<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Empowering shilling attacks with Katz and Exclusivity-based relatedness</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Felice</forename><forename type="middle">Antonio</forename><surname>Merra</surname></persName>
							<email>felmerra@amazon.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Amazon Web Services</orgName>
								<address>
									<settlement>Berlin</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vito</forename><forename type="middle">Walter</forename><surname>Anelli</surname></persName>
							<email>ter.anelli@poliba.it</email>
							<affiliation key="aff1">
								<orgName type="institution">Politecnico di Bari</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yashar</forename><surname>Deldjoo</surname></persName>
							<email>yashar.deldjoo@poliba.it</email>
							<affiliation key="aff1">
								<orgName type="institution">Politecnico di Bari</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tommaso</forename><forename type="middle">Di</forename><surname>Noia</surname></persName>
							<email>tommaso.dinoia@poliba.it</email>
							<affiliation key="aff1">
								<orgName type="institution">Politecnico di Bari</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eugenio</forename><forename type="middle">Di</forename><surname>Sciascio</surname></persName>
							<email>eugenio.disciascio@poliba.it</email>
							<affiliation key="aff1">
								<orgName type="institution">Politecnico di Bari</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Empowering shilling attacks with Katz and Exclusivity-based relatedness</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">A569AF655EFC401E91785855DBE6210C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Shilling Attacks</term>
					<term>Collaborative Filtering</term>
					<term>Knowledge Graphs</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Several domains have widely benefited from the adoption of Knowledge graphs (𝒦𝒢𝑠). For recommender systems (RSs), the adoption of 𝒦𝒢𝑠 has resulted in accurate, personalized recommendations of items/products according to users' preferences. Among different recommendation techniques, collaborative filtering (CF) is one the most promising approaches to build RSs. Their success is due to the effective exploitation of similarities/correlations encoded in user interaction patterns. Nonetheless, their strength is also their weakness. A malicious agent can add fake user profiles into the platform, altering the genuine similarity values and the corresponding recommendation lists. While the research community has extensively studied 𝒦𝒢𝑠 to solve various recommendation problems, including the empowerment of semantic-aware shilling attacks, limited attention has been paid on exploiting 𝒦𝒢𝑠 relatedness measures, i.e., Katz and Exclusivity-based, computed considering 1-hop of graph exploration. We performed an extensive experimental evaluation with four state-of-the-art recommendation systems and two well-known recommendation datasets to investigate the effectiveness of introducing relatedness information on semantic-aware shilling attacks. Since the semantics of relations has a crucial role in 𝒦𝒢𝑠, we have also analyzed the impact of relations' semantics by grouping them in various classes. Experimental results indicate the benefit of embracing 𝒦𝒢𝑠 in favor of the attackers' capability in attacking recommendation systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The advent of Knowledge Graphs (𝒦𝒢𝑠) has changed the way structured information is stored. It has become much more than that developed to make the Semantic Web a concrete idea. The core idea of building a semantic network in which information is represented as directed labeled graphs (RDF graphs) is disarmingly simple. Nevertheless, thanks to the possibilities it paves, it has been welcomed with several promises and expectancies. Complete interoperability, the ability to link knowledge across domains, and the possibility to exploit Logical inference and proofs are just a few of them. In numerous domains, the exploitation of the 𝒦𝒢 information has become the norm. Thanks to the appearance of wide-ranging Linked Datasets like DBpedia and Wikidata, we have witnessed the flourishing of novel techniques in several research fields, like Machine Learning, Information Retrieval, and Recommender Systems. To date, Recommender Systems (RSs) are considered the focal solution to assist users' decision-making process. Since the volume of the available products on the Web overwhelms the users, RSs support and ease the decision process. Among them, collaborative filtering (CF) recommendation techniques have shown very high performance in real-world applications (e.g., Amazon <ref type="bibr" target="#b0">[1]</ref>). Their rationale is to analyze products experienced by similar users to produce tailored recommendations. Algorithmically speaking, they take advantage of user-user and item-item similarities. Regrettably, malicious users may want to jeopardize the operation of the recommendation platform. For example, they might be a rival company or agents who want to increase (or decrease) the visibility of a particular product. Whatever they are motivated by, the problem is that these similarities are vulnerable to the insertion of fake profiles. This kind of attack is called the shilling attack <ref type="bibr" target="#b1">[2]</ref>, which aims to push or nuke the probabilities to recommend an item. The malicious agent (or adversary) can rely on an extensive list of techniques to conduct the attack. Researchers and companies have classified them into two broad categories <ref type="bibr" target="#b2">[3]</ref>: low-knowledge and informed attack strategies. In the former attacks, the adversary has poor system-specific knowledge <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. In the latter, the attacker has an accurate knowledge of the recommendation model and the data distribution <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b5">6]</ref>.</p><p>Interestingly, despite the astonishing spread of 𝒦𝒢𝑠, little attention has been paid to knowledge-aware strategies to mine RS's security. Since 𝒦𝒢𝑠 provide comprehensive information on numerous knowledge domains, a malicious agent can decide to attack RSs making use of the items' semantic descriptions. One work exploiting publicly available information obtained from 𝒦𝒢 to generate more influential fake profiles to threaten CF models' performance is named semantics-aware shilling attack SAShA <ref type="bibr" target="#b6">[7]</ref>. This work extended state-of-the-art shilling attack approaches such as Random, BandWagon, and Average profiting from publicly available semantic information without supposing any additional knowledge about the system. While the previous study modified these attacks considering the cosine vector similarity between the semantic description of items, in this work, we identify that SAShA only considers the cosine similarity across the semantic details, which is not particularly suited to bring out semantic relatedness.</p><p>In this work, we have overcome this limitation by going beyond the cosine similarity by considering Katz centrality and Exclusivity-based relatedness. Finally, to provide a more fine-grained analysis, we have grouped the semantic relations into three classes: ontological, categorical, and factual relations.</p><p>In detail, this study extends the state-of-the-art approach for the integration of semantics in the shilling attacks <ref type="bibr" target="#b6">[7]</ref> in numerous directions:</p><p>1. two novel graph topological and semantic approaches to build the set of items from which the adversary can craft the fake profiles; We have conducted extensive experiments to evaluate the impact of proposed attacks against the recommendation models. To this end, we have exploited two real-world recommender system datasets (LibraryThing and Yahoo!Movies). Experimental results sharply indicate that 𝒦𝒢 information is a valuable source of knowledge that improves attacks' effectiveness. Moreover, adopting semantic relatedness measures can unleash the full potential of the semantics-aware attacks.</p><p>The remainder of the paper proceeds as follows. In Section 2, we provide an overview of the state-of-the-art recommendation models and shilling attacks. Section 3 describes the proposed extensions to the SAShA by introducing the semantic relatedness measures, and formalizes the semantic attack strategies. Section 4 focuses on the experimental validation of the proposed attack scenarios. We also provide an in-depth discussion of the experimental results analyzing the several dimensions of the study. Finally, in Section 6, we draw some conclusions and introduce the open challenges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Recommender Systems</head><p>A recommendation problem can be stated as finding a utility function to automatically predict how much users will like unknown items.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1 (Recommendation Problem).</head><p>Let 𝒰 and ℐ denote a set of users and items in a system, respectively. Each user 𝑢 ∈ 𝒰 is related to ℐ + 𝑢 , the set of items she has consumed, or her user profile. Given a utility function 𝑔 : 𝒰 × ℐ → R a Recommendation Problem is defined as</p><formula xml:id="formula_0">∀𝑢 ∈ 𝒰, 𝑖 ′ 𝑢 = argmax 𝑖∈ℐ 𝑔(𝑢, 𝑖)</formula><p>where 𝑖 ′ 𝑢 denotes an item not consumed by the user 𝑢 before. We assume that the preference of user 𝑢 ∈ 𝒰 on item 𝑖 ∈ ℐ is encoded with a continuous-valued preference score 𝑟 𝑢𝑖 ∈ ℛ, where ℛ represent the set of (𝑢, 𝑖) pairs for which 𝑟 𝑢𝑖 is known.</p><p>The major class of recommendation models includes content-based filtering (CBF), collaborative filtering (CF), and hybrid <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. CBF models build a profile of user interests based on the content features of the items preferred by that user (liked or consumed), characterizing the nature of her interests. CF models compute recommendations based on similarities in preference patterns of like-minded users. They can be classified according to neighborhood-based and model-based. Neighborhood-based models compute recommendations exclusively based on correlations in interactions across users (user-based CF <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref>) or items (item-based CF <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b10">11]</ref>), while model-based approaches learn a model that can be queried in the production phase to generate recommendations for a given user profile, e.g., MF <ref type="bibr" target="#b12">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Knowledge-aware RSs</head><p>RSs exploit various side information such as metadata (e.g., tags, reviews) <ref type="bibr" target="#b13">[14]</ref>, social connections <ref type="bibr" target="#b14">[15]</ref>, image and audio signal features <ref type="bibr" target="#b15">[16]</ref>, and users-items contextual data <ref type="bibr" target="#b16">[17]</ref> to build more in-domain <ref type="bibr" target="#b17">[18]</ref> (i.e., domain-dependent), cross-domain <ref type="bibr" target="#b18">[19]</ref>, or context-aware <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref> recommendation models. Among the diverse information sources, Knowledge Graphs (𝒦𝒢𝑠) are one of the most relevant. A 𝒦𝒢 is a heterogeneous network that encodes multiple relationships, edges, nodes, and links items at high-level relationships, making them a strong item representation technique. Thanks to the heterogeneous domains that 𝒦𝒢𝑠 cover, the design of knowledge-based recommendation systems has arisen as a specific research field of its own in the community of RSs, usually referred to by Knowledge-aware Recommender Systems (KaRS <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>). Knowledge-aware Recommender Systems have been particularly impactful for several research domains: 𝑚𝑎𝑡ℎ𝑐𝑎𝑙𝐾𝐺/graph-embeddings <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b29">30]</ref>, hybrid collaborative/content-based recommendation <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b30">31]</ref>, knowledge-completion, link-prediction, knowledge-discovery <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33,</ref><ref type="bibr" target="#b33">34,</ref><ref type="bibr" target="#b29">30,</ref><ref type="bibr" target="#b34">35,</ref><ref type="bibr" target="#b35">36,</ref><ref type="bibr" target="#b36">37,</ref><ref type="bibr" target="#b37">38]</ref>, knowledge-transfer, cross-domain recommendation <ref type="bibr" target="#b38">[39,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b40">40]</ref>, interpretable/explainable-recommendation <ref type="bibr" target="#b41">[41,</ref><ref type="bibr" target="#b42">42,</ref><ref type="bibr" target="#b43">43,</ref><ref type="bibr" target="#b44">44,</ref><ref type="bibr" target="#b30">31]</ref>, graph-based recommendation <ref type="bibr" target="#b45">[45,</ref><ref type="bibr" target="#b46">46,</ref><ref type="bibr" target="#b47">47,</ref><ref type="bibr" target="#b48">48,</ref><ref type="bibr" target="#b49">49,</ref><ref type="bibr" target="#b50">50]</ref>, content-based recommendation <ref type="bibr" target="#b51">[51,</ref><ref type="bibr" target="#b52">52]</ref>.</p><p>All the former advances have been shown to enhance the recommendation quality or the overall user experience. Although the algorithms differ on many levels, we can still classify recommendation techniques into two broad approaches: Path-based methods <ref type="bibr" target="#b45">[45,</ref><ref type="bibr" target="#b46">46,</ref><ref type="bibr" target="#b47">47,</ref><ref type="bibr" target="#b50">50,</ref><ref type="bibr" target="#b53">53,</ref><ref type="bibr" target="#b54">54]</ref>, which employ paths and meta-paths to estimate the user-item similarities or the nearest items; and KG embedding-based techniques <ref type="bibr" target="#b45">[45,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b30">31,</ref><ref type="bibr" target="#b55">55,</ref><ref type="bibr" target="#b20">21,</ref><ref type="bibr" target="#b56">56]</ref>, which leverage 𝒦𝒢 embeddings (usually obtained through matrix factorization or neural network encoding) for items' representation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Security of RSs</head><p>Malicious users, the adversaries, can meticulously craft fake profiles to poison the data and alter the recommendation behavior toward malicious goals <ref type="bibr" target="#b57">[57,</ref><ref type="bibr" target="#b58">58,</ref><ref type="bibr" target="#b59">59</ref>]. An adversary may execute a shilling attack (injection of malicious profiles) to achieve a whole different set of objectives. To name a few, she may want to demote competitor products <ref type="bibr" target="#b3">[4]</ref>, misuse the underlying recommendation system <ref type="bibr" target="#b1">[2]</ref>, or increase the recommendability of specific products <ref type="bibr" target="#b60">[60,</ref><ref type="bibr" target="#b61">61]</ref>.</p><p>The research works on shilling attacks explored two main research perspectives: proposing and investigating attack strategies with their effects on the recommendation performance <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b62">62,</ref><ref type="bibr" target="#b63">63,</ref><ref type="bibr" target="#b64">64]</ref> and exploring defensive mechanisms <ref type="bibr" target="#b59">[59,</ref><ref type="bibr" target="#b65">65,</ref><ref type="bibr" target="#b66">66,</ref><ref type="bibr" target="#b67">67,</ref><ref type="bibr" target="#b68">68,</ref><ref type="bibr" target="#b69">69]</ref>.</p><p>A typical characteristic of the first line of research on shilling attacks is that the adversary's knowledge is related only to the recommender system's user-item interaction matrix. Furthermore, Anelli et al. <ref type="bibr" target="#b6">[7]</ref> demonstrate that publicly available 𝒦𝒢 improves adversary's efficacy, also in the case of low-informed attacks (e.g., Random). In this work, we extend the SAShA framework to verify the possible improvement of the adversary's efficacy when processing the 𝒦𝒢 information with semantic similarity measures.</p><p>Note that this work focuses on shilling attacks, that are hand-engineered strategies to study recommender systems' security. This research line is different from machine-learned data poisoning attack <ref type="bibr" target="#b70">[70,</ref><ref type="bibr" target="#b71">71,</ref><ref type="bibr" target="#b72">72,</ref><ref type="bibr" target="#b73">73,</ref><ref type="bibr" target="#b74">74]</ref> and adversarial machine-learned attacks <ref type="bibr" target="#b75">[75,</ref><ref type="bibr" target="#b76">76,</ref><ref type="bibr" target="#b61">61,</ref><ref type="bibr" target="#b77">77,</ref><ref type="bibr" target="#b78">78,</ref><ref type="bibr" target="#b79">79]</ref> where adversaries adopt optimization techniques to create perturbations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method</head><p>This section introduces the reader to the notations and formalisms that may help understand the design of shilling attacks against targeted items integrating information obtained from a knowledge graph (𝒦𝒢).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Knowledge Graph Content Extraction</head><p>A knowledge graph is a structured repository of knowledge, designed in the form of a graph, that encodes various kinds of information:</p><p>• Factual. General statements as Rika Dialina was born in Crete or Heraklion is the capital of Crete that describe an entity by using a controlled vocabulary of predicates that connect the entity to other entities (or literal values).</p><p>• Categorical. These statements connect the entity to a particular category (i.e., the categories associated with a Wikipedia page). Often, categories are in turn organized as a hierarchy.</p><p>• Ontological. These are formal statements that describe the entity's nature and its ontological membership to a specific class. Classes are often organized in a hierarchical structure. In contrast to categories, sub-classes and super-classes are connected through IS-A relations.</p><p>In a knowledge graph, we can express statements through triplets 𝜎 𝜌 − → 𝜔, with a subject (𝜎), a predicate (or relation) (𝜌), and an object (𝜔). There are several ways to transform the knowledge coming from a knowledge graph into a feature. We have chosen to represent each distinct path as an explicit feature <ref type="bibr" target="#b30">[31]</ref>.</p><p>Given a set of items 𝐼 = {ℐ 1 , ℐ 2 , . . . , ℐ 𝑁 } in a collection and the corresponding triples ⟨𝑖, 𝜌, 𝜔⟩ in a knowledge graph, the set of 1-hop features is defined as 1-𝐻𝑂𝑃 -𝐹 = {⟨𝜌, 𝜔⟩ | ⟨𝑖, 𝜌, 𝜔⟩ ∈ 𝒦𝒢 with 𝑖 ∈ 𝐼}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Entity Similarity/Relatedness in KGs</head><p>The keystone of the Knowledge Graph representation is the semantics enclosed in the resource description and the predicates that connect the different resources. Nevertheless, if the metric to compute similarities between the resources is not carefully chosen, this piece of information is lost irretrievably. Motivated by this awareness, we decided to consider a broad spectrum of diverse similarity/relatedness metrics in addition to the cosine vector similarity <ref type="bibr" target="#b80">[80]</ref> (used in 𝑆𝐴𝑆𝐻𝐴 <ref type="bibr" target="#b6">[7]</ref>: Katz centrality <ref type="bibr" target="#b81">[81]</ref> and Exclusivity-based semantic relatedness <ref type="bibr" target="#b82">[82]</ref>. In general, the three metrics cover different aspects of the similarity between the resource a signal of the overlap of the descriptions and a semantics-aware signal that highlights the specificity of the relations between the resources. Cosine Vector Similarity is a well-known similarity that is very popular in recommendation systems. The idea is to measure how similar the two different representations are. Suppose a numerical vector can represent the resource description, with the number of the predicate-object chains observed in the 𝒦𝒢 being the vector's cardinality. Mathematically, it measures the cosine of the angle between two vectors that represent two different resources. The smaller the angle, the higher the cosine similarity is, and thus the similarity. Suppose 𝑖 and 𝑗 are two items in the 𝒦𝒢, and 𝐹 (•) is a function that returns the features associated with an entity in the 𝒦𝒢. Hence 𝑖𝑛(𝑖, 𝑓 ) is a function that returns 1 if entity 𝑖 is associated with feature 𝑓 , else 0. The Cosine Vector Similarity has been already formulated for 𝒦𝒢 as follows <ref type="bibr" target="#b80">[80]</ref>:</p><formula xml:id="formula_1">𝑠𝑖𝑚(𝑖, 𝑗) = ∑︀ 𝑓 ∈𝐹 (𝑖)∪𝐹 (𝑗) 𝑖𝑛(𝑖,𝑓 )•𝑖𝑛(𝑗,𝑓 ) √︁ ∑︀ 𝑓 ∈𝐹 (𝑖) 𝑖𝑛(𝑖,𝑓 ) 2 • √︁ ∑︀ 𝑓 ∈𝐹 (𝑗) 𝑖𝑛(𝑗,𝑓 ) 2<label>(1)</label></formula><p>This is the baseline method used in 𝑆𝐴𝑆ℎ𝐴 [7]/ Katz centrality <ref type="bibr" target="#b81">[81]</ref> is a famous graph-centrality measure that inspired several semanticsaware metrics <ref type="bibr" target="#b83">[83,</ref><ref type="bibr" target="#b82">82]</ref>. Katz suggests that the probability of the path between two nodes can indicate the effectiveness of the link. Given a constant probability for a single-hop path, called 𝛼, the whole path's overall probability is 𝛼 𝑦 , where 𝑦 is the number of the nodes involved.</p><p>Hulpus <ref type="bibr" target="#b82">[82]</ref> exploits the rationale to build a relatedness measure. Therefore, he defined the Katz relatedness between two items 𝑖 and 𝑗 as the accumulated score over the top-𝑡 shortest paths between them.</p><formula xml:id="formula_2">𝑟𝑒𝑙 (𝑡) 𝐾𝑎𝑡𝑧 (𝑖, 𝑗) = ∑︀ 𝑝∈𝑆𝑃 (𝑡) 𝑖𝑗 𝛼 𝑙𝑒𝑛𝑔𝑡ℎ(𝑝) 𝑡<label>(2)</label></formula><p>where 𝑆𝑃</p><formula xml:id="formula_3">(𝑡)</formula><p>𝑖𝑗 is the set of the top-𝑡 shortest paths between items 𝑖 and 𝑗. This is the first novel similarity metric tested in this work. Note that the shortest path has a larger implication in multi-hops experiments; results on these have been reported in . Exclusivity-based semantic relatedness <ref type="bibr" target="#b82">[82]</ref> is a semantic relatedness measure that takes into account the type of relations that connect two nodes. The idea is that two concepts are strongly connected if the type of relations between them is different from the type of relations they have with other concepts. This property of relations, named exclusivity, is defined as follows.</p><p>Suppose a predicate 𝜌 of type 𝜏 between two items 𝑖 and 𝑗, directed from 𝑖 to 𝑗. The exclusivity of predicate 𝜌 is the probability of selecting, with a uniform random distribution, a predicate 𝜌 ′ of type 𝜏 among the predicates of type 𝜏 that exit resource 𝑖 and enter node 𝑗, such that predicate 𝜌 ′ is exactly the predicate 𝜌: − →, . . . , 𝑛 𝑘 with 𝜏 𝑖 ∈ 𝒯 ∓ , the weight of the path is defined as:</p><formula xml:id="formula_4">𝑒𝑥𝑐𝑙𝑢𝑠𝑖𝑣𝑖𝑡𝑦(𝑖 𝜏 − → 𝑗) = 1 |𝑖 𝜏 − → *| + |* 𝜏 − → 𝑗| − 1<label>(3)</label></formula><formula xml:id="formula_5">𝑤𝑒𝑖𝑔ℎ𝑡(𝒫) = 1 ∑︀ 𝑖 1 𝑒𝑥𝑐𝑙𝑢𝑠𝑖𝑣𝑖𝑡𝑦(𝑛 𝑖 𝜏 𝑖 − →𝑛 𝑖+1 ) (4)</formula><p>Finally, the relatedness between two resources can be computed as the sum of the path weights of the top-𝑡 paths between the resources with the highest weights. To penalize longer paths, a constant length decay factor, 𝛼 ∈ (0, 1], can be introduced. The overall exclusivity-based relatedness measure is therefore defined as follows:</p><formula xml:id="formula_6">𝑟𝑒𝑙 (𝑡) 𝐸𝑥𝑐𝑙 (𝑖, 𝑗) = ∑︁ 𝒫𝑛∈𝑃 𝑡 𝑖𝑗 𝛼 𝑙𝑒𝑛𝑔ℎ𝑡(𝒫𝑛) 𝑤𝑒𝑖𝑔ℎ𝑡(𝒫 𝑛 )<label>(5)</label></formula><p>This is the second novel similarity metric tested in this work.  where (𝜇, 𝜎) are the dataset average rating and rating variance, (𝜇𝑓 , 𝜎𝑓 ) are the filler item ℐ𝐹 rating average and variance, and 𝑚𝑖𝑛 and 𝑚𝑎𝑥 are the minimum and maximum rating value. 𝑟𝑛𝑑 function generates one integer (i.e., rating) from a discrete uniform distribution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Attacks</head><formula xml:id="formula_7">[4] ∅ Random ∑︀ 𝑢∈𝒰 |ℐ𝑢| |𝒰 | − 1 𝑟𝑛𝑑(𝑁 (𝜇, 𝜎 2 )) ℐ − ℐ𝐹 𝑚𝑎𝑥 Love-Hate [84] ∅ Random ∑︀ 𝑢∈𝒰 |ℐ𝑢| |𝒰 | − 1 𝑚𝑖𝑛 ℐ − ℐ𝐹 𝑚𝑎𝑥 Popular [85] ∑︀ 𝑢∈𝒰 |ℐ𝑢| |𝒰 | − 1 𝑚𝑖𝑛 if 𝜇𝑓 &lt; 𝜇 else 𝑚𝑖𝑛 + 1 ∅ ℐ − ℐ𝑆 𝑚𝑎𝑥 Average [4] ∅ Random ∑︀ 𝑢∈𝒰 |ℐ𝑢| |𝒰 | − 1 𝑟𝑛𝑑(𝑁 (𝜇𝑓 , 𝜎</formula><p>Given a Recommendation Problem, a Shilling Profile (𝒮𝒫) is a rating profile partitioned into four sets:</p><formula xml:id="formula_8">𝒮𝒫 = ℐ 𝑆 + ℐ 𝐹 + ℐ 𝜑 + ℐ 𝑇<label>(6)</label></formula><p>where ℐ 𝑆 denotes the selected item set containing items identified by the attacker to maximize the effectiveness of the attack, ℐ 𝐹 is the filler item set, containing a set of randomly selected items to which rating scores are assigned to make them imperceptible. ℐ 𝑇 is the target item, for which the recommendation model will make a prediction, aimed to be maximal (for push attack) or minimum (for nuke attack). Finally, ℐ 𝜑 is the unrated item set, holding a number of items without any ratings. Note that ℐ 𝑆 and ℐ 𝐹 are chosen depending on the attack strategy, and the attack size is the number of injected fake user profiles. Throughout this paper, we use 𝜑 = |ℐ 𝐹 | to represent the filler size, 𝛼 = |ℐ 𝑆 | the selected item set size and 𝜒 = |ℐ ∅ | to show the size of unrated items. Table <ref type="table" target="#tab_0">1</ref> summarizes the main parameters involved in the implementation of most prominent shilling attacks against rating-based CF models. For instance, it can be seen that 𝑆𝐴𝑆ℎ𝐴 attacks are the extension of state-of-the-art shilling attacks, with the difference that selection of the filler item set (ℐ 𝐹 ) is chosen semantically, not randomly.</p><p>Semantics-aware Random Attack is an extension of the baseline Random Attack <ref type="bibr" target="#b3">[4]</ref>. The baseline version is a naive attack, which uses randomly chosen items (𝛼 = 0, 𝜑 = profile-size) to create a fake user profile. The ratings attributed to ℐ 𝜑 are sampled from a uniform distribution (see Table <ref type="table" target="#tab_0">1</ref>). 𝑆𝐴𝑆ℎ𝐴 modify this attack by selecting the items to complete ℐ 𝐹 with the cosinesimilarity. In this work, we exploit semantic similarities/relatedness between the items in the catalog e the target item using 𝒦𝒢-based features (cf. Section 3.1). Afterward, we identify the most similar items (ℐ 𝑇 ) by considering the first quartile of most similar items, and we extract 𝜑 items from this set by adopting a uniform distribution.</p><p>Semantics-aware Average Attack is an informed attack strategy that extends the Aver-ageBots attack <ref type="bibr" target="#b4">[5]</ref>. The baseline attack leverages the mean and variance of the ratings, which is then used to sample each filer item's rating from a normal distribution built using these values. Similar to the previous semantics-aware attack extension, we extract the filler items by exploiting semantic similarities derived from a 𝒦𝒢. Finally, as before, we consider the items in the first quartile of the most semantically similar/related to ℐ 𝑇 as the candidate filler items (ℐ 𝐹 ).</p><p>Semantics-aware BandWagon Attack is a low-knowledge attack that extends the standard BandWagon attack <ref type="bibr" target="#b62">[62]</ref>. We leave unchanged the injection of the selected items (ℐ 𝑆 ), which are the most popular ones and on which we associate the maximum possible rating (see Table <ref type="table" target="#tab_0">1</ref>). However, similarly to the previous two semantic attack extensions, we complete ℐ 𝐹 by taking into account the semantic similarity/relatedness between the target item ℐ 𝑇 and the rest of the catalog.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experimental Setting</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Dataset</head><p>We tested the proposed approaches on two datasets. The first is LibraryThing <ref type="bibr" target="#b50">[50]</ref> and it is a popular dataset whose interactions originate from librarything.com, a social cataloging web application. The dataset contains user-item rating scores ranging from a minimum of 1 to a maximum of 10. As presented in <ref type="bibr" target="#b6">[7]</ref>, we use a reduced version by randomly extracting the 25% of products in the catalog. Furthermore, we apply a 5-core filtering by removing all the users with less than five interactions to focus the study on active users. These users are of adversaries' interest since they could more likely buy the pushed products.</p><p>The second is Yahoo!Movies which is a recommendation dataset released by research.yahoo.com with ratings collected up to November 2003. The dataset also provides mappings to the MovieLens and EachMovie catalogs. The recorded interactions consist of ratings ranging from 1 to 5.</p><p>Both datasets have a mapping between the items in the catalogs and DBpedia knowledge-base entities. In particular, we use the mappings publicly available at https://github.com/sisinflab/ LinkedDatasets. Table <ref type="table" target="#tab_2">2</ref> reports the statistics of both datasets.  Once the items are semantically reconciled with DBpedia entities, we remove the noisy features whose triples contain one of the following predicates: owl:sameAs, dbo:thumbnail, foaf:depiction, prov:wasDerivedFrom, foaf:isPrimaryTopicOf. The feature denoising procedure follows the methodology proposed in <ref type="bibr" target="#b42">[42,</ref><ref type="bibr" target="#b30">31]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.2.">Feature Selection</head><p>To perform the analysis of the groups (or types) of semantic features, we implement our proposed semantics-aware attacks by considering three different types of features, i.e., categorical (CS), ontological (OS), and factual (FS), a feature taxonomy commonly adopted in the Semantic Web community <ref type="bibr" target="#b30">[31]</ref>. We apply the following policies Categorical-1H, we use the features with the property dcterms:subject, Ontological-1H, we select the features containing the property rdf:type, and Factual-1H, we consider all the features except ontological and categorical features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.3.">Feature Filtering</head><p>This work aims to study the attack performance differences up to the first hop. Addressing this aim, we obtain thousands of features for both LibraryThing and Yahoo!Movies as reported in the last two columns of Table <ref type="table" target="#tab_2">2</ref>. Measuring semantic similarities across the item catalog would quickly become unfeasible. However, some features only occur once and provide no useful informative or collaborative information. Therefore, we decided to drop off irrelevant features following the filtering technique proposed by Di Noia et al. <ref type="bibr" target="#b50">[50]</ref>, Paulheim and Fürnkranz <ref type="bibr" target="#b86">[86]</ref>. In detail, we removed all the features with more than 99.74% of missing values and distinct values. Table <ref type="table" target="#tab_3">3</ref> shows the remaining features' statistics after applying the extraction, selection, and filtering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Recommender Models</head><p>In this work, we test our attack proposal (see Section 3.3) against four baseline collaborative RSs. Two neighborhood-based: User-kNN, on which we <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11]</ref> set the size of the neighborhood 𝑘 to 40, and Item-kNN <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b10">11]</ref>, where 𝑘 = 40 too. Two model-based: Matrix Factorization (MF) <ref type="bibr" target="#b12">[13]</ref>, where we set the size of latent vectors to 100, and Neural Matrix Factorization (NeuMF) <ref type="bibr" target="#b87">[87]</ref>, on which we used a deep neural network composed by 4 fully connected dense layers with {64, 32, 16, 8} hidden units.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Evaluation Metrics</head><p>We evaluate the attack performance using 𝐻𝑅@𝑁 . The metric describes the average presence of target items in the top-𝑁 recommendation lists generated for all the users after the attack. Since we will experiment with the case of push attacks, it follows that the adversary's goal is to increase/maximize the HR of the attacked/targeted items.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Evaluation Protocol</head><p>We perform 180 experiments for each dataset, totaling 720 experiments. Following the evaluation procedure used in <ref type="bibr" target="#b60">[60,</ref><ref type="bibr" target="#b3">4]</ref>, we generate the list of recommendations for each recommendation model before executing the attack. After having measured the position and predicted score for each target item-user pair, we simulated the attack. Each attack is performed against 50 randomly selected items in each dataset. Furthermore, we perform each attack using three different amounts of injected shilling profiles: 1%, 2.5%, and 5% of the total number of users, as adopted in <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b63">63,</ref><ref type="bibr" target="#b4">5]</ref>. Regarding the relatedness measures, we set the 𝛼 = 0.25 and the 𝑡-path length to 10 for both metrics. Datasets and code will be made publicly available.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experimental Results</head><p>Table <ref type="table">4</ref> and Table <ref type="table" target="#tab_5">5</ref> report the results. Across the next sections, we identify an attack combination using the format &lt;dataset, recommender, attack strategy, feature type, similarity measures, granularity&gt;, e.g., &lt;Yahoo!Movies, User-𝑘NN, Average, Categorical, Katz, 1%&gt;.</p><p>First, we observe that the results obtained on the Yahoo!Movies dataset (Table <ref type="table" target="#tab_5">5</ref>) are more indicative of attacks' effectiveness independently of the attack dimensions, confirming the findings in the previous work by Anelli et al. <ref type="bibr" target="#b6">[7]</ref>. Furthermore, Table <ref type="table">4</ref> confirms the semanticsaware strategy's efficacy over the baseline, either for the average or random attacks. For instance, the semantic strategies outperformed all the &lt;LibraryThing, Random&gt; and &lt;LibraryThing, Average&gt; baseline attacks independently of the recommender model and the size of attacks. However, differently from the results on Yahoo!Movies, on &lt;LibraryThing, BandWagon&gt;, the baseline attack's effectiveness did not improve. This behavior might be justified by the fact that a bandwagon attack builds profiles by filling the 50% of the profile with the most popular items, it might make the semantic strategy that identifies the informative filler items ineffective.</p><p>In addition to the general results, we provide a more in-depth discussion answering three research questions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 4</head><p>Hit Ratio (𝐻𝑅) result values evaluated on top-10 recommendation lists for the LibraryThing dataset. We report in bold the highest value of each column given an adversary budget and knowledge. The usage of Cosine similarity is the baseline approach proposed in SAShA. We can observe that the adoption of graph-based relatedness generally leads to an attack efficacy improvement over the baseline, which adopts the cosine similarity metric. For instance, the random attack largely benefits from the topological information. The same happens for Yahoo!Movies too in Table <ref type="table" target="#tab_5">5</ref>. Indeed, HR for &lt; User-𝑘NN, Random, Categorical, Katz&gt; is 10% better than the baseline, i.e., 0.3725 vs. 0.3512. Beyond random attacks, we can observe some general trends also for informed attacks. In detail, Table <ref type="table">4</ref> (LibraryThing), we note that categorical information improves both User-𝑘NN and Item-𝑘NN. It is worth noticing that the same consideration does not hold for latent factor-based models. MF and NeuMF suit better cosine vector similarity. This phenomenon is probably due to the significant difference in how the two recommendation families exploit the additional information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>User</head><p>Finally, we can focus on the BandWagon attack. In that case, the attack already exploits the most influential knowledge source for collaborative filtering algorithms: popularity. It follows that the integration with other knowledge sources, e.g., 𝒦𝒢𝑠, does not provide any significant improvement. However, the influence of popularity is so high in this attack that the final recommendation lists are subject to a strong popularity bias <ref type="bibr" target="#b88">[88]</ref>. Indeed, adding fake profiles with the maximum ratings, e.g., 5 in Yahoo!Movies and 10 in LibraryThing, placed on the most popular/rated items that will form the ℐ 𝑆 (see Table <ref type="table" target="#tab_0">1</ref>) will amplify, even more, the probability that these items will be recommended in the highest positions of top-𝑁 recommendation lists making ineffective the adversaries' pushing goal toward the target items. As a consequence, it even prevents the attacked recommendation system from suggesting the target item. All the experimental datasets and all the recommendation models clearly show this effect.</p><p>Another aspect that we want to underline is that increasing the number of fake profiles injected into the systems unleashes the potential of different semantic knowledge types. Let us take as an example the &lt;LibraryThing, Average, MF&gt;. With 1% injected fake profiles, we observe the best results with Factual knowledge and Katz centrality. With 2%, the best results are with Factual knowledge and cosine similarity. Finally, with 5%, the best results come with Ontological knowledge and cosine similarity. This behavior suggests that the graph-based similarities have a big impact even in a very sparse scenario. In contrast, with the increase of fake profiles, the cosine similarity starts leveraging interesting correlations. On the other dimension, the factual information is massive by nature, and it is crucial in sparse scenarios. However, when the number of fake profiles increases, the knowledge at a higher level of abstraction (Categorical and Ontological) finds its way to improve the attack efficacy further.</p><p>RQ2: What is the most impactful type of semantic information? We start focusing on Categorical knowledge. The experiments on LibraryThing show that Exclusivity is probably the relatedness that best suits this information type. However, the results are not that clear for the Yahoo!Movies dataset. This behavior suggests that semantic information type and relatedness are not the only members of the equation. Indeed, the extension and the quality of the item descriptions seem to have a role. Afterward, we focus on Ontological information. Here, we can draw a general consideration since, for both datasets, it is the cosine similarity metric that leads to the best results. Lastly, Factual information respects all the general remarks we have drawn before showing that relatedness is a better source of adversaries' knowledge to perform more effective attacks.</p><p>In detail, we found that with low-knowledge attacks, the best relatedness is Exclusivity for LibraryThing and Katz for Yahoo!Movies. With informed attacks, the best relatedness metric is the cosine similarity. However, for the sake of electing a similarity that better suits Factual information, we can note that Exclusivity generally leads to better results with LibraryThing.</p><p>RQ3: What are the most vulnerable recommendation models&gt; Since the neighborhood-based models directly exploit a similarity to compute the recommendation lists, they are the privileged victim models to effectively alter the recommendation performance. Slightly more robust are latent factor models on which the new semantic attacks will still produce an improvement in the attacker's performance. Finally, the most robust model is NeuMF. This result is probably due to the nonlinearity of NeuMF that helps the model avoid learning from the pretended profiles. In detail, the neural network may learn more sophisticated correlations that the other models do not capture. We believe that this ability deserves specific further investigation since it may lead to developing a new line of research on Deep Learning-based semantics-aware attacks that might exploit non-linear item-item similarities to build more impactful attack methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>In this work, we verified how the adoption of stronger semantic similarity measures of structured and freely accessible knowledge can further improve malicious agents' ability to attack a recommendation platform. Starting from the state-of-the-art semantics-aware shilling attacks (SAShA), this work investigated the impact of graph-based metrics (Katz centrality and Exclusivity-based relatedness) and semantic information type. As a result, we verified that: (1) the adoption of structured knowledge generally improves by a large margin the attacker's performance, (2) the graph-based metrics can efficiently deal with very sparse scenarios capturing similarities that are otherwise imperceptible, (3) the type of semantic information to feed the attacking system with has a significant function in enhancing the adversaries' effectiveness, (4) neural models are the sole recommendation techniques to be more robust to semantic attacks. The latter finding suggests that there is still room for improvements in the semantics-aware attacks investigating Deep Learning-based semantic attacks.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>2 .</head><label>2</label><figDesc>a novel semantic shilling attack strategy based on BandWagon strategy; 3. a deeper discussion of the experimental results involving several dimensions: type of considered relation, recommendation model, amount of injected fake profiles, and dataset.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>1 𝜏− → 𝑛 2 𝜏 2</head><label>122</label><figDesc>| denotes the cardinality of relations of type 𝜏 ∈ 𝒯 that exit resource 𝑖, and |* 𝜏 − → 𝑗| denotes the number of relations of type 𝜏 ∈ 𝒯 that enter resource 𝑗. Since the relation 𝑖 𝜏 − → 𝑗 is in |𝑖 𝜏 − → *| and in |* 𝜏 − → 𝑗|, 1 is subtracted from the denominator. The exclusivity scorefor a predicate falls inside the (0, 1] interval. The value 1 denotes the extreme case in which the predicate is the only relation of its type for both 𝑖 and 𝑗.Given a path through 𝒦𝒢, 𝒫 = 𝑛</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Overview of shilling attack strategies and their profile composition for adversaries' goal of pushing a target item (ℐ 𝑇 ).</figDesc><table><row><cell>Attack Type</cell><cell>Selected Items (ℐ𝑆) Number Items Rating</cell><cell>Selection</cell><cell>Filler Items (ℐ𝐹 ) Number Items Rating</cell><cell>ℐ𝜑</cell><cell>ℐ𝑇</cell></row><row><cell>Random</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Datasets statistics.</figDesc><table><row><cell>Dataset</cell><cell cols="5">#Users #Items #Ratings Sparsity #F-1Hop</cell></row><row><cell>LibraryThing</cell><cell>4,816</cell><cell>2,256</cell><cell>76,421</cell><cell>99.30%</cell><cell>56,019</cell></row><row><cell>Yahoo!Movies</cell><cell>4,000</cell><cell>2,526</cell><cell>64,079</cell><cell>99.37%</cell><cell>105,733</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3</head><label>3</label><figDesc>Selected features.</figDesc><table><row><cell></cell><cell cols="2">Categorical</cell><cell cols="2">Ontological</cell><cell>Factual</cell></row><row><cell>Dataset</cell><cell cols="4">Total Selected Total Selected</cell><cell>Total Selected</cell></row><row><cell cols="2">LibraryThing 3,890</cell><cell cols="2">373 2,090</cell><cell>311 50,039</cell><cell>1,972</cell></row><row><cell cols="2">Yahoo!Movies 5,555</cell><cell cols="2">1,192 3,036</cell><cell>722 97,142</cell><cell>7,690</cell></row></table><note>4.1.1. Feature Extraction</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head></head><label></label><figDesc>Let us consider the experiments on LibraryThing.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>-𝑘NN</cell><cell></cell><cell></cell><cell>Item-𝑘NN</cell><cell></cell><cell></cell><cell>MF</cell><cell></cell><cell></cell><cell>NeuMF</cell><cell></cell></row><row><cell>Attack</cell><cell>Feature Type Similarity</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell></row><row><cell>Random</cell><cell>No Attack</cell><cell>.0736</cell><cell>.1570</cell><cell cols="2">.2301 .2885</cell><cell>.4588</cell><cell>.5590</cell><cell>.7660</cell><cell>.8987</cell><cell>.9419</cell><cell>.0612</cell><cell>.1130</cell><cell>.2216</cell></row><row><cell cols="14">Categorical RQ1: What is the impact of relatedness-based measures and publicly available semantic infor-</cell></row><row><cell>mation?</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 5</head><label>5</label><figDesc>Hit Ratio (𝐻𝑅) result values evaluated on top-10 recommendation lists for the Yahoo!Movies dataset. The usage of Cosine similarity is the baseline approach proposed in SAShA. We underline the results with a p-value greater than 0.05 using a paired-t-test statistical significance test.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>User-𝑘NN</cell><cell></cell><cell></cell><cell>Item-𝑘NN</cell><cell></cell><cell></cell><cell>MF</cell><cell></cell><cell></cell><cell>NeuMF</cell></row><row><cell>Attack</cell><cell cols="2">Feature Type Similarity</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell><cell>1</cell><cell>2.5</cell><cell>5</cell></row><row><cell>Random</cell><cell cols="2">No Attack</cell><cell>.1927</cell><cell>.3624</cell><cell cols="2">.4461 .3260</cell><cell>.5099</cell><cell>.6011</cell><cell>.4108</cell><cell>.5857</cell><cell>.7043</cell><cell>.0247</cell><cell>.0221</cell><cell>.0700</cell></row><row><cell></cell><cell>Categorical</cell><cell>Cosine</cell><cell cols="12">.1869 .3512 .4277 .3163 .4980 .5886 .4084 .5720 .6648 .0018 .0127 .0464</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.1912 .3725 .4559 .3429 .5270 .6098 .4244 .6029 .7049 .0223 .0317 .0891</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.1968 .3712 .4533 .3394 .5233 .6072 .4272 .6011 .7023 .0171 .0516 .0544</cell></row><row><cell></cell><cell>Ontological</cell><cell>Cosine</cell><cell cols="12">.1730 .3353 .4163 .2994 .4793 .5726 .3916 .5513 .6407 .0030 .0051 .0118</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.1766 .3547 .4337 .3224 .5046 .5904 .4029 .5698 .6638 .0106 .0191 .0386</cell></row><row><cell></cell><cell></cell><cell cols="13">Exclusivity .2101 .3898 .4706 .3532 .5442 .6243 .4450 .6328 .7376 .0242 .0567 .0515</cell></row><row><cell></cell><cell>Factual</cell><cell>Cosine</cell><cell cols="12">.1881 .3501 .4289 .3149 .4933 .5840 .4087 .5665 .6590 .0188 .0115 .0365</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.2094 .3869 .4703 .3545 .5398 .6213 .4442 .6272 .7371 .0368 .0507 .0269</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.2055 .3799 .4632 .3479 .5317 .6178 .4361 .6142 .7187 .0176 .0402 .0430</cell></row><row><cell>Average</cell><cell cols="2">No Attack</cell><cell cols="2">.2293 .4117</cell><cell cols="2">.4918 .3758</cell><cell>.5759</cell><cell>.6564</cell><cell>.4900</cell><cell>.6824</cell><cell>.7849</cell><cell>.0033</cell><cell>.0044</cell><cell>.0236</cell></row><row><cell></cell><cell>Categorical</cell><cell>Cosine</cell><cell cols="12">.2581 .4296 .4972 .3955 .5953 .6689 .5326 .7255 .8076 .0017 .0383 .0029</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.2319 .4142 .4917 .3882 .5773 .6542 .4889 .6777 .7716 .0015 .0064 .0272</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.2277 .4026 .4845 .3752 .5698 .6493 .4813 .6658 .7624 .0064 .0014 .0087</cell></row><row><cell></cell><cell>Ontological</cell><cell>Cosine</cell><cell cols="12">.2584 .4264 .4953 .4019 .5952 .6704 .5457 .7315 .8128 .0043 .0018 .0111</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.2406 .4209 .4964 .3940 .5877 .6615 .5131 .7093 .7950 .0040 .0022 .0098</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.2196 .3965 .4771 .3623 .5531 .6337 .4552 .6401 .7347 .0099 .0348 .0205</cell></row><row><cell></cell><cell>Factual</cell><cell>Cosine</cell><cell cols="12">.2573 .4290 .4960 .3882 .5884 .6634 .5353 .7256 .8009 .0026 .0055 .0054</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.2293 .4101 .4910 .3736 .5608 .6414 .4746 .6559 .7511 .0073 .0047 .0231</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.2311 .4075 .4894 .3706 .5661 .6467 .4809 .6661 .7602 .0042 .0070 .0194</cell></row><row><cell>BandWagon</cell><cell cols="2">No Attack</cell><cell>.0996</cell><cell>.2418</cell><cell cols="2">.3556 .2427</cell><cell>.3764</cell><cell>.4691</cell><cell>.2357</cell><cell>.3606</cell><cell>.4320</cell><cell>.0010</cell><cell>.0026</cell><cell>.0025</cell></row><row><cell></cell><cell>Categorical</cell><cell>Cosine</cell><cell cols="12">.1020 .2544 .3634 .2453 .3831 .4748 .2536 .3909 .4662 .0010 .0208 .0010</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.0981 .2412 .3495 .2383 .3676 .4546 .2300 .3540 .4248 .0017 .0022 .0077</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.0926 .2357 .3476 .2378 .3670 .4562 .2248 .3472 .4150 .0009 .0094 .0026</cell></row><row><cell></cell><cell>Ontological</cell><cell>Cosine</cell><cell cols="12">.1039 .2632 .3606 .2460 .3853 .4786 .2726 .4080 .4798 .0045 .0060 .0009</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.0958 .2476 .3528 .2412 .3754 .4652 .2253 .3602 .4376 .0009 .0023 .0012</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.0941 .2227 .3346 .2289 .3528 .4402 .2092 .3191 .3885 .0030 .0022 .0054</cell></row><row><cell></cell><cell>Factual</cell><cell>Cosine</cell><cell cols="12">.1050 .2562 .3614 .2476 .3814 .4734 .2506 .3890 .4625 .0133 .0043 .0004</cell></row><row><cell></cell><cell></cell><cell>Katz</cell><cell cols="12">.0930 .2302 .3460 .2295 .3569 .4461 .2178 .3399 .4064 .0255 .0028 .0115</cell></row><row><cell></cell><cell></cell><cell>Exclusivity</cell><cell cols="12">.0926 .2360 .3515 .2345 .3616 .4504 .2309 .3446 .4137 .0023 .0012 .0014</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Appendices</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.1.">Multiple hop v.s. single-hop attacks.</head><p>The subsequent analysis focuses on the impact of the 1-hop and 2-hops of the 𝒦𝒢 exploration.</p><p>Analogously to 1-hop definition insection 3.1, we built 2nd-hop features. By continuing the exploration of 𝒦𝒢 we retrieve the triples 𝜔 𝜌 ′ − → 𝜔 ′ , where 𝜔 is the object of a 1st-hop triple and the subject of the next triple. The double-hop predicate is denoted by 𝜌 ′ and the object is referred as (𝜔 ′ ). Therefore, the overall feature set is defined as 2-𝐻𝑂𝑃 -𝐹 = {⟨𝜌, 𝜔, 𝜌 ′ , 𝜔 ′ ⟩ | ⟨𝑖, 𝜌, 𝜔, 𝜌 ′ , 𝜔 ′ ⟩ ∈ 𝒦𝒢 with 𝑖 ∈ 𝐼}. Given the current definition, 2nd-hop features also contain heterogeneous predicates (see the previous classification of different kinds of statements). To make it possible to analyze the impact of the kind of semantic information, we consider a 2nd-hop feature as Factual if and only if both relations (𝜌, and 𝜌 ′ ) are Factual. The same holds for the other types of encoded information. In the attacks employing double-hop (2H) features, the strategies evolve as described below:</p><p>• Categorical-2H, we pick up the features with either dcterms:subject or skos:broader properties;</p><p>• Ontological-2H, we select the features containing either rdf-schema:subClassOf or owl:equivalentClass properties;</p><p>• Factual-2H, we use the features not selected in the previous two classes.</p><p>Note that we did not place any domain-specific categorical/ontological features in the respective lists. To provide a domain-agnostic evaluation, we have treated them as factual features. Table <ref type="table">6</ref> shows the average variation of attack efficacy passing from the adoption of single-hop extracted features to the double-hop extraction for LibraryThing and Yahoo!Movies.</p><p>Analyzing the results of attacks on Yahoo!Movies in Table <ref type="table">6</ref>, the first and foremost consideration we can draw is that graph-based relatedness measures seem to have no positive impact when exploiting a double-hop exploration. However, it can be observed that those relatedness metrics already achieved impressive results with the first-hop exploration. Hence, further improving the performance is somehow challenging. Indeed, in most cases, we can observe a minimal variation in the double-hop performance. However, in some cases, the attacks witness a more significant decrease, probably due to the injection of some noisy and loosely related second-hop features. In general, given the high performance achieved with a single-hop exploration, it seems that it is not worth exploring the second-hop, and thus increasing the computational complexity and introducing the new challenge of loosely-related second-hop features. Beyond graph-based relatedness, we observe that cosine vector similarity almost always shows an improvement when considering second-hop features (particularly with Ontological and Factual information). Finally, we have to observe that, even here, the NeuMF model does not benefit from this new information. Table <ref type="table">6</ref> also shows the average attack efficacy variation for LibraryThing. Here, some of the previously described behaviors are even more evident. In detail, we note that the cosine similarity takes advantage of the second-hop information. In this case, we can also observe Katz's improvement, suggesting that this metric did not have unleashed its full potential with only the first-hop features. Finally, in some cases, the second-hop information also improves informed attacks (reaching a peak of 53% improvement for &lt;Average, Factual, Exclusivity&gt;), confirming a less evident trend we found with Yahoo!Movies.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">com recommendations: Item-to-item collaborative filtering</title>
		<author>
			<persName><forename type="first">G</forename><surname>Linden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>York</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amazon</forename></persName>
		</author>
		<idno type="DOI">10.1109/MIC.2003.1167344</idno>
		<ptr target="https://doi.org/10.1109/MIC.2003.1167344.doi:10.1109/MIC.2003.1167344" />
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Computing</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="76" to="80" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Shilling attacks against recommender systems: a comprehensive survey</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gunes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kaleli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bilge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Polat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell. Rev</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="767" to="799" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Robust collaborative recommendation</title>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>O'mahony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommender Systems Handbook</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="961" to="995" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Shilling recommender systems for fun and profit</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Riedl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WWW, ACM</title>
				<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="393" to="402" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Internet Techn</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page">23</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Shilling attack based on item popularity and rated item correlation against collaborative filtering</title>
		<author>
			<persName><forename type="first">K</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">P K</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Machine Learning &amp; Cybernetics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="1833" to="1845" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Sasha: Semantic-aware shilling attacks on recommender systems exploiting knowledge graphs</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Deldjoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Sciascio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-49461-2_18</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-030-49461-2\_18" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -17th International Conference, ESWC 2020</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020-06-04">May 31-June 4, 2020. 2020</date>
			<biblScope unit="volume">12123</biblScope>
			<biblScope unit="page" from="307" to="323" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Introduction to recommender systems handbook</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ricci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rokach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shapira</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-0-387-85820-3_1</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-0-387-85820-3\_1" />
	</analytic>
	<monogr>
		<title level="m">Recommender Systems Handbook</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Ricci</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Rokach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Shapira</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Kantor</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions</title>
		<author>
			<persName><forename type="first">G</forename><surname>Adomavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tuzhilin</surname></persName>
		</author>
		<idno type="DOI">10.1109/TKDE.2005.99</idno>
		<ptr target="https://doi.org/10.1109/TKDE.2005.99.doi:10.1109/TKDE.2005.99" />
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Knowl. Data Eng</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="734" to="749" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Grouplens: An open architecture for collaborative filtering of netnews</title>
		<author>
			<persName><forename type="first">P</forename><surname>Resnick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Iacovou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Suchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bergstrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Riedl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CSCW, ACM</title>
				<imprint>
			<date type="published" when="1994">1994</date>
			<biblScope unit="page" from="175" to="186" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Factor in the neighbors: Scalable and accurate collaborative filtering</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Koren</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">TKDD</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page">24</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Item-based collaborative filtering recommendation algorithms</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">M</forename><surname>Sarwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Karypis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Konstan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Riedl</surname></persName>
		</author>
		<idno type="DOI">10.1145/371920.372071</idno>
		<idno>doi:10.1145/371920.372071</idno>
		<ptr target="https://doi.org/10.1145/371920.372071" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Tenth International World Wide Web Conference, WWW 10</title>
				<editor>
			<persName><forename type="first">V</forename><forename type="middle">Y</forename><surname>Shen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Saito</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Lyu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Zurko</surname></persName>
		</editor>
		<meeting>the Tenth International World Wide Web Conference, WWW 10<address><addrLine>Hong Kong, China</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2001">May 1-5, 2001. 2001</date>
			<biblScope unit="page" from="285" to="295" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Matrix factorization techniques for recommender systems</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Koren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Bell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Volinsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Computer</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="30" to="37" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Sparse linear methods with side information for top-n recommendations</title>
		<author>
			<persName><forename type="first">X</forename><surname>Ning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Karypis</surname></persName>
		</author>
		<idno type="DOI">10.1145/2365952.2365983</idno>
		<idno>doi:10.1145/2365952. 2365983</idno>
		<ptr target="https://doi.org/10.1145/2365952.2365983" />
	</analytic>
	<monogr>
		<title level="m">Sixth ACM Conference on Recommender Systems, RecSys &apos;12</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Cunningham</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Guy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Anand</surname></persName>
		</editor>
		<meeting><address><addrLine>Dublin, Ireland</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012">September 9-13, 2012. 2012</date>
			<biblScope unit="page" from="155" to="162" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Supervised random walks: predicting and recommending links in social networks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Backstrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Forth International Conference on Web Search and Web Data Mining, WSDM 2011</title>
				<meeting>the Forth International Conference on Web Search and Web Data Mining, WSDM 2011<address><addrLine>Hong Kong, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">February 9-12, 2011, 2011</date>
			<biblScope unit="page" from="635" to="644" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Movie genome: alleviating new item cold start in movie recommendation, User Model</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Deldjoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Dacrema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Constantin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Eghbal-Zadeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cereda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schedl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ionescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Cremonesi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">User-Adapt. Interact</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="291" to="343" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">An analysis on time-and session-aware diversification in recommender systems</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Bellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">L</forename><surname>Bruna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tomeo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Di</forename><surname>Sciascio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">UMAP, ACM</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="270" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A survey on knowledge graph-based recommender systems</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhuang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>He</surname></persName>
		</author>
		<idno type="DOI">10.1109/TKDE.2020.3028705</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge &amp; Data Engineering</title>
		<imprint>
			<biblScope unit="volume">5555</biblScope>
			<biblScope unit="page" from="1" to="1" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Addressing the user cold start with cross-domain collaborative filtering: exploiting item metadata in matrix factorization, User Model</title>
		<author>
			<persName><forename type="first">I</forename><surname>Fernández-Tobías</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Cantador</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tomeo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11257-018-9217-6</idno>
		<ptr target="https://doi.org/10.1007/s11257-018-9217-6.doi:10.1007/s11257-018-9217-6" />
	</analytic>
	<monogr>
		<title level="j">User Adapt. Interact</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="443" to="486" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Knowledge modeling via contextualized representations for lstm-based personalized exercise recommendation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Huo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">S</forename><surname>Chao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2020.03.014</idno>
		<ptr target="https://doi.org/10.1016/j.ins.2020.03.014.doi:10.1016/j.ins.2020.03.014" />
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">523</biblScope>
			<biblScope unit="page" from="266" to="278" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A recommender system for complex real-world applications with nonlinear dependencies and knowledge graph context</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hildebrandt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Sunder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mogoreanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Joblin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mehta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Thon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tresp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ESWC</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11503</biblScope>
			<biblScope unit="page" from="179" to="193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">2nd workshop on knowledge-aware and conversational recommender systems -kars</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">Di</forename><surname>Noia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CIKM, ACM</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="3001" to="3002" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Knowledge-aware and conversational recommender systems</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Basile</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Bridge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lops</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Musto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Narducci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zanker</surname></persName>
		</author>
		<idno type="DOI">10.1145/3240323.3240338</idno>
		<idno>doi:10.1145/3240323. 3240338</idno>
		<ptr target="https://doi.org/10.1145/3240323.3240338" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th ACM Conference on Recommender Systems, RecSys 2018</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Pera</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Ekstrand</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Amatriain</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>O'donovan</surname></persName>
		</editor>
		<meeting>the 12th ACM Conference on Recommender Systems, RecSys 2018<address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2018">October 2-7, 2018. 2018</date>
			<biblScope unit="page" from="521" to="522" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">entity2rec: Property-specific knowledge graph embeddings for item recommendation</title>
		<author>
			<persName><forename type="first">E</forename><surname>Palumbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Monti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Rizzo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Troncy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Baralis</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2020.113235</idno>
		<ptr target="https://doi.org/10.1016/j.eswa.2020.113235.doi:10.1016/j.eswa.2020.113235" />
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">151</biblScope>
			<biblScope unit="page">113235</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Deep hybrid knowledge graph embedding for top-n recommendation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Tian</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-60029-7_6</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-030-60029-7\_6" />
	</analytic>
	<monogr>
		<title level="m">Web Information Systems and Applications -17th International Conference, WISA 2020</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">G</forename><surname>Wang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Hendler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Song</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Xu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Liu</surname></persName>
		</editor>
		<meeting><address><addrLine>Guangzhou, China</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">September 23-25, 2020. 2020</date>
			<biblScope unit="volume">12432</biblScope>
			<biblScope unit="page" from="59" to="70" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Embedding-based recommendations on scholarly knowledge graphs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nayyeri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vahdati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">S</forename><surname>Yazdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lehmann</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-49461-2_15</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-030-49461-2\_15" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -17th International Conference, ESWC 2020</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Ngomo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Paulheim</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Rula</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Gentile</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Haase</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Cochez</surname></persName>
		</editor>
		<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020-06-04">May 31-June 4, 2020. 2020</date>
			<biblScope unit="volume">12123</biblScope>
			<biblScope unit="page" from="255" to="270" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Distilling structured knowledge into embeddings for explainable and accurate recommendation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1145/3336191.3371790</idno>
		<idno>doi:10.1145/3336191.3371790</idno>
		<ptr target="https://doi.org/10.1145/3336191.3371790" />
	</analytic>
	<monogr>
		<title level="m">WSDM &apos;20: The Thirteenth ACM International Conference on Web Search and Data Mining</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Caverlee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><forename type="middle">B</forename><surname>Hu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Lalmas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Wang</surname></persName>
		</editor>
		<meeting><address><addrLine>Houston, TX, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2020">February 3-7, 2020. 2020</date>
			<biblScope unit="page" from="735" to="743" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Layered graph embedding for entity recommendation using wikipedia in the yahoo! knowledge graph</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Torzec</surname></persName>
		</author>
		<idno type="DOI">10.1145/3366424.3383570</idno>
		<idno>doi:10.1145/3366424.3383570</idno>
		<ptr target="https://doi.org/10.1145/3366424.3383570" />
	</analytic>
	<monogr>
		<title level="m">Companion of The 2020 Web Conference 2020</title>
				<editor>
			<persName><forename type="first">A</forename><forename type="middle">E F</forename><surname>Seghrouchni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Sukthankar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Van Steen</surname></persName>
		</editor>
		<meeting><address><addrLine>Taipei, Taiwan</addrLine></address></meeting>
		<imprint>
			<publisher>ACM / IW3C2</publisher>
			<date type="published" when="2020">April 20-24, 2020. 2020</date>
			<biblScope unit="page" from="811" to="818" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Rdf2vec: RDF graph embeddings and their applications</title>
		<author>
			<persName><forename type="first">P</forename><surname>Ristoski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rosati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Leone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Paulheim</surname></persName>
		</author>
		<idno type="DOI">10.3233/SW-180317</idno>
		<ptr target="https://doi.org/10.3233/SW-180317.doi:10.3233/SW-180317" />
	</analytic>
	<monogr>
		<title level="j">Semantic Web</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="721" to="752" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Convolutional 2d knowledge graph embeddings</title>
		<author>
			<persName><forename type="first">T</forename><surname>Dettmers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Minervini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Stenetorp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Riedel</surname></persName>
		</author>
		<ptr target="https://www.aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/17366" />
	</analytic>
	<monogr>
		<title level="m">AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18)</title>
				<editor>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Mcilraith</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">Q</forename><surname>Weinberger</surname></persName>
		</editor>
		<meeting><address><addrLine>New Orleans, Louisiana, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2018">February 2-7, 2018. 2018</date>
			<biblScope unit="page" from="1811" to="1818" />
		</imprint>
	</monogr>
	<note>Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence</note>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">How to make latent factors interpretable by feeding factorization machines with knowledge graphs</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Di Sciascio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ragone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Trotta</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-30793-6_3</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-030-30793-6\_3" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -ISWC 2019 -18th International Semantic Web Conference</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">C</forename><surname>Ghidini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Hartig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Maleshkova</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><surname>Svátek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><forename type="middle">F</forename><surname>Cruz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Hogan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Song</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Lefrançois</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Gandon</surname></persName>
		</editor>
		<meeting><address><addrLine>Auckland, New Zealand</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">October 26-30, 2019. 2019</date>
			<biblScope unit="volume">11778</biblScope>
			<biblScope unit="page" from="38" to="56" />
		</imprint>
	</monogr>
	<note>Proceedings, Part I</note>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Mining implicit entity preference from user-item interaction data for knowledge graph completion via adversarial learning</title>
		<author>
			<persName><forename type="first">G</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">X</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<idno type="DOI">10.1145/3366423.3380155</idno>
		<idno>doi:10.1145/3366423.3380155</idno>
		<ptr target="https://doi.org/10.1145/3366423.3380155" />
	</analytic>
	<monogr>
		<title level="m">WWW &apos;20: The Web Conference 2020</title>
				<editor>
			<persName><forename type="first">Y</forename><surname>Huang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>King</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Van Steen</surname></persName>
		</editor>
		<meeting><address><addrLine>Taipei, Taiwan</addrLine></address></meeting>
		<imprint>
			<publisher>ACM / IW3C2</publisher>
			<date type="published" when="2020">April 20-24, 2020. 2020</date>
			<biblScope unit="page" from="740" to="751" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Translating embeddings for modeling multi-relational data</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bordes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Usunier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>García-Durán</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Weston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yakhnenko</surname></persName>
		</author>
		<ptr target="https://proceedings.neurips.cc/paper/2013/hash/1cecc7a77928ca8133fa24680a88d2f9-Abstract.html" />
	</analytic>
	<monogr>
		<title level="m">Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held</title>
				<editor>
			<persName><forename type="first">C</forename><forename type="middle">J C</forename><surname>Burges</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Bottou</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Ghahramani</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">Q</forename><surname>Weinberger</surname></persName>
		</editor>
		<meeting><address><addrLine>Lake Tahoe, Nevada, United States</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">December 5-8, 2013. 2013</date>
			<biblScope unit="page" from="2787" to="2795" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Unifying knowledge graph learning and recommendation: Towards a better understanding of user preferences</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chua</surname></persName>
		</author>
		<idno type="DOI">10.1145/3308558.3313705</idno>
		<idno>doi:10.1145/3308558.3313705</idno>
		<ptr target="https://doi.org/10.1145/3308558.3313705" />
	</analytic>
	<monogr>
		<title level="m">The World Wide Web Conference, WWW 2019</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>White</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Mantrach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Silvestri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Mcauley</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Baeza-Yates</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Zia</surname></persName>
		</editor>
		<meeting><address><addrLine>San Francisco, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2019">May 13-17, 2019. 2019</date>
			<biblScope unit="page" from="151" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Transfer learning for item recommendations and knowledge graph completion in item related domains via a co-factorization model</title>
		<author>
			<persName><forename type="first">G</forename><surname>Piao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">G</forename><surname>Breslin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-93417-4_32</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-319-93417-4\_32" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -15th International Conference, ESWC 2018</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Gangemi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Navigli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Vidal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Troncy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Hollink</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Tordai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Alam</surname></persName>
		</editor>
		<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">June 3-7, 2018. 2018</date>
			<biblScope unit="volume">10843</biblScope>
			<biblScope unit="page" from="496" to="511" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Modeling relational data with graph convolutional networks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Schlichtkrull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Kipf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bloem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Van Den Berg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Titov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Welling</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-93417-4_38</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-319-93417-4\_38" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -15th International Conference, ESWC 2018</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Gangemi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Navigli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Vidal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Troncy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Hollink</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Tordai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Alam</surname></persName>
		</editor>
		<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">June 3-7, 2018. 2018</date>
			<biblScope unit="volume">10843</biblScope>
			<biblScope unit="page" from="593" to="607" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">End-to-end structure-aware convolutional networks for knowledge base completion</title>
		<author>
			<persName><forename type="first">C</forename><surname>Shang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhou</surname></persName>
		</author>
		<idno type="DOI">10.1609/aaai.v33i01.33013060</idno>
		<ptr target="https://doi.org/10.1609/aaai.v33i01.33013060.doi:10.1609/aaai.v33i01.33013060" />
	</analytic>
	<monogr>
		<title level="m">The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019</title>
				<meeting><address><addrLine>Honolulu, Hawaii, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2019-02-01">January 27 -February 1, 2019. 2019</date>
			<biblScope unit="page" from="3060" to="3067" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">KGAT: knowledge graph attention network for recommendation</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chua</surname></persName>
		</author>
		<idno type="DOI">10.1145/3292500.3330989</idno>
		<idno>doi:10.1145/3292500.3330989</idno>
		<ptr target="https://doi.org/10.1145/3292500.3330989" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining, KDD 2019</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Teredesai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><surname>Kumar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Rosales</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Terzi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Karypis</surname></persName>
		</editor>
		<meeting>the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining, KDD 2019<address><addrLine>Anchorage, AK, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2019">August 4-8, 2019. 2019</date>
			<biblScope unit="page" from="950" to="958" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Cross-domain recommendation with semantic correlation in tagging systems</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Joint Conference on Neural Networks, IJCNN</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<title/>
		<idno type="DOI">10.1109/IJCNN.2019.8852049</idno>
		<ptr target="https://doi.org/10.1109/IJCNN.2019.8852049.doi:10.1109/IJCNN.2019.8852049" />
		<imprint>
			<date type="published" when="2019">July 14-19, 2019. 2019</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="1" to="8" />
			<pubPlace>Budapest, Hungary</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">A workflow for cross media recommendations based on linked data analysis</title>
		<author>
			<persName><forename type="first">T</forename><surname>Köllmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Berndl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Weißgerber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Aichroth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kosch</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1615/limePaper1.pdf" />
	</analytic>
	<monogr>
		<title level="m">Joint Proceedings of the 4th International Workshop on Linked Media and the 3rd Developers Hackshop co-located with the 13th Extended Semantic Web Conference ESWC 2016</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">R</forename><surname>Troncy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">J B</forename><surname>Nixon</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Kurz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Schlegel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Sande</surname></persName>
		</editor>
		<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-05-30">May 30, 2016. 2016</date>
			<biblScope unit="volume">1615</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Knowledge-aware interpretable recommender systems</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Bellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Sciascio</surname></persName>
		</author>
		<idno type="DOI">10.3233/SSW200014</idno>
		<ptr target="https://doi.org/10.3233/SSW200014.doi:10.3233/SSW200014" />
	</analytic>
	<monogr>
		<title level="m">Knowledge Graphs for eXplainable Artificial Intelligence: Foundations, Applications and Challenges, volume 47 of Studies on the Semantic Web</title>
				<editor>
			<persName><forename type="first">I</forename><surname>Tiddi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Lécué</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</editor>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="101" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Semantic interpretation of top-n recommendations</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Di Sciascio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ragone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Trotta</surname></persName>
		</author>
		<idno type="DOI">10.1109/TKDE.2020.3010215</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="page" from="1" to="1" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Hagerec: Hierarchical attention graph convolutional network incorporating knowledge graph for explainable recommendation</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dong</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.knosys.2020.106194</idno>
		<ptr target="https://doi.org/10.1016/j.knosys.2020.106194.doi:10.1016/j.knosys.2020.106194" />
	</analytic>
	<monogr>
		<title level="j">Knowl. Based Syst</title>
		<imprint>
			<biblScope unit="volume">204</biblScope>
			<biblScope unit="page">106194</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Explainable reasoning over knowledge graphs for recommendation</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T.-S</forename><surname>Chua</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="5329" to="5336" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Knowledge graph enhanced neural collaborative recommendation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Qian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2020.113992</idno>
		<ptr target="https://doi.org/10.1016/j.eswa.2020.113992.doi:10.1016/j.eswa.2020.113992" />
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">164</biblScope>
			<biblScope unit="page">113992</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Mrp2rec: Exploring multiple-step relation path semantics for knowledge graph-based recommendations</title>
		<author>
			<persName><forename type="first">T</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3011279</idno>
		<ptr target="https://doi.org/10.1109/ACCESS.2020.3011279.doi:10.1109/ACCESS.2020.3011279" />
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="134817" to="134825" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">A learning path recommendation model based on a multidimensional knowledge graph framework for e-learning</title>
		<author>
			<persName><forename type="first">D</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.knosys.2020.105618</idno>
		<ptr target="https://doi.org/10.1016/j.knosys.2020.105618.doi:10.1016/j.knosys.2020.105618" />
	</analytic>
	<monogr>
		<title level="j">Knowl. Based Syst</title>
		<imprint>
			<biblScope unit="volume">195</biblScope>
			<biblScope unit="page">105618</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Knowledge graph convolutional networks for recommender systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guo</surname></persName>
		</author>
		<idno type="DOI">10.1145/3308558.3313417</idno>
		<idno>doi:10.1145/3308558.3313417</idno>
		<ptr target="https://doi.org/10.1145/3308558.3313417" />
	</analytic>
	<monogr>
		<title level="m">The World Wide Web Conference, WWW 2019</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>White</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Mantrach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Silvestri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Mcauley</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Baeza-Yates</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Zia</surname></persName>
		</editor>
		<meeting><address><addrLine>San Francisco, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2019">May 13-17, 2019. 2019</date>
			<biblScope unit="page" from="3307" to="3313" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Ripplenet: Propagating user preferences on the knowledge graph for recommender systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guo</surname></persName>
		</author>
		<idno type="DOI">10.1145/3269206.3271739</idno>
		<idno>doi:10.1145/ 3269206.3271739</idno>
		<ptr target="https://doi.org/10.1145/3269206.3271739" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 27th ACM International Conference on Information and Knowledge Management, CIKM 2018</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Allan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">W</forename><surname>Paton</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Srivastava</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Agrawal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">Z</forename><surname>Broder</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Zaki</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Candan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Labrinidis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Schuster</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</editor>
		<meeting>the 27th ACM International Conference on Information and Knowledge Management, CIKM 2018<address><addrLine>Torino, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2018">October 22-26, 2018. 2018</date>
			<biblScope unit="page" from="417" to="426" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Sprank: Semantic path-based ranking for top-N recommendations using linked open data</title>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Ostuni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tomeo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Di</forename><surname>Sciascio</surname></persName>
		</author>
		<idno type="DOI">10.1145/2899005</idno>
		<ptr target="https://doi.org/10.1145/2899005.doi:10.1145/2899005" />
	</analytic>
	<monogr>
		<title level="j">ACM TIST</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">34</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Feature factorization for top-n recommendation: From item rating to features relevance</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lops</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Sciascio</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1887/paper3.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st Workshop on Intelligent Recommender Systems by Knowledge Transfer &amp; Learning co-located with ACM Conference on Recommender Systems (RecSys 2017)</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">Y</forename><surname>Zheng</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Pan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Sahebi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Fernández</surname></persName>
		</editor>
		<meeting>the 1st Workshop on Intelligent Recommender Systems by Knowledge Transfer &amp; Learning co-located with ACM Conference on Recommender Systems (RecSys 2017)<address><addrLine>Como, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-08-27">August 27, 2017. 2017</date>
			<biblScope unit="volume">1887</biblScope>
			<biblScope unit="page" from="16" to="21" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">Linked open data to support content-based recommender systems</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Mirizzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Ostuni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Romito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zanker</surname></persName>
		</author>
		<idno type="DOI">10.1145/2362499.2362501</idno>
		<idno>doi:10.1145/2362499.2362501</idno>
		<ptr target="https://doi.org/10.1145/2362499.2362501" />
	</analytic>
	<monogr>
		<title level="m">I-SEMANTICS 2012 -8th International Conference on Semantic Systems, I-SEMANTICS &apos;12</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Presutti</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">S</forename><surname>Pinto</surname></persName>
		</editor>
		<meeting><address><addrLine>Graz, Austria</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012">September 5-7, 2012. 2012</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Personalized entity recommendation: a heterogeneous information network approach</title>
		<author>
			<persName><forename type="first">X</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sturt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Khandelwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Norick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Han</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WSDM, ACM</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="283" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Recommendation with multi-source heterogeneous information</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IJCAI, ijcai.org</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="3378" to="3384" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">DKN: deep knowledge-aware network for news recommendation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WWW, ACM</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1835" to="1844" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Using ontology-based data summarization to develop semantics-aware recommender systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Magarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Maurino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Palmonari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rula</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ESWC</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">10843</biblScope>
			<biblScope unit="page" from="128" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Collaborative recommendation: A robustness analysis</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>O'mahony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kushmerick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C M</forename><surname>Silvestre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Internet Techn</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="344" to="377" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Attack-resistant recommender systems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Aggarwal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommender Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="385" to="410" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">Securing collaborative filtering against malicious attacks through anomaly detection</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP&apos;06)</title>
				<meeting>the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP&apos;06)<address><addrLine>Boston</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">10</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">Effective attack models for shilling item-based collaborative filtering systems</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the WebKDD Workshop</title>
				<meeting>the WebKDD Workshop</meeting>
		<imprint>
			<publisher>Citeseer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="13" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">Taamr: Targeted adversarial attack against multimedia recommender systems</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Malitesta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DSN Workshops, IEEE</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<monogr>
		<title level="m" type="main">Recommender systems: Attack types and strategies</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>O'mahony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C M</forename><surname>Silvestre</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>AAAI, AAAI Press / The MIT Press</publisher>
			<biblScope unit="page" from="334" to="339" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b63">
	<analytic>
		<title level="a" type="main">Assessing the impact of a user-item collaborative attack on class of users</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Deldjoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<ptr target=".org" />
	</analytic>
	<monogr>
		<title level="m">ImpactRS@RecSys</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2462</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">How dataset characteristics affect the robustness of collaborative recommendation models</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Deldjoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Sciascio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<idno type="DOI">10.1145/3397271.3401046</idno>
		<idno>doi:10.1145/3397271.3401046</idno>
		<ptr target="https://doi.org/10.1145/3397271.3401046" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, SIGIR 2020, Virtual Event</title>
				<meeting>the 43rd International ACM SIGIR conference on research and development in Information Retrieval, SIGIR 2020, Virtual Event<address><addrLine>, China</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2020">July 25-30, 2020. 2020</date>
			<biblScope unit="page" from="951" to="960" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<analytic>
		<title level="a" type="main">Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system</title>
		<author>
			<persName><forename type="first">J</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Wide Web</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="729" to="748" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<analytic>
		<title level="a" type="main">Svm-tia a shilling attack detection method based on svm and target item analysis in recommender systems</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zeng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Neurocomputing</title>
		<imprint>
			<biblScope unit="volume">210</biblScope>
			<biblScope unit="page" from="197" to="205" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<analytic>
		<title level="a" type="main">Shilling attack detection for recommender systems based on credibility of group users and rating time series</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Qu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Cheng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">PloS one</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">e0196533</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b68">
	<analytic>
		<title level="a" type="main">Quick and accurate attack detection in recommender systems through user attributes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Aktukmak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yilmaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">RecSys, ACM</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="348" to="352" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<analytic>
		<title level="a" type="main">Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">124</biblScope>
			<biblScope unit="page">113112</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b70">
	<analytic>
		<title level="a" type="main">Data poisoning attacks on factorization-based collaborative filtering</title>
		<author>
			<persName><forename type="first">B</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Vorobeychik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">NIPS</title>
		<imprint>
			<biblScope unit="page" from="1885" to="1893" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b71">
	<analytic>
		<title level="a" type="main">Adversarial attacks on an oblivious recommender</title>
		<author>
			<persName><forename type="first">K</forename><surname>Christakopoulou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Banerjee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">RecSys, ACM</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="322" to="330" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b72">
	<analytic>
		<title level="a" type="main">Influence function based data poisoning attacks to top-n recommender systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">Z</forename><surname>Gong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WWW, ACM / IW3C2</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="3019" to="3025" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b73">
	<analytic>
		<title level="a" type="main">Certifiable robustness to discrete adversarial perturbations for factorization machines</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zheng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGIR, ACM</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="419" to="428" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b74">
	<analytic>
		<title level="a" type="main">Revisiting adversarially learned injection attacks against recommender systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fourteenth ACM Conference on Recommender Systems</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="318" to="327" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b75">
	<analytic>
		<title level="a" type="main">Adversarial personalized ranking for recommendation</title>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chua</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGIR, ACM</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="355" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b76">
	<analytic>
		<title level="a" type="main">Adversarial collaborative neural network for robust recommendation</title>
		<author>
			<persName><forename type="first">F</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Benatallah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGIR, ACM</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1065" to="1068" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b77">
	<analytic>
		<title level="a" type="main">Assessing perceptual and recommendation mutation of adversarially-poisoned visual recommenders (short paper)</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Malitesta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<ptr target=".org" />
	</analytic>
	<monogr>
		<title level="m">DP@AI*IA</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2776</biblScope>
			<biblScope unit="page" from="49" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b78">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Deldjoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Dinoia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-0716-2197-4_9</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-1-0716-2197-4_9" />
		<title level="m">Adversarial Recommender Systems: Attack, Defense, and Advances</title>
				<meeting><address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<publisher>Springer US</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="335" to="379" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b79">
	<analytic>
		<title level="a" type="main">Denoise to protect: A method to robustify visual recommenders from adversaries</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Merra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Anelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Malitesta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C M</forename><surname>Mancino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGIR, ACM</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1924" to="1928" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b80">
	<analytic>
		<title level="a" type="main">Linked open data to support content-based recommender systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Di Noia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Mirizzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Ostuni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Romito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zanker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 8th Int. Conf. on Semantic Systems</title>
				<meeting>of the 8th Int. Conf. on Semantic Systems</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b81">
	<analytic>
		<title level="a" type="main">A new status index derived from sociometric analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Katz</surname></persName>
		</author>
		<idno type="DOI">10.1007/BF02289026</idno>
		<ptr target="https://doi.org/10.1007/BF02289026.doi:10.1007/BF02289026" />
	</analytic>
	<monogr>
		<title level="j">Psychometrika</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="39" to="43" />
			<date type="published" when="1953">1953</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b82">
	<analytic>
		<title level="a" type="main">Path-based semantic relatedness on linked data and its use to word and entity disambiguation</title>
		<author>
			<persName><forename type="first">I</forename><surname>Hulpus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Prangnawarat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Hayes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Semantic Web Conference (1</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">9366</biblScope>
			<biblScope unit="page" from="442" to="457" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b83">
	<analytic>
		<title level="a" type="main">Combining a co-occurrence-based and a semantic measure for entity linking</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Nunes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dietze</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Casanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kawase</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Fetahu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Nejdl</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-38288-8_37</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-642-38288-8\_37" />
	</analytic>
	<monogr>
		<title level="m">The Semantic Web: Semantics and Big Data, 10th International Conference, ESWC 2013</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Cimiano</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Ó</forename><surname>Corcho</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><surname>Presutti</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Hollink</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Rudolph</surname></persName>
		</editor>
		<meeting><address><addrLine>Montpellier, France</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">May 26-30, 2013. 2013</date>
			<biblScope unit="volume">7882</biblScope>
			<biblScope unit="page" from="548" to="562" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b84">
	<analytic>
		<title level="a" type="main">Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Internet Technology (TOIT)</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b85">
	<analytic>
		<title level="a" type="main">An evaluation of the performance of collaborative filtering</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>O'mahony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C</forename><surname>Silvestre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14th Irish Artificial Intelligence and Cognitive Science (AICS 2003) Conference</title>
				<imprint>
			<publisher>Citeseer</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b86">
	<analytic>
		<title level="a" type="main">Unsupervised generation of data mining features from linked open data</title>
		<author>
			<persName><forename type="first">H</forename><surname>Paulheim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fürnkranz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WIMS, ACM</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page">12</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b87">
	<analytic>
		<title level="a" type="main">Neural collaborative filtering</title>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chua</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WWW, ACM</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="173" to="182" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b88">
	<analytic>
		<title level="a" type="main">Controlling popularity bias in learning-to-rank recommendation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Abdollahpouri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">RecSys, ACM</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="42" to="46" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
