|
2025 Journal Article FELLAS: enhancing federated sequential recommendation with LLM as external servicesYuan, Wei, Yang, Chaoqun, Ye, Guanhua, Chen, Tong, Hung, Nguyen Quoc Viet and Yin, Hongzhi (2025). FELLAS: enhancing federated sequential recommendation with LLM as external services. ACM Transactions on Information Systems, 43 (6) 144, 1-24. doi: 10.1145/3709138 |
|
2025 Journal Article Lightweight Embeddings with Graph Rewiring for Collaborative FilteringLiang, Xurong, Chen, Tong, Yuan, Wei and Yin, Hongzhi (2025). Lightweight Embeddings with Graph Rewiring for Collaborative Filtering. ACM Transactions on Information Systems, 43 (4) 108, 1-29. doi: 10.1145/3742424 |
|
2025 Journal Article Robust federated contrastive recommender system against targeted model poisoning attackYuan, Wei, Yang, Chaoqun, Qu, Liang, Ye, Guanhua, Nguyen, Quoc Viet Hung and Yin, Hongzhi (2025). Robust federated contrastive recommender system against targeted model poisoning attack. Science China Information Sciences, 68 (4) 140103, 4. doi: 10.1007/s11432-024-4272-y |
|
2025 Journal Article PTF-FSR: a parameter transmission-free federated sequential recommender systemYuan, Wei, Yang, Chaoqun, Qu, Liang, Hung, Nguyen Quoc Viet, Ye, Guanhua and Yin, Hongzhi (2025). PTF-FSR: a parameter transmission-free federated sequential recommender system. ACM Transactions on Information Systems, 43 (2) 52, 1-24. doi: 10.1145/3708344 |
|
2024 Journal Article Adversarial item promotion on visually-aware recommender systems by guided diffusionChen, Lijian, Yuan, Wei, Chen, Tong, Ye, Guanhua, Hung, Nguyen Quoc Viet and Yin, Hongzhi (2024). Adversarial item promotion on visually-aware recommender systems by guided diffusion. ACM Transactions on Information Systems, 42 (6) 156, 1-26. doi: 10.1145/3666088 |
|
2023 Journal Article Manipulating visually-aware federated recommender systems and its countermeasuresYuan, Wei, Yuan, Shilong, Yang, Chaoqun, Nguyen, Quoc Viet Hung and Yin, Hongzhi (2023). Manipulating visually-aware federated recommender systems and its countermeasures. ACM Transactions on Information Systems, 42 (3) 64, 1-26. doi: 10.1145/3630005 |