{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:19:58Z","timestamp":1771960798768,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Hybrid Intelligence Center"},{"name":"the National Key R&D Program of China","award":["2020YFB1406704"],"award-info":[{"award-number":["2020YFB1406704"]}]},{"name":"the Natural Science Foundation of Shandong Province","award":["ZR2021QF129"],"award-info":[{"award-number":["ZR2021QF129"]}]},{"name":"the Key Scientific and Technological Innovation Program of Shandong Province","award":["2019JZZY010129"],"award-info":[{"award-number":["2019JZZY010129"]}]},{"name":"a 10-year program funded by the Dutch Ministry of Education, Culture and Science through the Netherlands Organisation for Scientific Research"},{"name":"Meituan"},{"name":"the Natural Science Foundation of China","award":["61902219, 61972234, 62072279, 62102234"],"award-info":[{"award-number":["61902219, 61972234, 62072279, 62102234"]}]},{"name":"Shandong University multidisciplinary research and innovation team of young scholars","award":["2020QNQT017"],"award-info":[{"award-number":["2020QNQT017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539392","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"1959-1968","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Debiasing Learning for Membership Inference Attacks Against Recommender Systems"],"prefix":"10.1145","author":[{"given":"Zihan","family":"Wang","sequence":"first","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Na","family":"Huang","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Fei","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"given":"Pengjie","family":"Ren","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Zhumin","family":"Chen","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Hengliang","family":"Luo","sequence":"additional","affiliation":[{"name":"Meituan, Beijing, China"}]},{"given":"Maarten","family":"de Rijke","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"given":"Zhaochun","family":"Ren","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Abolfazl Asudeh H. V. Jagadish Julia Stoyanovich and Gautam Das. 2019. Designing Fair Ranking Schemes. In SIGMOD. 1259--1276.","DOI":"10.1145\/3299869.3300079"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Pascal Berrang Mathias Humbert and Praveen Manoharan. 2016. Membership Privacy in MicroRNA-based Studies. In CCS. 319--330.","DOI":"10.1145\/2976749.2978355"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Ghazaleh Beigi Ahmadreza Mosallanezhad Ruocheng Guo Hamidreza Alvari Alexander Nou and Huan Liu. 2020. Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning. In WSDM. 34--42.","DOI":"10.1145\/3336191.3371832"},{"key":"e_1_3_2_2_4_1","unstructured":"Nicholas Carlini Chang Liu \u00dalfar Erlingsson Jernej Kos and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In USENIX. 267--284."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Dingfan Chen Ning Yu Yang Zhang and Mario Fritz. 2020 b. GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models. In CCS. 343--362.","DOI":"10.1145\/3372297.3417238"},{"key":"e_1_3_2_2_6_1","volume-title":"2020 a. Bias and Debias in Recommender System: A Survey and Future Directions. CoRR","author":"Chen Jiawei","year":"2020","unstructured":"Jiawei Chen, Hande Dong, Xiang Wang, Fuli Feng, Meng Wang, and Xiangnan He. 2020 a. Bias and Debias in Recommender System: A Survey and Future Directions. CoRR, Vol. abs\/2010.03240 (2020)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Mingda Chen Qingming Tang Karen Livescu and Kevin Gimpel. 2018. Variational Sequential Labelers for Semi-Supervised Learning. In EMNLP. 215--226.","DOI":"10.18653\/v1\/D18-1020"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Mingda Chen Qingming Tang Sam Wiseman and Kevin Gimpel. 2019. A Multi-Task Approach for Disentangling Syntax and Semantics in Sentence Representations. In NAACL-HLT. 2453--2464.","DOI":"10.18653\/v1\/N19-1254"},{"key":"e_1_3_2_2_9_1","first-page":"1964","article-title":"Label-Only Membership Inference Attacks","volume":"139","author":"Choquette-Choo Christopher A.","year":"2021","unstructured":"Christopher A. Choquette-Choo, Florian Tram\u00e8 r, Nicholas Carlini, and Nicolas Papernot. 2021. Label-Only Membership Inference Attacks. In ICML, Vol. 139. 1964--1974.","journal-title":"ICML"},{"key":"e_1_3_2_2_10_1","unstructured":"Sanghyeok Chu Dongwan Kim and Bohyung Han. 2021. Learning Debiased and Disentangled Representations for Semantic Segmentation. In NeurIPS. 8355--8366."},{"key":"e_1_3_2_2_11_1","volume-title":"Thomas Kipf, and Jakub M. Tomczak.","author":"Davidson Tim R.","year":"2018","unstructured":"Tim R. Davidson, Luca Falorsi, Nicola De Cao, Thomas Kipf, and Jakub M. Tomczak. 2018. Hyperspherical Variational Auto-Encoders. In UAI. 856--865."},{"key":"e_1_3_2_2_12_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT. 4171--4186.","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT. 4171--4186."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Inken Hagestedt Yang Zhang Mathias Humbert Pascal Berrang Haixu Tang XiaoFeng Wang and Michael Backes. 2019. MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. In NDSS.","DOI":"10.14722\/ndss.2019.23064"},{"key":"e_1_3_2_2_14_1","article-title":"The MovieLens Datasets","volume":"5","author":"Maxwell Harper F.","year":"2016","unstructured":"F. Maxwell Harper and Joseph A. Konstan. 2016. The MovieLens Datasets: History and Context. ACM Trans. Interact. Intell. Syst., Vol. 5, 4 (2016), 19:1--19:19.","journal-title":"History and Context. ACM Trans. Interact. Intell. Syst."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Xiangnan He Lizi Liao Hanwang Zhang Liqiang Nie Xia Hu and Tat-Seng Chua. 2017. Neural collaborative filtering. In WWW. 173--182.","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_2_16_1","unstructured":"Bal\u00e1zs Hidasi Alexandros Karatzoglou Linas Baltrunas and Domonkos Tikk. 2016. Session-based Recommendations with Recurrent Neural Networks. In ICLR."},{"key":"e_1_3_2_2_17_1","unstructured":"Irina Higgins Lo\u00efc Matthey Arka Pal Christopher Burgess Xavier Glorot Matthew Botvinick Shakir Mohamed and Alexander Lerchner. 2017. beta-VAE: Learning Basic Visual Concepts with a Constrained Variational Framework. In ICLR."},{"key":"e_1_3_2_2_18_1","volume-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS genetics","author":"Homer Nils","year":"2008","unstructured":"Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V Pearson, Dietrich A Stephan, Stanley F Nelson, and David W Craig. 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS genetics., Vol. 4, 8 (2008), e1000167."},{"key":"e_1_3_2_2_19_1","unstructured":"Jinyuan Jia Ahmed Salem Michael Backes Yang Zhang and Neil Zhenqiang Gong. 2019. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. In CCS. 259--274."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Santosh Kabbur Xia Ning and George Karypis. 2013. FISM: factored item similarity models for top-N recommender systems. In KDD. 659--667.","DOI":"10.1145\/2487575.2487589"},{"key":"e_1_3_2_2_21_1","volume-title":"McAuley","author":"Kang Wang-Cheng","year":"2017","unstructured":"Wang-Cheng Kang, Chen Fang, Zhaowen Wang, and Julian J. McAuley. 2017. Visually-Aware Fashion Recommendation and Design with Generative Image Models. In ICDM. 207--216."},{"key":"e_1_3_2_2_22_1","volume-title":"McAuley","author":"Kang Wang-Cheng","year":"2018","unstructured":"Wang-Cheng Kang and Julian J. McAuley. 2018. Self-Attentive Sequential Recommendation. In ICDM. 197--206."},{"key":"e_1_3_2_2_23_1","unstructured":"Dong Hyun Kim Chanyoung Park Jinoh Oh Sungyoung Lee and Hwanjo Yu. 2016. Convolutional Matrix Factorization for Document Context-Aware Recommendation. In RecSys. 233--240."},{"key":"e_1_3_2_2_24_1","first-page":"2654","article-title":"Disentangling by Factorising","volume":"80","author":"Kim Hyunjik","year":"2018","unstructured":"Hyunjik Kim and Andriy Mnih. 2018. Disentangling by Factorising. In ICML, Vol. 80. 2654--2663.","journal-title":"ICML"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Yehuda Koren. 2008. Factorization meets the neighborhood: a multifaceted collaborative filtering model. In KDD. 426--434.","DOI":"10.1145\/1401890.1401944"},{"key":"e_1_3_2_2_26_1","volume-title":"Bell","author":"Koren Yehuda","year":"2015","unstructured":"Yehuda Koren and Robert M. Bell. 2015. Advances in Collaborative Filtering. In Recommender Systems Handbook. 77--118."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_2_28_1","unstructured":"Matt J. Kusner Joshua R. Loftus Chris Russell and Ricardo Silva. 2017. Counterfactual Fairness. In NeurIPS. 4066--4076."},{"key":"e_1_3_2_2_29_1","unstructured":"Zheng Li and Yang Zhang. 2021. Membership Leakage in Label-Only Exposures. In CCS. 880--895."},{"key":"e_1_3_2_2_30_1","volume-title":"RecSys","volume":"2440","author":"Lin Kun","year":"2019","unstructured":"Kun Lin, Nasim Sonboli, Bamshad Mobasher, and Robin Burke. 2019. Crank up the Volume: Preference Bias Amplification in Collaborative Recommendation. In RecSys, Vol. 2440."},{"key":"e_1_3_2_2_31_1","first-page":"76","article-title":"Amazon.com Recommendations","volume":"7","author":"Linden Greg","year":"2003","unstructured":"Greg Linden, Brent Smith, and Jeremy York. 2003. Amazon.com Recommendations: Item-to-Item Collaborative Filtering. IEEE Internet Comput., Vol. 7, 1 (2003), 76--80.","journal-title":"Item-to-Item Collaborative Filtering. IEEE Internet Comput."},{"key":"e_1_3_2_2_32_1","unstructured":"Benjamin M. Marlin Richard S. Zemel Sam T. Roweis and Malcolm Slaney. 2007. Collaborative Filtering and the Missing at Random Assumption. In UAI. 267--275."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Julian J. McAuley Christopher Targett Qinfeng Shi and Anton van den Hengel. 2015. Image-Based Recommendations on Styles and Substitutes. In SIGIR. 43--52.","DOI":"10.1145\/2766462.2767755"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine Learning with Membership Privacy using Adversarial Regularization. In CCS. 634--646.","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. In SP. 1021--1035.","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Huseyin Polat and Wenliang Du. 2005. SVD-based collaborative filtering with privacy. In SAC. 791--795.","DOI":"10.1145\/1066677.1066860"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2018. Knock Knock Who's There? Membership Inference on Aggregate Location Data. In NDSS.","DOI":"10.14722\/ndss.2018.23183"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Chen Qian Fuli Feng Lijie Wen and Tat-Seng Chua. 2021. Conceptualized and Contextualized Gaussian Embedding. In AAAI. 13683--13691.","DOI":"10.1609\/aaai.v35i15.17613"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Steffen Rendle Christoph Freudenthaler and Lars Schmidt-Thieme. 2010. Factorizing personalized Markov chains for next-basket recommendation. In WWW. 811--820.","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Yuta Saito. 2020. Asymmetric Tri-training for Debiasing Missing-Not-At-Random Explicit Feedback. In SIGIR. 309--318.","DOI":"10.1145\/3397271.3401114"},{"key":"e_1_3_2_2_41_1","unstructured":"Ruslan Salakhutdinov and Andriy Mnih. 2007. Probabilistic Matrix Factorization. In NeurIPS. 1257--1264."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Ahmed Salem Yang Zhang Mathias Humbert Pascal Berrang Mario Fritz and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In NDSS.","DOI":"10.14722\/ndss.2019.23119"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Badrul Munir Sarwar George Karypis Joseph A. Konstan and John Riedl. 2001. Item-based collaborative filtering recommendation algorithms. In WWW. 285--295.","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_2_44_1","first-page":"1670","article-title":"Recommendations as Treatments: Debiasing Learning and Evaluation","volume":"48","author":"Schnabel Tobias","year":"2016","unstructured":"Tobias Schnabel, Adith Swaminathan, Ashudeep Singh, Navin Chandak, and Thorsten Joachims. 2016. Recommendations as Treatments: Debiasing Learning and Evaluation. In ICML, Vol. 48. 1670--1679.","journal-title":"ICML"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742726"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Reza Shokri Marco Stronati Congzheng Song and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In SP. 3--18.","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Harald Steck. 2010. Training and testing of recommender systems on data missing not at random. In KDD. 713--722.","DOI":"10.1145\/1835804.1835895"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Fei Sun Jun Liu Jian Wu Changhua Pei Xiao Lin Wenwu Ou and Peng Jiang. 2019. BERT4Rec: Sequential Recommendation with Bidirectional Encoder Representations from Transformer. In CIKM. 1441--1450.","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Jiaxi Tang and Ke Wang. 2018. Personalized Top-N Sequential Recommendation via Convolutional Sequence Embedding. In WSDM. 565--573.","DOI":"10.1145\/3159652.3159656"},{"key":"e_1_3_2_2_50_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. J. Mach. Learn. Res., Vol. 9, 86 (2008), 2579--2605.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Xiaojie Wang Rui Zhang Yu Sun and Jianzhong Qi. 2021. Combating Selection Biases in Recommender Systems with a Few Unbiased Ratings. In WSDM. 427--435.","DOI":"10.1145\/3437963.3441799"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Samuel Yeom Irene Giacomelli Matt Fredrikson and Somesh Jha. 2018. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting. In CSF. 268--282.","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Minxing Zhang Zhaochun Ren Zihan Wang Pengjie Ren Zhumin Chen Pengfei Hu and Yang Zhang. 2021. Membership Inference Attacks Against Recommender Systems. In CCS. 864--879.","DOI":"10.1145\/3460120.3484770"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Chunting Zhou and Graham Neubig. 2017. Multi-space Variational Encoder-Decoders for Semi-supervised Labeled Sequence Transduction. In ACL. 310--320.","DOI":"10.18653\/v1\/P17-1029"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Guorui Zhou Na Mou Ying Fan Qi Pi Weijie Bian Chang Zhou Xiaoqiang Zhu and Kun Gai. 2019. Deep Interest Evolution Network for Click-Through Rate Prediction. In AAAI. 5941--5948.","DOI":"10.1609\/aaai.v33i01.33015941"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:48Z","timestamp":1750186968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":55,"alternative-id":["10.1145\/3534678.3539392","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539392","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}