<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>RobustRecSys: Design, Evaluation, and Deployment of Robust Recom-
mender Systems Workshop @ RecSys</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>The Role of Fake Users in Sequential Recommender Systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Filippo Betello</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sapienza University of Rome</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>18</volume>
      <issue>2022</issue>
      <abstract>
        <p>Sequential Recommender Systems (SRSs) are widely used to model user behavior over time, yet their robustness remains an underexplored area of research. In this paper, we conduct an empirical study to assess how the presence of fake users -who engage in random interactions, follow popular or unpopular items, or focus on a single genre -impacts the performance of SRSs in real-world scenarios. We evaluate two SRS models across multiple datasets, using established metrics such as Normalized Discounted Cumulative Gain (NDCG) and Rank Sensitivity List (RLS) to measure performance. While traditional metrics like NDCG remain relatively stable, our findings reveal that the presence of fake users severely degrades RLS metrics, often reducing them to near-zero values. These results highlight the need for further investigation into the efects of fake users on training data and emphasize the importance of developing more resilient SRSs that can withstand diferent types of adversarial attacks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Recommender Systems</kwd>
        <kwd>Evaluation of Recommender Systems</kwd>
        <kwd>Model Stability</kwd>
        <kwd>Input Data Perturbation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Recommender Systems (RSs) have become an essential part
of our daily lives, helping users navigate the vast online
information landscape [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. With the global expansion of
e-commerce services, social media platforms and streaming
services, these systems have become essential for
personalising content delivery and increasing user engagement
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Over the last several years, Sequential Recommender
Systems (SRSs) have gained significant popularity as an
efective method for modeling user behavior over time [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. By
capitalizing on the temporal dependencies within users’
interaction sequences, these systems can make more
precise predictions about user preferences [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This approach
allows for a more nuanced understanding of user
behavior, leading to recommendations that are better tailored to
individual needs and preferences. As a result, SRSs have
become a critical component in various applications, ranging
from e-commerce [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to music recommendation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], where
understanding and anticipating user preferences is key to
enhancing user experience and engagement.
      </p>
      <p>
        In recent years, the prevalence of bots (fake users) on
social media platforms has increased dramatically [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. It
is estimated that Amazon, for example, spends 2% of its
net revenue each year fighting counterfeiting [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. While
several techniques have been identified to counteract this
growing problem [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ], a detailed investigation in the area
of sequential recommendation systems is still lacking. Li
et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] aims to fill this gap by investigating the impact of
bot-generated data on sequential recommendation models.
Specifically, it seeks to determine an optimal bot-generation
budget and analyze its impact on popular matrix
factorization models. Indeed, controlling and maintaining a large
number of bots is costly.
      </p>
      <p>Therefore, it is possible to create a limited number of
bots that can significantly influence the prominence of a
particular item or category. By strategically deploying these
bots, the visibility and perceived importance of the targeted
item or category can be enhanced, making it stand out more
compared to others. Imagine if, by using fake users, it were
possible to raise the profile of a certain category or product
or, conversely, to lower the profile of another. This scenario
represents a form of unfair competition and is therefore
crucial to study. Understanding how fake users behave in
controlled environments allows us to assess their impact
on real users. It is also important to investigate whether
partially coordinated fake users can actively improve the
performance or predictions of a particular category or item.</p>
      <p>In this paper, we investigate the impact of fake users
on sequential recommendation systems. Specifically, we
investigate how the inclusion of a certain percentage of
bots afects the performance of real users. These bots are
programmed to deal with random items, popular items,
unpopular items and items within the same category.</p>
      <p>Our experiments focus on the following research
questions:
• RQ1: How does the value of standard metrics such
as NDCG change for real users depending on the
type and increasing number of fake users?
• RQ2:How do recommendation lists for real users
difer from those generated without fake users?
• RQ3: Are more or less popular items favoured by
the presence of fake users with certain types of
interactions?</p>
      <p>
        We evaluate our hypothesis using two diferent models,
SASRec [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and GRU4Rec [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], and by employing four
diferent datasets, namely MovieLens 1M, MovieLens 100k
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], Foursquare New York City and Foursquare Tokyo [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
2.1. Sequential Recommender Systems
Sequential recommendation systems (SRSs) use algorithms
that analyze a user’s past interactions with items to
provide personalized recommendations over time. These
systems have found widespread application in areas such as
e-commerce [
        <xref ref-type="bibr" rid="ref16 ref5">16, 5</xref>
        ], social media [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ], and music
streaming services [
        <xref ref-type="bibr" rid="ref19 ref20 ref6">19, 20, 6</xref>
        ]. Unlike traditional recommender
systems, SRSs take into account the sequence and timing of
user interactions, resulting in more precise predictions of
user preferences and behaviors [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Various methods have been developed to implement SRSs.
Early approaches used Markov Chain models [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ], which,
despite their simplicity, struggled with capturing complex
dependencies in long-term sequences. More recently,
Recurrent Neural Networks (RNNs) have become prominent
in this domain [
        <xref ref-type="bibr" rid="ref13 ref23 ref24">23, 13, 24</xref>
        ]. RNNs encode a user’s historical
preferences into a vector that is updated at each time step
to predict the next item in the sequence. However, RNNs
can encounter dificulties with long-term dependencies and
generating diverse recommendations.
      </p>
      <p>
        The attention mechanism [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] has introduced another
promising approach. Models like SASRec [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and
BERT4Rec [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] leverage this mechanism to dynamically
weight diferent parts of the sequence, capturing key
features to enhance prediction accuracy.
      </p>
      <p>
        Additionally, Graph Neural Networks have recently
gained traction in the recommendation system field,
particularly within the sequential domain [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ]. These networks
excel at modeling complex relationships and dependencies,
further advancing the capabilities of SRSs [
        <xref ref-type="bibr" rid="ref29 ref30 ref31">29, 30, 31</xref>
        ].
      </p>
      <sec id="sec-1-1">
        <title>2.2. Training Perturbations</title>
        <p>
          Robustness is an important aspect of SRSs as they are
vulnerable to noisy and incomplete data. [
          <xref ref-type="bibr" rid="ref32 ref33">32, 33</xref>
          ] investigated
the efects of removing items at the beginning, middle and
end of a sequence of temporally ordered items and found
that removing items at the end of the sequence significantly
afected all performances.
        </p>
        <p>
          Yin et al. [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ] design an attacker-chosen targeted item in
federated recommender systems without requiring
knowledge about user-item rating data, user attributes, or the
aggregation rule used by the server. While studies are being
conducted in other areas of recommendation [
          <xref ref-type="bibr" rid="ref35 ref36">35, 36</xref>
          ] and
several techniques have been identified to counteract this
growing problem [
          <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
          ], a detailed investigation in the area
of sequential recommendation systems is still lacking.
        </p>
        <p>
          Li et al. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] aim to address this issue by examining how
bot-generated data afects sequential recommendation
models. Their research focuses on finding the optimal budget for
bot generation and assessing its influence on widely used
matrix factorization models. Indeed, controlling and
maintaining a large number of bots is costly. Previous research
has proposed attacks using a limited number of users and
clustering models [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ], but these have not been extensively
studied in the context of sequential recommendations.
        </p>
        <p>To the best of our knowledge, our research is completely
novel and breaks new ground. It explores the role that fake
users might play in influencing real users. This study aims
to shed light on the potential impact that fake users could
have on the behaviour, opinions and interactions of real
users within sequential recommendation systems.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Methodology</title>
      <sec id="sec-2-1">
        <title>3.1. Background</title>
        <p>The main objective of sequential recommendation systems
is to predict the user’s next interaction in a given sequence.
Suppose we have a set of  users, represented as  ⊂ N+,
and a corresponding set of  items, represented as ℐ ⊂ N+.
Each user  ∈  is associated with a time-ordered sequence
of interactions  = [1, . . . ,  ], where each  ∈ ℐ
denotes the -th item with which the user has interacted.
The length of this sequence, , is greater than 1 and varies
from user to user.</p>
        <p>A sequential recommendation system (SRS), denoted
ℳ, processes the sequence up to the -th item, denoted
 = [1, . . . , ], to suggest the next item, +1. The
recommendation output, +1 = ℳ() ∈ R, is a score
distribution over all possible items. This distribution is used
to create a ranked list of items, predicting the most likely
interactions for user  in the next step,  + 1.</p>
      </sec>
      <sec id="sec-2-2">
        <title>3.2. Fake user design</title>
        <p>Given that each item in the set ℐ has a popularity value
determined by user interactions, we designed four types of
fake user scenarios:
• Random: Items are randomly sampled from the
entire set ℐ. Formally, each item  in the sequence
 is selected with probability 1 .
|ℐ|
• Popularity: Items are sampled according to
a popularity-based probability distribution pop,
where the probability of selecting item  is
proportional to its popularity .
• Unpopularity: Similar to the popularity-based
scenario, but with a distribution unpop that inversely
favors popular items. Here, the probability of
selecting item  is inversely proportional to its popularity,
1 , favoring less popular items.</p>
        <p>Pr() ∝ 
• Genre: In this scenario, items are sampled
exclusively from a specific genre. It is only applied to the
ML datasets.</p>
        <p>These fake users sequences will contain unique items to
ensure there are no repetitions. While the first scenario
involves users acting independently without any sense of
cooperation, the middle two scenarios introduce a level of
implicit cooperation. Specifically, users in these scenarios
tend to converge on viewing either highly popular or highly
unpopular items, reflecting a collective behavior. The
average length of the sequences will be the same as that of real
users. The proportion of synthetic users will vary,
comprising 1%, 5%, 10%, 15% and 20% of the original dataset. The
fake users are only used in the training data, leaving the
test data unafected.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3.3. Models</title>
        <p>
          In our study, we use two diferent architectures to validate
our results:
• SASRec [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], which uses self-attention mechanisms
to evaluate the importance of each interaction
between the user and the item.
• GRU4Rec [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], a RNN model that uses gated
recurrent units (GRUs) [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ] to improve prediction
accuracy.
        </p>
        <p>We chose these two models because they have
demonstrated exceptional performance in numerous benchmarks
and are widely cited in the academic literature. Moreover,
since one model is based on attention mechanisms and the
other on RNNs, their diefrent network operations make it
particularly interesting to evaluate their behaviour.
We use four diferent datasets:</p>
        <p>
          MovieLens [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]: Frequently utilized to evaluate
recommender systems, this benchmark dataset is employed in our
study using both the 100K and 1M versions.
        </p>
        <p>
          Foursquare [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]: This dataset includes check-in data
from New York City and Tokyo, collected over a span of
roughly ten months.
        </p>
        <p>
          The statistics for all the datasets are shown in Table 1. Our
pre-processing technique adheres to recognised principles,
such as treating ratings as implicit, using all interactions
without regard to the rating value, and deleting users and
things with fewer than 5 interactions [
          <xref ref-type="bibr" rid="ref12 ref26">12, 26</xref>
          ]. For testing, as
in [
          <xref ref-type="bibr" rid="ref12 ref26">26, 12</xref>
          ], we keep the most recent interaction for each user,
while for validation, we keep the second to last action. The
remaining interactions are added to the training set, which
is the only one afected by the fake users perturbation.
        </p>
        <p>We focus exclusively on genres in the ML dataset, as
it is the only dataset that contains category information.
Specifically, we select only those categories that represent
more than 5% of the total items in the dataset.</p>
      </sec>
      <sec id="sec-2-4">
        <title>3.5. Evaluation</title>
        <p>
          We only carry out the evaluation on the part of the real
users. To evaluate the performance of the models, we
employ traditional evaluation metrics used for Sequential
Recommendation: Precision, Recall, MAP and NDCG.
Moreover, to investigate the stability of the recommendation
models, we employ the Rank List Sensitivity (RLS) [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]: it
compares two lists of rankings  and , one derived from
the model trained under standard conditions and the other
derived from the model trained with perturbed data.
        </p>
        <p>Given these two rankings, and a similarity function 
between them, we can formalise the RLS measure as
RLS =
| | =1
1
| |
∑︁ sim( ,  )
where  and  represent the -th ranking inside 
and  respectively.</p>
        <p>
          RLS’s similarity measure can be chosen from two possible
options:
• Jaccard Similarity (JAC) [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ] is a normalized
measure of the similarity of the contents of two sets.
A model is stable if its Jaccard score is close to 1.
        </p>
        <p>
          JAC(X, Y) = | ∩  |
| ∪  |
• Finite-Rank-Biased Overlap (FRBO) [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]
measures the similarity of orderings between two
(1)
(2)
rank lists. Higher values indicate that the items in
the two lists are arranged similarly:
1 −  ∑︁ − 1 |[1 : ] ∩  [1 : ]|
1 −  =1 
All metrics are computed “@”, meaning that we use just
the first  recommended items in the output ranking, with
 ∈ {10, 20}.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>3.6. Experimental Setup</title>
        <p>
          All experiments were performed on a single NVIDIA RTX
A6000 with 10752 CUDA cores and 48 GB of RAM. We train
the models for 500 epochs, fixing the batch size to 128 and
by using the Adam optimizer [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] with a lr of 10− 3. To run
our experiments, we use the EasyRec library [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Results</title>
      <p>Our experiments aim to address the following research
questions:
• RQ1: How does the value of standard metrics such
as NDCG change for real users depending on the
type and increasing number of fake users?
• RQ2:How do recommendation lists for real users
difer from those generated without fake users?
• RQ3: Are more or less popular items favoured by
the presence of fake users with certain types of
interactions?
4.1. RQ1: Impact of Fake Users on Standard</p>
      <p>Metrics for Real Users
In Figure 1 the results for all datasets considered are shown
for both models using the standard metrics.</p>
      <p>Regarding the SASRec shown in Figure 1d for the FS-NYC
dataset, we observe that the performance tends to improve
slightly for the unpopular scenario for the NDCG@20
metric, while for the popular and random interaction there is a
gradual but consistent decline in performance. Regarding
genre interactions in the ML-1M dataset, shown in Figure 1a,
all genres appear to positively impact the NDCG metric. A
more detailed analysis using RLS metrics is presented in
Section 4.2.</p>
      <p>In the case of GRU4Rec figs. 1b and 1c, there is a slow but
steady decline in performance for the ML-100k and FS-TKY
datasets, with the decline occurring in a predictable manner
for both metrics considered, as the percentage of fake users
increase.
4.2. RQ2: Analysis of Recommendation Lists</p>
      <p>Generated for Real Users
In Figure 2 we present the RLS metrics for all datasets
considered, comparing the performance of the two models. These
metrics are derived from predictions made by the standard
model - without fake users - and predictions made after
training with fake users.</p>
      <p>When analysing the SASRec model on the ML-100k
dataset (fig. 2a), SASRec shows minimal performance
degradation. Conversely, the FS-TKY dataset gives less favourable
results, with significantly worse performance and a Jaccard
0.10
% of fake users
0.15
0.20
0.10
% of fake users
0.15
0.20
(b) MAP@10 FS-TKY GRU4Rec</p>
      <p>NDCG_@20 vs. Percentage for Different Sampling Methods
0.70
0.69
0.430
0.425
0.420
0.405
0.400
0.395
0.186
0.184
0.178
0.176</p>
      <p>Recal _@10 vs. Percentage for Different Sampling Methods
index close to 0, indicating that the generated lists have
almost no overlap with the original lists (fig. 2b).</p>
      <p>Figures Figures 2c and 2d show the performance on the
ML-100k dataset for genre sampling and the ML-1M dataset
for the other sampling methods. On the ML-1M dataset, the
performance is relatively good, although the Jaccard index
remains low at around 0.35 (fig. 2c). For ML-100k and genre
interactions, the degradation in performance is consistent
across all genres, with the degradation worsening as the
number of fake users increases.</p>
      <p>
        The evaluation metrics for Foursquare show a significant
drop in performance compared to other datasets,
highlighting the limitations of the dataset [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ].
      </p>
      <p>An additional observation is that as the number of fake
users increases, the performance of the model generally
deteriorates. This suggests that while adding more fake users
tends to reduce the efectiveness of the lists generated,
managing a higher number of fake users becomes increasingly
dificult.
4.3. RQ3: Influence of Fake User</p>
      <p>Interactions on Popular and Unpopular
Items
We investigated whether popular and unpopular items were
favoured in recommendation lists by analysing the
percentage of the top 20 items recommended to each user. Our
results show that unpopular items were consistently
underrepresented in these lists. This suggests that more users, a
wider range of items, or consideration of a larger number of
top positions (e.g. top 100 items) may be necessary to gain
a better understanding. On the other hand, in the ML-100k
dataset, the percentage of popular items in the
recommendation lists without any user-specific adjustments is 5.73%.
The introduction of popular users barely afects this
percentage (5.68%), while the inclusion of non-popular users
slightly reduces it to 5.45%.</p>
      <p>These results suggest significant opportunities for future
research, such as focusing on specific categories of items to
either improve or reduce recommendation performance.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusion</title>
      <p>In this work we investigated the impact of fake users on real
users. These fake users can have random interactions,
interact with popular or unpopular items, and are only added to
the training set at diferent percentages of the total dataset.
The results showed that although the standard metrics were
not significantly afected, with random perturbations
causing the most significant degradation in performance, the
output lists generated under these perturbations were
significantly diferent from the standard lists trained without
any perturbations. These diferences, measured using
ranking list sensitivity metrics, in particular Jaccard and FRBO,
showed that in the case of MovieLens about half of the list
elements were shared, whereas in the case of Foursquare
almost no elements were considered. Furthermore, the
proportion of popular and unpopular items in recommendations
for real users was not afected by the presence of fake users.</p>
      <p>
        This study opens up future research directions in a
number of ways. First, it would be valuable to compare the
number of recommended items - categorised as popular,
unpopular and genre-specific - using a standard training
model with those generated by a model trained on fake
users. This comparison could reveal better significant
differences in recommendation patterns. Second, the creation
of a set of fake users could allow to systematically elevate
or downgrade certain categories over time. Third, studying
datasets with shorter interaction sequences, such as those
from Amazon [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ], could provide new insights into user
0.345
0.340
0.52
0.50
0.48
0
2
O@0.46
FBR
0.44
0.42
0.40
0.025
0.050
behaviour and recommendation efectiveness. Finally,
research should focus on building resilient models for these
types of perturbations: the solution could lie in diferent
training strategies[
        <xref ref-type="bibr" rid="ref44">44</xref>
        ], robust loss functions [45, 46], or
Popular
Unpopular
Random
Popular
Unpopular
Random
Action
Adventure
Comedy
Drama
Romance
Thril er
diferent optimisation objectives [47].
pling, in: Proceedings of the 16th ACM Conference
on Recommender Systems, 2022, pp. 81–91.
[45] M. S. Bucarelli, L. Cassano, F. Siciliano, A. Mantrach,
F. Silvestri, Leveraging inter-rater agreement for
classiifcation in the presence of noisy labels, in: Proceedings
of the IEEE/CVF Conference on Computer Vision and
Pattern Recognition, 2023, pp. 3439–3448.
[46] F. A. Wani, M. S. Bucarelli, F. Silvestri, Learning with
noisy labels through learnable weighting and centroid
similarity, in: 2024 International Joint Conference on
Neural Networks (IJCNN), IEEE, 2024, pp. 1–9.
[47] A. Bacciu, F. Siciliano, N. Tonellotto, F. Silvestri,
Integrating item relevance in training loss for sequential
recommender systems, in: Proceedings of the 17th
ACM Conference on Recommender Systems, 2023, pp.
1114–1119.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          ,
          <article-title>Toward the next generation of recommender systems: A survey of the stateof-the-art and possible extensions</article-title>
          ,
          <source>IEEE transactions on knowledge and data engineering 17</source>
          (
          <year>2005</year>
          )
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tay</surname>
          </string-name>
          ,
          <article-title>Deep learning based recommender system: A survey and new perspectives</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>52</volume>
          (
          <year>2019</year>
          ). URL: https://doi.org/10. 1145/3285029. doi:
          <volume>10</volume>
          .1145/3285029.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Quadrana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cremonesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          ,
          <article-title>Sequenceaware recommender systems</article-title>
          ,
          <source>ACM Computing Surveys (CSUR) 51</source>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. Z.</given-names>
            <surname>Sheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Orgun</surname>
          </string-name>
          ,
          <article-title>Sequential recommender systems: challenges, progress and prospects</article-title>
          , arXiv preprint arXiv:
          <year>2001</year>
          .
          <volume>04830</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hwangbo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Cha</surname>
          </string-name>
          ,
          <article-title>Recommendation system development for fashion retail e-commerce</article-title>
          ,
          <source>Electronic Commerce Research and Applications</source>
          <volume>28</volume>
          (
          <year>2018</year>
          )
          <fpage>94</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Afchar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Melchiorre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schedl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hennequin</surname>
          </string-name>
          , E. Epure,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moussallam</surname>
          </string-name>
          ,
          <article-title>Explainability in music recommender systems</article-title>
          ,
          <source>AI</source>
          Magazine
          <volume>43</volume>
          (
          <year>2022</year>
          )
          <fpage>190</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ferrara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Varol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Menczer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Flammini</surname>
          </string-name>
          ,
          <article-title>The rise of social bots</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>59</volume>
          (
          <year>2016</year>
          )
          <fpage>96</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Daniels</surname>
          </string-name>
          ,
          <article-title>Amazon says its stopped 700k counterfeiters from making accounts last year</article-title>
          ,
          <year>2024</year>
          . URL: https://www.modernretail.co/technology/ amazon-says
          <article-title>-its-stopped-700k-counterfeiters-from-making-accounts-las</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mendoza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tesconi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cresci</surname>
          </string-name>
          ,
          <article-title>Bots in social and interaction networks: detection and impact estimation</article-title>
          ,
          <source>ACM Transactions on Information Systems (TOIS) 39</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cresci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Avvenuti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Quattrociocchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tesconi</surname>
          </string-name>
          , Rtbust:
          <article-title>Exploiting temporal patterns for botnet detection on twitter</article-title>
          ,
          <source>in: Proceedings of the 10th ACM conference on web science</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Di</surname>
          </string-name>
          , L. Chen,
          <article-title>Revisiting injective attacks on recommender systems</article-title>
          ,
          <source>Advances in Neural Information Processing Systems</source>
          <volume>35</volume>
          (
          <year>2022</year>
          )
          <fpage>29989</fpage>
          -
          <lpage>30002</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>W.-C. Kang</surname>
            ,
            <given-names>J. McAuley</given-names>
          </string-name>
          ,
          <article-title>Self-attentive sequential recommendation, in: 2018 IEEE international conference on data mining (ICDM)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Hidasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karatzoglou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Baltrunas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tikk</surname>
          </string-name>
          ,
          <article-title>Session-based recommendations with recurrent neural networks</article-title>
          ,
          <year>2016</year>
          . arXiv:
          <volume>1511</volume>
          .
          <fpage>06939</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Harper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Konstan</surname>
          </string-name>
          ,
          <article-title>The movielens datasets: History and context</article-title>
          ,
          <source>ACM Trans. Interact. Intell. Syst</source>
          .
          <volume>5</volume>
          (
          <year>2015</year>
          ). URL: https://doi.org/10.1145/2827872. doi:
          <volume>10</volume>
          . 1145/2827872.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns</article-title>
          ,
          <source>IEEE Transactions on Systems, Man, and Cybernetics: Systems</source>
          <volume>45</volume>
          (
          <year>2014</year>
          )
          <fpage>129</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>J. B. Schafer</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Riedl</surname>
          </string-name>
          ,
          <article-title>E-commerce recommendation applications</article-title>
          ,
          <source>Data Mining and Knowledge Discovery</source>
          <volume>5</volume>
          (
          <year>2001</year>
          )
          <fpage>115</fpage>
          -
          <lpage>153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>I.</given-names>
            <surname>Guy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zwerdling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ronen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Carmel</surname>
          </string-name>
          , E. Uziel,
          <article-title>Social media recommendation based on people and tags</article-title>
          ,
          <source>in: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          , SIGIR '10,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2010</year>
          , p.
          <fpage>194</fpage>
          -
          <lpage>201</lpage>
          . URL: https://doi.org/10.1145/1835449.1835484. doi:
          <volume>10</volume>
          . 1145/1835449.1835484.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Amato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Moscato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Picariello</surname>
          </string-name>
          , G. Sperlí,
          <article-title>Recommendation in social media networks</article-title>
          ,
          <source>in: 2017 IEEE Third International Conference on Multimedia Big Data (BigMM)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schedl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Knees</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>McFee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bogdanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaminskas</surname>
          </string-name>
          ,
          <article-title>Music recommender systems</article-title>
          ,
          <source>Recommender Systems Handbook</source>
          (
          <year>2015</year>
          )
          <fpage>453</fpage>
          -
          <lpage>492</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schedl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zamani</surname>
          </string-name>
          , C.-W. Chen,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deldjoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Elahi</surname>
          </string-name>
          ,
          <article-title>Current challenges and visions in music recommender systems research</article-title>
          ,
          <source>International Journal of Multimedia Information Retrieval</source>
          <volume>7</volume>
          (
          <year>2018</year>
          )
          <fpage>95</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fouss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pirotte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saerens</surname>
          </string-name>
          ,
          <article-title>A novel way of computing similarities between nodes of a graph, with application to collaborative recommendation</article-title>
          ,
          <source>in: The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05)</source>
          , IEEE,
          <year>2005</year>
          , pp.
          <fpage>550</fpage>
          -
          <lpage>556</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fouss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Faulkner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kolp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pirotte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saerens</surname>
          </string-name>
          , et al.,
          <article-title>Web recommendation system based on a markovchainmodel.</article-title>
          ,
          <source>in: ICEIS (4)</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>56</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T.</given-names>
            <surname>Donkers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Loepp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ziegler</surname>
          </string-name>
          ,
          <article-title>Sequential user-based recurrent neural network recommendations</article-title>
          ,
          <source>in: Proceedings of the Eleventh ACM Conference on Recommender Systems</source>
          , RecSys '17,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2017</year>
          , p.
          <fpage>152</fpage>
          -
          <lpage>160</lpage>
          . URL: https://doi.org/10.1145/3109859.3109877. doi:
          <volume>10</volume>
          . 1145/3109859.3109877.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Quadrana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karatzoglou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hidasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cremonesi</surname>
          </string-name>
          ,
          <article-title>Personalizing session-based recommendations with hierarchical recurrent neural networks</article-title>
          ,
          <source>in: Proceedings of the Eleventh ACM Conference on Recommender Systems</source>
          , RecSys '17,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2017</year>
          , p.
          <fpage>130</fpage>
          -
          <lpage>137</lpage>
          . URL: https://doi.org/10.1145/3109859.3109896. doi:
          <volume>10</volume>
          . 1145/3109859.3109896.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaswani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shazeer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Parmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Uszkoreit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Gomez</surname>
          </string-name>
          , Ł. Kaiser,
          <string-name>
            <surname>I. Polosukhin</surname>
          </string-name>
          ,
          <article-title>Attention is all you need</article-title>
          ,
          <source>Advances in neural information processing systems</source>
          <volume>30</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>F.</given-names>
            <surname>Sun</surname>
          </string-name>
          , J. Liu,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Ou</surname>
          </string-name>
          , P. Jiang,
          <article-title>Bert4rec: Sequential recommendation with bidirectional encoder representations from transformer</article-title>
          ,
          <source>in: Proceedings of the 28th ACM international conference on information and knowledge management</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1441</fpage>
          -
          <lpage>1450</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Sequential recommendation with graph neural networks</article-title>
          ,
          <source>in: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          , SIGIR '21,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2021</year>
          , p.
          <fpage>378</fpage>
          -
          <lpage>387</lpage>
          . URL: https://doi.org/10.1145/3404835. 3462968. doi:
          <volume>10</volume>
          .1145/3404835.3462968.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Continuous-time sequential recommendation with temporal graph collaborative transformer</article-title>
          ,
          <source>in: Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management, CIKM '21</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2021</year>
          , p.
          <fpage>433</fpage>
          -
          <lpage>442</lpage>
          . URL: https://doi.org/10.1145/ 3459637.3482242. doi:
          <volume>10</volume>
          .1145/3459637.3482242.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <article-title>Graph neural networks in recommender systems: a survey</article-title>
          ,
          <source>ACM Computing Surveys</source>
          <volume>55</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Purificato</surname>
          </string-name>
          , G. Cassarà,
          <string-name>
            <given-names>P.</given-names>
            <surname>Liò</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <article-title>Sheaf neural networks for graph-based recommender systems</article-title>
          ,
          <source>arXiv preprint arXiv:2304.09097</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A.</given-names>
            <surname>Purificato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <article-title>Eco-aware graph neural networks for sustainable recommendations</article-title>
          ,
          <source>arXiv preprint arXiv:2410.09514</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>F.</given-names>
            <surname>Betello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Siciliano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <article-title>Investigating the robustness of sequential recommender systems against training data perturbations</article-title>
          ,
          <source>in: European Conference on Information Retrieval</source>
          , Springer,
          <year>2024</year>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>220</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Oh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ustun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>McAuley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Rank list sensitivity of recommender systems to interaction perturbations</article-title>
          ,
          <source>in: Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management, CIKM '22</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2022</year>
          , p.
          <fpage>1584</fpage>
          -
          <lpage>1594</lpage>
          . URL: https://doi.org/10.1145/3511808.3557425. doi:
          <volume>10</volume>
          . 1145/3511808.3557425.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Z.</given-names>
            <surname>Gong</surname>
          </string-name>
          ,
          <article-title>Poisoning federated recommender systems with fake users</article-title>
          ,
          <source>in: Proceedings of the ACM on Web Conference</source>
          <year>2024</year>
          ,
          <year>2024</year>
          , pp.
          <fpage>3555</fpage>
          -
          <lpage>3565</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>G.</given-names>
            <surname>Trappolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Maiorca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Severino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Rodolà</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          , G. Tolomei,
          <article-title>Sparse vicious attacks on graph neural networks</article-title>
          ,
          <source>IEEE Transactions on Artificial Intelligence</source>
          <volume>5</volume>
          (
          <year>2024</year>
          )
          <fpage>2293</fpage>
          -
          <lpage>2303</lpage>
          . doi:
          <volume>10</volume>
          .1109/TAI.
          <year>2023</year>
          .
          <volume>3319306</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , G. Tolomei,
          <article-title>The dark side of explanations: Poisoning recommender systems with counterfactual examples</article-title>
          ,
          <source>in: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          , SIGIR '23,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2023</year>
          , p.
          <fpage>2426</fpage>
          -
          <lpage>2430</lpage>
          . URL: https://doi.org/10.1145/3539618.3592070. doi:
          <volume>10</volume>
          . 1145/3539618.3592070.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          , Clusterpoison:
          <article-title>Poisoning attacks on recommender systems with limited fake users</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>K.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Merrienboer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gulcehre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bahdanau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bougares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Schwenk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bengio</surname>
          </string-name>
          ,
          <article-title>Learning phrase representations using rnn encoder-decoder for statistical machine translation</article-title>
          ,
          <year>2014</year>
          . arXiv:
          <volume>1406</volume>
          .
          <fpage>1078</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>P.</given-names>
            <surname>Jaccard</surname>
          </string-name>
          ,
          <article-title>The distribution of the flora in the alpine zone. 1, New Phytologist 11 (</article-title>
          <year>1912</year>
          )
          <fpage>37</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Kingma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ba</surname>
          </string-name>
          ,
          <article-title>Adam: A method for stochastic optimization</article-title>
          ,
          <year>2017</year>
          . arXiv:
          <volume>1412</volume>
          .
          <fpage>6980</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>F.</given-names>
            <surname>Betello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Purificato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Siciliano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Trappolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bacciu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tonellotto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silvestri</surname>
          </string-name>
          ,
          <article-title>A reproducible analysis of sequential recommender systems</article-title>
          , IEEE Access (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>A.</given-names>
            <surname>Klenitskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Volodkevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pembek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vasilev</surname>
          </string-name>
          ,
          <article-title>Does it look sequential? an analysis of datasets for evaluation of sequential recommendations</article-title>
          ,
          <source>arXiv preprint arXiv:2408.12008</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. McAuley</surname>
          </string-name>
          ,
          <article-title>Bridging language and items for retrieval and recommendation</article-title>
          ,
          <source>arXiv preprint arXiv:2403.03952</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>A.</given-names>
            <surname>Petrov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Macdonald</surname>
          </string-name>
          ,
          <article-title>Efective and eficient training for sequential recommendation using recency sam-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>