:10.1016/j.ins.2020.03.
014.
[21] M. Hildebrandt, S. S. Sunder, S. Mogoreanu, M. Joblin, A. Mehta, I. Thon, V. Tresp, A
recommender system for complex real-world applications with nonlinear dependencies
and knowledge graph context, in: ESWC, volume 11503 of Lecture Notes in Computer
Science, Springer, 2019, pp. 179–193.
[22] V. W. Anelli, T. Di Noia, 2nd workshop on knowledge-aware and conversational
recommender systems - kars, in: CIKM, ACM, 2019, pp. 3001–3002.
[23] V. W. Anelli, P. Basile, D. G. Bridge, T. D. Noia, P. Lops, C. Musto, F. Narducci, M. Zanker,
Knowledge-aware and conversational recommender systems, in: S. Pera, M. D.
Ekstrand, X. Amatriain, J. O’Donovan (Eds.), Proceedings of the 12th ACM Conference
on Recommender Systems, RecSys 2018, Vancouver, BC, Canada, October 2-7, 2018, ACM,
2018, pp. 521–522. URL: https://doi.org/10.1145/3240323.3240338. doi:10.1145/3240323.
3240338.
[24] E. Palumbo, D. Monti, G. Rizzo, R. Troncy, E. Baralis, entity2rec: Property-specific
knowledge graph embeddings for item recommendation, Expert Syst. Appl. 151 (2020) 113235.</p>
      <p>URL: https://doi.org/10.1016/j.eswa.2020.113235. doi:10.1016/j.eswa.2020.113235.
[25] J. Li, Z. Xu, Y. Tang, B. Zhao, H. Tian, Deep hybrid knowledge graph embedding for top-n
recommendation, in: G. Wang, X. Lin, J. A. Hendler, W. Song, Z. Xu, G. Liu (Eds.), Web
Information Systems and Applications - 17th International Conference, WISA 2020, Guangzhou,
China, September 23-25, 2020, Proceedings, volume 12432 of Lecture Notes in
Computer Science, Springer, 2020, pp. 59–70. URL: https://doi.org/10.1007/978-3-030-60029-7_6.
doi:10.1007/978-3-030-60029-7\_6.
[26] M. Nayyeri, S. Vahdati, X. Zhou, H. S. Yazdi, J. Lehmann, Embedding-based
recommendations on scholarly knowledge graphs, in: A. Harth, S. Kirrane, A. N. Ngomo, H. Paulheim,
A. Rula, A. L. Gentile, P. Haase, M. Cochez (Eds.), The Semantic Web - 17th International
Conference, ESWC 2020, Heraklion, Crete, Greece, May 31-June 4, 2020, Proceedings,
September 5-7, 2012, ACM, 2012, pp. 1–8. URL: https://doi.org/10.1145/2362499.2362501.
doi:10.1145/2362499.2362501.
[53] X. Yu, X. Ren, Y. Sun, Q. Gu, B. Sturt, U. Khandelwal, B. Norick, J. Han, Personalized entity
recommendation: a heterogeneous information network approach, in: WSDM, ACM, 2014,
pp. 283–292.
[54] L. Gao, H. Yang, J. Wu, C. Zhou, W. Lu, Y. Hu, Recommendation with multi-source
heterogeneous information, in: IJCAI, ijcai.org, 2018, pp. 3378–3384.
[55] H. Wang, F. Zhang, X. Xie, M. Guo, DKN: deep knowledge-aware network for news
recommendation, in: WWW, ACM, 2018, pp. 1835–1844.
[56] T. Di Noia, C. Magarelli, A. Maurino, M. Palmonari, A. Rula, Using ontology-based data
summarization to develop semantics-aware recommender systems, in: ESWC, volume
10843 of Lecture Notes in Computer Science, Springer, 2018, pp. 128–144.
[57] M. P. O’Mahony, N. J. Hurley, N. Kushmerick, G. C. M. Silvestre, Collaborative
recommendation: A robustness analysis, ACM Trans. Internet Techn. 4 (2004) 344–377.
[58] C. C. Aggarwal, Attack-resistant recommender systems, in: Recommender Systems,</p>
      <p>Springer, 2016, pp. 385–410.
[59] R. Bhaumik, C. Williams, B. Mobasher, R. Burke, Securing collaborative filtering against
malicious attacks through anomaly detection, in: Proceedings of the 4th Workshop on
Intelligent Techniques for Web Personalization (ITWP’06), Boston, volume 6, 2006, p. 10.
[60] B. Mobasher, R. Burke, R. Bhaumik, C. Williams, Efective attack models for shilling
item-based collaborative filtering systems, in: Proceedings of the WebKDD Workshop,
Citeseer, 2005, pp. 13–23.
[61] T. D. Noia, D. Malitesta, F. A. Merra, Taamr: Targeted adversarial attack against multimedia
recommender systems, in: DSN Workshops, IEEE, 2020, pp. 1–8.
[62] M. P. O’Mahony, N. J. Hurley, G. C. M. Silvestre, Recommender systems: Attack types and
strategies, in: AAAI, AAAI Press / The MIT Press, 2005, pp. 334–339.
[63] Y. Deldjoo, T. D. Noia, F. A. Merra, Assessing the impact of a user-item collaborative attack
on class of users, in: ImpactRS@RecSys, volume 2462 of CEUR Workshop Proceedings,
CEUR-WS.org, 2019.
[64] Y. Deldjoo, T. D. Noia, E. D. Sciascio, F. A. Merra, How dataset characteristics afect
the robustness of collaborative recommendation models, in: Proceedings of the 43rd
International ACM SIGIR conference on research and development in Information Retrieval,
SIGIR 2020, Virtual Event, China, July 25-30, 2020, ACM, 2020, pp. 951–960. URL: https:
//doi.org/10.1145/3397271.3401046. doi:10.1145/3397271.3401046.
[65] J. Cao, Z. Wu, B. Mao, Y. Zhang, Shilling attack detection utilizing semi-supervised learning
method for collaborative recommender system, World Wide Web 16 (2013) 729–748.
[66] W. Zhou, J. Wen, Q. Xiong, M. Gao, J. Zeng, Svm-tia a shilling attack detection method
based on svm and target item analysis in recommender systems, Neurocomputing 210
(2016) 197–205.
[67] W. Zhou, J. Wen, Q. Qu, J. Zeng, T. Cheng, Shilling attack detection for recommender
systems based on credibility of group users and rating time series, PloS one 13 (2018)
e0196533.
[68] M. Aktukmak, Y. Yilmaz, I. Uysal, Quick and accurate attack detection in recommender
systems through user attributes, in: RecSys, ACM, 2019, pp. 348–352.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Appendices</title>
      <sec id="sec-7-1">
        <title>7.1. Multiple hop v.s. single-hop attacks.</title>
        <p>The subsequent analysis focuses on the impact of the 1-hop and 2-hops of the  exploration.</p>
        <p>Analogously to 1-hop definition insection 3.1, we built 2nd-hop features. By continuing the
exploration of  we retrieve the triples →−  ′ ′, where  is the object of a 1st-hop triple
and the subject of the next triple. The double-hop predicate is denoted by  ′ and the object is
referred as (′). Therefore, the overall feature set is defined as 2- - = {⟨, ,  ′, ′⟩ |
⟨, , ,  ′, ′⟩ ∈  with  ∈ }. Given the current definition, 2nd-hop features also contain
heterogeneous predicates (see the previous classification of diferent kinds of statements). To
make it possible to analyze the impact of the kind of semantic information, we consider a
2nd-hop feature as Factual if and only if both relations ( , and  ′) are Factual. The same holds
for the other types of encoded information. In the attacks employing double-hop (2H) features,
the strategies evolve as described below:
• Categorical-2H, we pick up the features with either dcterms:subject or
skos:broader properties;
• Ontological-2H, we select the features containing either rdf-schema:subClassOf or
owl:equivalentClass properties;
• Factual-2H, we use the features not selected in the previous two classes.
Note that we did not place any domain-specific categorical/ontological features in the respective
lists. To provide a domain-agnostic evaluation, we have treated them as factual features. Table 6
shows the average variation of attack eficacy passing from the adoption of single-hop extracted
features to the double-hop extraction for LibraryThing and Yahoo!Movies.</p>
        <p>Analyzing the results of attacks on Yahoo!Movies in Table 6, the first and foremost
consideration we can draw is that graph-based relatedness measures seem to have no positive
impact when exploiting a double-hop exploration. However, it can be observed that those
relatedness metrics already achieved impressive results with the first-hop exploration. Hence,
further improving the performance is somehow challenging. Indeed, in most cases, we can
observe a minimal variation in the double-hop performance. However, in some cases, the
attacks witness a more significant decrease, probably due to the injection of some noisy and
Variation of Hit Ratio () when using the features extracted from the second hop concerning the first
hop for both the LibraryThing and Yahoo!Movies datasets.</p>
        <p>NeuMF</p>
        <p>Attack
Categorical
loosely related second-hop features. In general, given the high performance achieved with
a single-hop exploration, it seems that it is not worth exploring the second-hop, and thus
increasing the computational complexity and introducing the new challenge of loosely-related
second-hop features. Beyond graph-based relatedness, we observe that cosine vector similarity
almost always shows an improvement when considering second-hop features (particularly with
Ontological and Factual information). Finally, we have to observe that, even here, the NeuMF
model does not benefit from this new information.</p>
        <p>Table 6 also shows the average attack eficacy variation for</p>
        <sec id="sec-7-1-1">
          <title>LibraryThing. Here, some of</title>
          <p>the previously described behaviors are even more evident. In detail, we note that the cosine
similarity takes advantage of the second-hop information. In this case, we can also observe
Katz’s improvement, suggesting that this metric did not have unleashed its full potential with
only the first-hop features. Finally, in some cases, the second-hop information also improves
informed attacks (reaching a peak of 53% improvement for &lt;Average, Factual, Exclusivity&gt;),
confirming a less evident trend we found with Yahoo!Movies.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Linden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . York, Amazon.com recommendations:
          <article-title>Item-to-item collaborative ifltering</article-title>
          ,
          <source>IEEE Internet Computing</source>
          <volume>7</volume>
          (
          <year>2003</year>
          )
          <fpage>76</fpage>
          -
          <lpage>80</lpage>
          . URL: https://doi.org/10.1109/MIC.
          <year>2003</year>
          .
          <volume>1167344</volume>
          . doi:
          <volume>10</volume>
          .1109/MIC.
          <year>2003</year>
          .
          <volume>1167344</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kaleli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bilge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Polat</surname>
          </string-name>
          ,
          <article-title>Shilling attacks against recommender systems: a comprehensive survey</article-title>
          ,
          <source>Artif. Intell. Rev</source>
          .
          <volume>42</volume>
          (
          <year>2014</year>
          )
          <fpage>767</fpage>
          -
          <lpage>799</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. P. O'Mahony</surname>
            ,
            <given-names>N. J.</given-names>
          </string-name>
          <string-name>
            <surname>Hurley</surname>
          </string-name>
          ,
          <article-title>Robust collaborative recommendation</article-title>
          ,
          <source>in: Recommender Systems Handbook</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>961</fpage>
          -
          <lpage>995</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Lam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Riedl</surname>
          </string-name>
          ,
          <article-title>Shilling recommender systems for fun and profit</article-title>
          , in: WWW, ACM,
          <year>2004</year>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>402</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Mobasher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bhaumik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness</article-title>
          ,
          <source>ACM Trans. Internet Techn</source>
          .
          <volume>7</volume>
          (
          <year>2007</year>
          )
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. P. K.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Shilling attack based on item popularity and rated item correlation against collaborative filtering</article-title>
          ,
          <source>Int. J. Machine Learning &amp; Cybernetics</source>
          <volume>10</volume>
          (
          <year>2019</year>
          )
          <fpage>1833</fpage>
          -
          <lpage>1845</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deldjoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          , Sasha:
          <article-title>Semantic-aware shilling attacks on recommender systems exploiting knowledge graphs</article-title>
          ,
          <source>in: The Semantic Web - 17th International Conference, ESWC</source>
          <year>2020</year>
          , Heraklion, Crete, Greece, May 31-June 4,
          <year>2020</year>
          , Proceedings, volume
          <volume>12123</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>323</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -49461-2_
          <fpage>18</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -49461-2\_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ricci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shapira</surname>
          </string-name>
          ,
          <article-title>Introduction to recommender systems handbook</article-title>
          , in: F.
          <string-name>
            <surname>Ricci</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Rokach</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Shapira</surname>
          </string-name>
          , P. B.
          <string-name>
            <surname>Kantor</surname>
          </string-name>
          (Eds.),
          <source>Recommender Systems Handbook</source>
          , Springer,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          . URL: https://doi.org/10.1007/978-0-
          <fpage>387</fpage>
          -85820-
          <issue>3</issue>
          _1. doi:
          <volume>10</volume>
          .1007/ 978-0-
          <fpage>387</fpage>
          -85820-3\_1.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          ,
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions</article-title>
          ,
          <source>IEEE Trans. Knowl. Data Eng</source>
          .
          <volume>17</volume>
          (
          <year>2005</year>
          )
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          . URL: https://doi.org/10.1109/TKDE.
          <year>2005</year>
          .
          <volume>99</volume>
          . doi:
          <volume>10</volume>
          .1109/TKDE.
          <year>2005</year>
          .
          <volume>99</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Resnick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Iacovou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Suchak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bergstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Riedl</surname>
          </string-name>
          ,
          <string-name>
            <surname>Grouplens:</surname>
          </string-name>
          <article-title>An open architecture for collaborative filtering of netnews</article-title>
          , in: CSCW, ACM,
          <year>1994</year>
          , pp.
          <fpage>175</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koren</surname>
          </string-name>
          ,
          <article-title>Factor in the neighbors: Scalable and accurate collaborative filtering</article-title>
          ,
          <source>TKDD</source>
          <volume>4</volume>
          (
          <year>2010</year>
          ) 1:
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          :
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Sarwar</surname>
          </string-name>
          , G. Karypis,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Konstan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Riedl</surname>
          </string-name>
          ,
          <article-title>Item-based collaborative filtering recommendation algorithms</article-title>
          , in: V. Y.
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Saito</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          <string-name>
            <surname>Lyu</surname>
          </string-name>
          , M. E. Zurko (Eds.),
          <source>Proceedings of the Tenth International World Wide Web Conference, WWW 10</source>
          ,
          <string-name>
            <surname>Hong</surname>
            <given-names>Kong</given-names>
          </string-name>
          , China, May 1-
          <issue>5</issue>
          ,
          <year>2001</year>
          , ACM,
          <year>2001</year>
          , pp.
          <fpage>285</fpage>
          -
          <lpage>295</lpage>
          . URL: https://doi.org/10.1145/371920.372071. doi:
          <volume>10</volume>
          .1145/371920.372071.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Bell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Volinsky</surname>
          </string-name>
          ,
          <article-title>Matrix factorization techniques for recommender systems</article-title>
          ,
          <source>IEEE Computer 42</source>
          (
          <year>2009</year>
          )
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.</given-names>
            <surname>Ning</surname>
          </string-name>
          , G. Karypis,
          <article-title>Sparse linear methods with side information for top-n recommendations</article-title>
          , in: P. Cunningham,
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Hurley</surname>
          </string-name>
          , I. Guy, S. S. Anand (Eds.),
          <source>Sixth ACM Conference on Recommender Systems, RecSys '12</source>
          , Dublin, Ireland, September 9-
          <issue>13</issue>
          ,
          <year>2012</year>
          , ACM,
          <year>2012</year>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>162</lpage>
          . URL: https://doi.org/10.1145/2365952.2365983. doi:
          <volume>10</volume>
          .1145/2365952. 2365983.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Backstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          ,
          <article-title>Supervised random walks: predicting and recommending links in social networks</article-title>
          ,
          <source>in: Proceedings of the Forth International Conference on Web Search volume 12123 of Lecture Notes in Computer Science</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>255</fpage>
          -
          <lpage>270</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -49461-2_
          <fpage>15</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -49461-2\_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y. Zhang,</surname>
          </string-name>
          <article-title>Distilling structured knowledge into embeddings for explainable and accurate recommendation</article-title>
          , in: J.
          <string-name>
            <surname>Caverlee</surname>
            ,
            <given-names>X. B.</given-names>
          </string-name>
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lalmas</surname>
          </string-name>
          , W. Wang (Eds.),
          <source>WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining</source>
          , Houston, TX, USA, February 3-
          <issue>7</issue>
          ,
          <year>2020</year>
          , ACM,
          <year>2020</year>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>743</lpage>
          . URL: https://doi.org/10.1145/3336191.3371790. doi:
          <volume>10</volume>
          .1145/3336191.3371790.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Torzec</surname>
          </string-name>
          ,
          <article-title>Layered graph embedding for entity recommendation using wikipedia in the yahoo! knowledge graph, in:</article-title>
          <string-name>
            <given-names>A. E. F.</given-names>
            <surname>Seghrouchni</surname>
          </string-name>
          , G. Sukthankar, T. Liu, M. van Steen (Eds.),
          <source>Companion of The 2020 Web Conference</source>
          <year>2020</year>
          , Taipei, Taiwan,
          <source>April 20- 24</source>
          ,
          <year>2020</year>
          , ACM / IW3C2,
          <year>2020</year>
          , pp.
          <fpage>811</fpage>
          -
          <lpage>818</lpage>
          . URL: https://doi.org/10.1145/3366424.3383570. doi:
          <volume>10</volume>
          .1145/3366424.3383570.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ristoski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rosati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Leone</surname>
          </string-name>
          , H. Paulheim,
          <article-title>Rdf2vec: RDF graph embeddings and their applications</article-title>
          ,
          <source>Semantic Web</source>
          <volume>10</volume>
          (
          <year>2019</year>
          )
          <fpage>721</fpage>
          -
          <lpage>752</lpage>
          . URL: https://doi.org/10.3233/ SW-180317. doi:
          <volume>10</volume>
          .3233/SW-180317.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>T.</given-names>
            <surname>Dettmers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Minervini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Stenetorp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Riedel</surname>
          </string-name>
          ,
          <article-title>Convolutional 2d knowledge graph embeddings, in: S. A</article-title>
          .
          <string-name>
            <surname>McIlraith</surname>
            ,
            <given-names>K. Q.</given-names>
          </string-name>
          <string-name>
            <surname>Weinberger</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence</source>
          ,
          <source>(AAAI-18)</source>
          ,
          <source>the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18)</source>
          , New Orleans, Louisiana, USA, February 2-
          <issue>7</issue>
          ,
          <year>2018</year>
          , AAAI Press,
          <year>2018</year>
          , pp.
          <fpage>1811</fpage>
          -
          <lpage>1818</lpage>
          . URL: https://www.aaai.org/ocs/index.php/AAAI/ AAAI18/paper/view/17366.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Di</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Trotta</surname>
          </string-name>
          ,
          <article-title>How to make latent factors interpretable by feeding factorization machines with knowledge graphs</article-title>
          , in: C.
          <string-name>
            <surname>Ghidini</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Hartig</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Maleshkova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Svátek</surname>
            ,
            <given-names>I. F.</given-names>
          </string-name>
          <string-name>
            <surname>Cruz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hogan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lefrançois</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Gandon</surname>
          </string-name>
          (Eds.),
          <source>The Semantic Web - ISWC 2019 - 18th International Semantic Web Conference</source>
          , Auckland, New Zealand,
          <source>October 26-30</source>
          ,
          <year>2019</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , volume
          <volume>11778</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2019</year>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>56</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -30793-
          <issue>6</issue>
          _3. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -30793-6\_3.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>G.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <article-title>Mining implicit entity preference from user-item interaction data for knowledge graph completion via adversarial learning</article-title>
          , in: Y.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>King</surname>
          </string-name>
          , T. Liu, M. van Steen (Eds.),
          <source>WWW '20: The Web Conference</source>
          <year>2020</year>
          , Taipei, Taiwan,
          <source>April 20-24</source>
          ,
          <year>2020</year>
          , ACM / IW3C2,
          <year>2020</year>
          , pp.
          <fpage>740</fpage>
          -
          <lpage>751</lpage>
          . URL: https://doi.org/10.1145/3366423. 3380155. doi:
          <volume>10</volume>
          .1145/3366423.3380155.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bordes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Usunier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>García-Durán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Weston</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yakhnenko</surname>
          </string-name>
          ,
          <article-title>Translating embeddings for modeling multi-relational data</article-title>
          , in: C.
          <string-name>
            <surname>J. C. Burges</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Bottou</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Ghahramani</surname>
            ,
            <given-names>K. Q.</given-names>
          </string-name>
          <string-name>
            <surname>Weinberger</surname>
          </string-name>
          (Eds.),
          <source>Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8</source>
          ,
          <year>2013</year>
          ,
          <string-name>
            <given-names>Lake</given-names>
            <surname>Tahoe</surname>
          </string-name>
          , Nevada, United States,
          <year>2013</year>
          , pp.
          <fpage>2787</fpage>
          -
          <lpage>2795</lpage>
          . URL: https://proceedings.neurips.cc/paper/2013/hash/ 1cecc7a77928ca8133fa24680a88d2f9-Abstract.html.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Chua</surname>
          </string-name>
          ,
          <article-title>Unifying knowledge graph learning and recommendation: Towards a better understanding of user preferences</article-title>
          , in: L. Liu,
          <string-name>
            <given-names>R. W.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mantrach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. J. McAuley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Baeza-Yates</surname>
          </string-name>
          , L. Zia (Eds.),
          <source>The World Wide Web Conference, WWW</source>
          <year>2019</year>
          , San Francisco, CA, USA, May
          <volume>13</volume>
          -17,
          <year>2019</year>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>161</lpage>
          . URL: https://doi.org/10.1145/3308558.3313705. doi:
          <volume>10</volume>
          .1145/3308558.3313705.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>G.</given-names>
            <surname>Piao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. G.</given-names>
            <surname>Breslin</surname>
          </string-name>
          ,
          <article-title>Transfer learning for item recommendations and knowledge graph completion in item related domains via a co-factorization model</article-title>
          , in: A.
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Navigli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Vidal</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Troncy</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hollink</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tordai</surname>
          </string-name>
          , M. Alam (Eds.),
          <source>The Semantic Web - 15th International Conference, ESWC</source>
          <year>2018</year>
          , Heraklion, Crete, Greece, June 3-7,
          <year>2018</year>
          , Proceedings, volume
          <volume>10843</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2018</year>
          , pp.
          <fpage>496</fpage>
          -
          <lpage>511</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -93417-4_
          <fpage>32</fpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -93417-4\_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Schlichtkrull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Kipf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bloem</surname>
          </string-name>
          , R. van den Berg, I. Titov,
          <string-name>
            <given-names>M.</given-names>
            <surname>Welling</surname>
          </string-name>
          ,
          <article-title>Modeling relational data with graph convolutional networks</article-title>
          , in: A.
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Navigli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Vidal</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Troncy</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hollink</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tordai</surname>
          </string-name>
          , M. Alam (Eds.),
          <source>The Semantic Web - 15th International Conference, ESWC</source>
          <year>2018</year>
          , Heraklion, Crete, Greece, June 3-7,
          <year>2018</year>
          , Proceedings, volume
          <volume>10843</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2018</year>
          , pp.
          <fpage>593</fpage>
          -
          <lpage>607</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -93417-4_
          <fpage>38</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -93417-4\_
          <fpage>38</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>C.</given-names>
            <surname>Shang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>End-to-end structure-aware convolutional networks for knowledge base completion</article-title>
          ,
          <source>in: The Thirty-Third AAAI Conference on Artificial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2019</year>
          ,
          <source>The Thirty-First Innovative Applications of Artificial Intelligence Conference</source>
          ,
          <string-name>
            <surname>IAAI</surname>
          </string-name>
          <year>2019</year>
          ,
          <source>The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI</source>
          <year>2019</year>
          , Honolulu, Hawaii, USA, January 27 - February 1,
          <year>2019</year>
          , AAAI Press,
          <year>2019</year>
          , pp.
          <fpage>3060</fpage>
          -
          <lpage>3067</lpage>
          . URL: https://doi.org/10.1609/aaai.v33i01.33013060. doi:
          <volume>10</volume>
          .1609/aaai.v33i01.
          <fpage>33013060</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          , M. Liu, T. Chua,
          <article-title>KGAT: knowledge graph attention network for recommendation</article-title>
          , in: A.
          <string-name>
            <surname>Teredesai</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Rosales</surname>
          </string-name>
          , E. Terzi, G. Karypis (Eds.),
          <source>Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining, KDD</source>
          <year>2019</year>
          ,
          <article-title>Anchorage</article-title>
          ,
          <string-name>
            <surname>AK</surname>
          </string-name>
          , USA,
          <year>August</year>
          4-
          <issue>8</issue>
          ,
          <year>2019</year>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>950</fpage>
          -
          <lpage>958</lpage>
          . URL: https://doi.org/10.1145/3292500.3330989. doi:
          <volume>10</volume>
          .1145/3292500.3330989.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , P. Hao,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Zhang,</surname>
          </string-name>
          <article-title>Cross-domain recommendation with semantic correlation in tagging systems</article-title>
          ,
          <source>in: International Joint Conference on Neural Networks, IJCNN 2019 Budapest, Hungary, July 14-19</source>
          ,
          <year>2019</year>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . URL: https://doi.org/10.1109/ IJCNN.
          <year>2019</year>
          .
          <volume>8852049</volume>
          . doi:
          <volume>10</volume>
          .1109/IJCNN.
          <year>2019</year>
          .
          <volume>8852049</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>T.</given-names>
            <surname>Köllmer</surname>
          </string-name>
          , E. Berndl,
          <string-name>
            <given-names>T.</given-names>
            <surname>Weißgerber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Aichroth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kosch</surname>
          </string-name>
          ,
          <article-title>A workflow for cross media recommendations based on linked data analysis</article-title>
          , in: R. Troncy,
          <string-name>
            <given-names>R.</given-names>
            <surname>Verborgh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. J. B.</given-names>
            <surname>Nixon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kurz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Schlegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Sande</surname>
          </string-name>
          (Eds.),
          <source>Joint Proceedings of the 4th International Workshop on Linked Media and the 3rd Developers Hackshop co-located with the 13th Extended Semantic Web Conference ESWC</source>
          <year>2016</year>
          , Heraklion, Crete, Greece, May
          <volume>30</volume>
          ,
          <year>2016</year>
          , volume
          <volume>1615</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2016</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1615</volume>
          /limePaper1.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bellini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <article-title>Knowledge-aware interpretable recommender systems</article-title>
          , in: I.
          <string-name>
            <surname>Tiddi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Lécué</surname>
          </string-name>
          , P. Hitzler (Eds.),
          <source>Knowledge Graphs for eXplainable Artificial Intelligence: Foundations, Applications and Challenges</source>
          , volume
          <volume>47</volume>
          of
          <article-title>Studies on the Semantic Web</article-title>
          , IOS Press,
          <year>2020</year>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>124</lpage>
          . URL: https://doi.org/10.3233/SSW200014. doi:
          <volume>10</volume>
          .3233/SSW200014.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Di</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Trotta</surname>
          </string-name>
          ,
          <article-title>Semantic interpretation of top-n recommendations</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          . doi:
          <volume>10</volume>
          .1109/TKDE.
          <year>2020</year>
          .
          <volume>3010215</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dong</surname>
          </string-name>
          , Hagerec:
          <article-title>Hierarchical attention graph convolutional network incorporating knowledge graph for explainable recommendation</article-title>
          ,
          <source>Knowl. Based Syst</source>
          .
          <volume>204</volume>
          (
          <year>2020</year>
          )
          <article-title>106194</article-title>
          . URL: https://doi.org/10.1016/j.knosys.
          <year>2020</year>
          .
          <volume>106194</volume>
          . doi:
          <volume>10</volume>
          .1016/j. knosys.
          <year>2020</year>
          .
          <volume>106194</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          , T.-S. Chua,
          <article-title>Explainable reasoning over knowledge graphs for recommendation</article-title>
          ,
          <source>in: Proceedings of the AAAI Conference on Artificial Intelligence</source>
          , volume
          <volume>33</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>5329</fpage>
          -
          <lpage>5336</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <article-title>Knowledge graph enhanced neural collaborative recommendation</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>164</volume>
          (
          <year>2021</year>
          )
          <article-title>113992</article-title>
          . URL: https://doi.org/10.1016/j.eswa.
          <year>2020</year>
          .
          <volume>113992</volume>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2020</year>
          .
          <volume>113992</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>T.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>Mrp2rec: Exploring multiple-step relation path semantics for knowledge graph-based recommendations</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>134817</fpage>
          -
          <lpage>134825</lpage>
          . URL: https://doi.org/10.1109/ACCESS.
          <year>2020</year>
          .
          <volume>3011279</volume>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3011279</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>D.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>A learning path recommendation model based on a multidimensional knowledge graph framework for e-learning,</article-title>
          <source>Knowl. Based Syst</source>
          .
          <volume>195</volume>
          (
          <year>2020</year>
          )
          <article-title>105618</article-title>
          . URL: https://doi.org/10.1016/j.knosys.
          <year>2020</year>
          .
          <volume>105618</volume>
          . doi:
          <volume>10</volume>
          .1016/j. knosys.
          <year>2020</year>
          .
          <volume>105618</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <article-title>Knowledge graph convolutional networks for recommender systems</article-title>
          , in: L. Liu,
          <string-name>
            <given-names>R. W.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mantrach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. J. McAuley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Baeza-Yates</surname>
          </string-name>
          , L. Zia (Eds.),
          <source>The World Wide Web Conference, WWW</source>
          <year>2019</year>
          , San Francisco, CA, USA, May
          <volume>13</volume>
          -17,
          <year>2019</year>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>3307</fpage>
          -
          <lpage>3313</lpage>
          . URL: https://doi.org/10.1145/3308558. 3313417. doi:
          <volume>10</volume>
          .1145/3308558.3313417.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <article-title>Ripplenet: Propagating user preferences on the knowledge graph for recommender systems</article-title>
          , in: A.
          <string-name>
            <surname>Cuzzocrea</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Allan</surname>
            ,
            <given-names>N. W.</given-names>
          </string-name>
          <string-name>
            <surname>Paton</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>A. Z.</given-names>
          </string-name>
          <string-name>
            <surname>Broder</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          <string-name>
            <surname>Zaki</surname>
            ,
            <given-names>K. S.</given-names>
          </string-name>
          <string-name>
            <surname>Candan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Labrinidis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Schuster</surname>
          </string-name>
          , H. Wang (Eds.),
          <source>Proceedings of the 27th ACM International Conference on Information and Knowledge Management</source>
          ,
          <string-name>
            <surname>CIKM</surname>
          </string-name>
          <year>2018</year>
          , Torino, Italy,
          <source>October 22-26</source>
          ,
          <year>2018</year>
          , ACM,
          <year>2018</year>
          , pp.
          <fpage>417</fpage>
          -
          <lpage>426</lpage>
          . URL: https://doi.org/10.1145/3269206.3271739. doi:
          <volume>10</volume>
          .1145/ 3269206.3271739.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. C.</given-names>
            <surname>Ostuni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tomeo</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Di Sciascio</surname>
          </string-name>
          ,
          <article-title>Sprank: Semantic path-based ranking for top-N recommendations using linked open data</article-title>
          ,
          <source>ACM TIST 8</source>
          (
          <year>2016</year>
          ) 9:
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          :
          <fpage>34</fpage>
          . URL: https://doi.org/10.1145/2899005. doi:
          <volume>10</volume>
          .1145/2899005.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lops</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <article-title>Feature factorization for top-n recommendation: From item rating to features relevance</article-title>
          , in: Y. Zheng,
          <string-name>
            <given-names>W.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Sahebi</surname>
          </string-name>
          , I. Fernández (Eds.),
          <source>Proceedings of the 1st Workshop on Intelligent Recommender Systems by Knowledge Transfer &amp; Learning co-located with ACM Conference on Recommender Systems (RecSys</source>
          <year>2017</year>
          ), Como, Italy,
          <year>August 27</year>
          ,
          <year>2017</year>
          , volume
          <volume>1887</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>21</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-1887/paper3.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [52]
          <string-name>
            <surname>T. D. Noia</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Mirizzi</surname>
            ,
            <given-names>V. C.</given-names>
          </string-name>
          <string-name>
            <surname>Ostuni</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Romito</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Zanker</surname>
          </string-name>
          ,
          <article-title>Linked open data to support content-based recommender systems</article-title>
          , in: V.
          <string-name>
            <surname>Presutti</surname>
            , H. S. Pinto (Eds.),
            <given-names>I-SEMANTICS</given-names>
          </string-name>
          <year>2012</year>
          - 8th
          <source>International Conference on Semantic Systems, I-SEMANTICS '12</source>
          ,
          <string-name>
            <surname>Graz</surname>
          </string-name>
          , Austria,
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [69]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks, Decision Support Systems 124 (</article-title>
          <year>2019</year>
          )
          <fpage>113112</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [70]
          <string-name>
            <given-names>B.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Vorobeychik</surname>
          </string-name>
          ,
          <article-title>Data poisoning attacks on factorization-based collaborative filtering</article-title>
          ,
          <source>in: NIPS</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1885</fpage>
          -
          <lpage>1893</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [71]
          <string-name>
            <given-names>K.</given-names>
            <surname>Christakopoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <article-title>Adversarial attacks on an oblivious recommender</article-title>
          , in: RecSys, ACM,
          <year>2019</year>
          , pp.
          <fpage>322</fpage>
          -
          <lpage>330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [72]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Z.</given-names>
            <surname>Gong</surname>
          </string-name>
          , J. Liu,
          <article-title>Influence function based data poisoning attacks to top-n recommender systems</article-title>
          , in: WWW, ACM / IW3C2,
          <year>2020</year>
          , pp.
          <fpage>3019</fpage>
          -
          <lpage>3025</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [73]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <article-title>Certifiable robustness to discrete adversarial perturbations for factorization machines</article-title>
          , in: SIGIR, ACM,
          <year>2020</year>
          , pp.
          <fpage>419</fpage>
          -
          <lpage>428</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [74]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Revisiting adversarially learned injection attacks against recommender systems</article-title>
          ,
          <source>in: Fourteenth ACM Conference on Recommender Systems</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>318</fpage>
          -
          <lpage>327</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [75]
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Du</surname>
          </string-name>
          , T. Chua,
          <article-title>Adversarial personalized ranking for recommendation</article-title>
          , in: SIGIR, ACM,
          <year>2018</year>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>364</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [76]
          <string-name>
            <given-names>F.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Benatallah</surname>
          </string-name>
          ,
          <article-title>Adversarial collaborative neural network for robust recommendation</article-title>
          , in: SIGIR, ACM,
          <year>2019</year>
          , pp.
          <fpage>1065</fpage>
          -
          <lpage>1068</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [77]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Malitesta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          ,
          <article-title>Assessing perceptual and recommendation mutation of adversarially-poisoned visual recommenders (short paper)</article-title>
          ,
          <source>in: DP@AI*IA</source>
          , volume
          <volume>2776</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [78]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deldjoo</surname>
          </string-name>
          , T. DiNoia,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          , Adversarial Recommender Systems: Attack, Defense, and Advances,
          <string-name>
            <surname>Springer</surname>
            <given-names>US</given-names>
          </string-name>
          , New York, NY,
          <year>2022</year>
          , pp.
          <fpage>335</fpage>
          -
          <lpage>379</lpage>
          . URL: https://doi.org/10.1007/978-1-
          <fpage>0716</fpage>
          -2197-
          <issue>4</issue>
          _9. doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>0716</fpage>
          -2197-
          <issue>4</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [79]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Malitesta</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. C. M. Mancino</surname>
          </string-name>
          ,
          <article-title>Denoise to protect: A method to robustify visual recommenders from adversaries</article-title>
          , in: SIGIR, ACM,
          <year>2023</year>
          , pp.
          <fpage>1924</fpage>
          -
          <lpage>1928</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [80]
          <string-name>
            <given-names>T.</given-names>
            <surname>Di</surname>
          </string-name>
          <string-name>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mirizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. C.</given-names>
            <surname>Ostuni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Romito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanker</surname>
          </string-name>
          ,
          <article-title>Linked open data to support content-based recommender systems</article-title>
          ,
          <source>in: Proc. of the 8th Int. Conf. on Semantic Systems</source>
          , ACM,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [81]
          <string-name>
            <given-names>L.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <article-title>A new status index derived from sociometric analysis</article-title>
          ,
          <source>Psychometrika</source>
          <volume>18</volume>
          (
          <year>1953</year>
          )
          <fpage>39</fpage>
          -
          <lpage>43</lpage>
          . URL: https://doi.org/10.1007/BF02289026. doi:
          <volume>10</volume>
          .1007/BF02289026.
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [82]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hulpus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Prangnawarat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hayes</surname>
          </string-name>
          ,
          <article-title>Path-based semantic relatedness on linked data and its use to word and entity disambiguation</article-title>
          ,
          <source>in: International Semantic Web Conference (1)</source>
          , volume
          <volume>9366</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2015</year>
          , pp.
          <fpage>442</fpage>
          -
          <lpage>457</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [83]
          <string-name>
            <given-names>B. P.</given-names>
            <surname>Nunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dietze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Casanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kawase</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Fetahu</surname>
          </string-name>
          , W. Nejdl,
          <article-title>Combining a co-occurrence-based and a semantic measure for entity linking</article-title>
          , in: P. Cimiano, Ó. Corcho,
          <string-name>
            <given-names>V.</given-names>
            <surname>Presutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hollink</surname>
          </string-name>
          , S. Rudolph (Eds.),
          <source>The Semantic Web: Semantics and Big Data</source>
          , 10th International Conference, ESWC 2013, Montpellier, France, May
          <volume>26</volume>
          -30,
          <year>2013</year>
          . Proceedings, volume
          <volume>7882</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2013</year>
          , pp.
          <fpage>548</fpage>
          -
          <lpage>562</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -38288-8_
          <fpage>37</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -38288-8\_
          <fpage>37</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [84]
          <string-name>
            <given-names>B.</given-names>
            <surname>Mobasher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bhaumik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness</article-title>
          ,
          <source>ACM Transactions on Internet Technology (TOIT) 7</source>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [85]
          <string-name>
            <surname>M. P. O'Mahony</surname>
            ,
            <given-names>N. J.</given-names>
          </string-name>
          <string-name>
            <surname>Hurley</surname>
            ,
            <given-names>G. C.</given-names>
          </string-name>
          <string-name>
            <surname>Silvestre</surname>
          </string-name>
          ,
          <article-title>An evaluation of the performance of collaborative filtering</article-title>
          ,
          <source>in: 14th Irish Artificial Intelligence and Cognitive Science (AICS</source>
          <year>2003</year>
          )
          <article-title>Conference</article-title>
          , Citeseer,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [86]
          <string-name>
            <given-names>H.</given-names>
            <surname>Paulheim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fürnkranz</surname>
          </string-name>
          ,
          <article-title>Unsupervised generation of data mining features from linked open data</article-title>
          ,
          <source>in: WIMS, ACM</source>
          ,
          <year>2012</year>
          , pp.
          <volume>31</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          :
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [87]
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Chua</surname>
          </string-name>
          ,
          <article-title>Neural collaborative filtering</article-title>
          , in: WWW, ACM,
          <year>2017</year>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>182</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [88]
          <string-name>
            <given-names>H.</given-names>
            <surname>Abdollahpouri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mobasher</surname>
          </string-name>
          ,
          <article-title>Controlling popularity bias in learning-to-rank recommendation</article-title>
          , in: RecSys, ACM,
          <year>2017</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>