no code implementations • 22 Nov 2019 • Ghazaleh Beigi, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, Huan Liu
The attacker seeks to infer users' private-attribute information according to their items list and recommendations.