[1]
M. Zeng, K. Li, B. Jiang, L. Cao, and H. Li, “Practical Cross-System Shilling Attacks with Limited Access to Data”, AAAI, vol. 37, no. 4, pp. 4864-4874, Jun. 2023.