Fairness in recommendation: Foundations, methods, and applications

Y Li, H Chen, S Xu, Y Ge, J Tan, S Liu… - ACM Transactions on …, 2023 - dl.acm.org
As one of the most pervasive applications of machine learning, recommender systems are
playing an important role on assisting human decision-making. The satisfaction of users and …

Task-agnostic detector for insertion-based backdoor attacks

W Lyu, X Lin, S Zheng, L Pang, H Ling, S Jha… - arxiv preprint arxiv …, 2024 - arxiv.org
Textual backdoor attacks pose significant security threats. Current detection approaches,
typically relying on intermediate feature representation or reconstructing potential triggers …

Fairness and diversity in recommender systems: a survey

Y Zhao, Y Wang, Y Liu, X Cheng… - ACM Transactions on …, 2025 - dl.acm.org
Recommender systems (RS) are effective tools for mitigating information overload and have
seen extensive applications across various domains. However, the single focus on utility …

Please tell me more: Privacy impact of explainability through the lens of membership inference attack

H Liu, Y Wu, Z Yu, N Zhang - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Explainability is increasingly recognized as an enabling technology for the broader adoption
of machine learning (ML), particularly for safety-critical applications. This has given rise to …

Deconfounded causal collaborative filtering

S Xu, J Tan, S Heinecke, VJ Li, Y Zhang - ACM Transactions on …, 2023 - dl.acm.org
Recommender systems may be confounded by various types of confounding factors (also
called confounders) that may lead to inaccurate recommendations and sacrificed …

Causal collaborative filtering

S Xu, Y Ge, Y Li, Z Fu, X Chen, Y Zhang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Many of the traditional recommendation algorithms are designed based on the fundamental
idea of mining or learning correlative patterns from data to estimate the user-item correlative …

Model extraction attacks revisited

J Liang, R Pang, C Li, T Wang - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Model extraction (ME) attacks represent one major threat to Machine-Learning-as-a-Service
(MLaaS) platforms by" stealing" the functionality of confidential machine-learning models …

Bottrinet: A unified and efficient embedding for social bots detection via metric learning

J Wu, X Ye, Y Man - … on Digital Forensics and Security (ISDFS), 2023 - ieeexplore.ieee.org
The rapid and accurate identification of bot accounts in online social networks is an ongoing
challenge. In this paper, we propose BotTriNet, a unified embedding framework that …

Diversifying Sequential Recommendation with Retrospective and Prospective Transformers

C Shi, P Ren, D Fu, X **n, S Yang, F Cai… - ACM Transactions on …, 2024 - dl.acm.org
Previous studies on sequential recommendation (SR) have predominantly concentrated on
optimizing recommendation accuracy. However, there remains a significant gap in …

[HTML][HTML] A survey on recommendation methods based on social relationships

R Chen, K Pang, M Huang, H Liang, S Zhang, L Zhang… - Electronics, 2023 - mdpi.com
With the rapid development of online social networks recently, more and more online users
have participated in social network activities and rich social relationships are formed …