Picture for Junliang Yu

Junliang Yu

Prompt-Unknown Promotion Attacks against LLM-based Sequential Recommender Systems

Add code
Apr 26, 2026
Viaarxiv icon

Self-Distilled Reinforcement Learning for Co-Evolving Agentic Recommender Systems

Add code
Apr 11, 2026
Viaarxiv icon

PAMAS: Self-Adaptive Multi-Agent System with Perspective Aggregation for Misinformation Detection

Add code
Feb 03, 2026
Viaarxiv icon

When Agents See Humans as the Outgroup: Belief-Dependent Bias in LLM-Powered Agents

Add code
Jan 06, 2026
Viaarxiv icon

Ahead of the Spread: Agent-Driven Virtual Propagation for Early Fake News Detection

Add code
Jan 06, 2026
Viaarxiv icon

When Graph Contrastive Learning Backfires: Spectral Vulnerability and Defense in Recommendation

Add code
Jul 10, 2025
Viaarxiv icon

Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation

Add code
Apr 09, 2025
Figure 1 for Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation
Figure 2 for Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation
Figure 3 for Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation
Figure 4 for Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation
Viaarxiv icon

RuleAgent: Discovering Rules for Recommendation Denoising with Autonomous Language Agents

Add code
Mar 30, 2025
Viaarxiv icon

A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security

Add code
Oct 03, 2024
Figure 1 for A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security
Figure 2 for A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security
Figure 3 for A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security
Figure 4 for A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security
Viaarxiv icon

LLM-Powered Text Simulation Attack Against ID-Free Recommender Systems

Add code
Sep 19, 2024
Figure 1 for LLM-Powered Text Simulation Attack Against ID-Free Recommender Systems
Figure 2 for LLM-Powered Text Simulation Attack Against ID-Free Recommender Systems
Figure 3 for LLM-Powered Text Simulation Attack Against ID-Free Recommender Systems
Figure 4 for LLM-Powered Text Simulation Attack Against ID-Free Recommender Systems
Viaarxiv icon