Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, N Quoc Viet Hung, TT Nguyen… - ACM Computing …, 2024 - dl.acm.org
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …

Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication

J Peng, H Xing, L Xu, S Luo, P Dai… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Multi-user semantic communication (MUSC) has emerged as a promising paradigm for
future 6G networks and applications, where massive clients (eg, mobile devices) …

ToDA: Target-oriented Diffusion Attacker against Recommendation System

X Liu, Z Tao, T Jiang, H Chang, Y Ma, Y Wei… - arXiv preprint arXiv …, 2024 - arxiv.org
Recommendation systems (RS) have become indispensable tools for web services to
address information overload, thus enhancing user experiences and bolstering platforms' …

HidAttack: An Effective and Undetectable Model Poisoning Attack to Federated Recommenders

W Ali, K Umer, X Zhou, J Shao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Privacy concerns in recommender systems are potentially addressed due to constitutional
and commercial requirements. Centralized recommendation models are susceptible to …

A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security

Q Zhang, P Yang, J Yu, H Wang, X He, SM Yiu… - arXiv preprint arXiv …, 2024 - arxiv.org
The widespread adoption of smartphones and Location-Based Social Networks has led to a
massive influx of spatio-temporal data, creating unparalleled opportunities for enhancing …

ReOP: Generating Transferable Fake Users for Recommendation Systems via Reverse Optimization

F Qian, Y Cui, H Chen, W Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent research has demonstrated that recommendation systems exhibit vulnerability under
data poisoning attacks. The primary process of data poisoning attacks involves generating …

Advancements in Recommender Systems: A Comprehensive Analysis Based on Data, Algorithms, and Evaluation

X Ma, M Li, X Liu - arXiv preprint arXiv:2407.18937, 2024 - arxiv.org
Using 286 research papers collected from Web of Science, ScienceDirect, SpringerLink,
arXiv, and Google Scholar databases, a systematic review methodology was adopted to …

Data poisoning attacks detection based on the convergence of the Peter and Clark algorithm and Bayesian adversarial federated learning

E Alsuwat - Journal of Electronic Imaging, 2023 - spiedigitallibrary.org
Effective Bayesian network structure learning algorithms, such as the Peter and Clark (PC)
algorithm, must be designed and used with data integrity as a top priority. Deep learning …

Protecting Recommendations: Combating BIAS and Manipulation in Recommendation

PA Infant, PM Kumar, GR Jainish - … on I-SMAC (IoT in Social …, 2024 - ieeexplore.ieee.org
Recommender systems assist consumers in navigating the deluge of information by helping
them find services and goods. The effectiveness of recommender systems has been …

[引用][C] Attacchi Avversari di Avvelenamento dei Dati contro Sistemi di Recommendation Next-Item

G Tocco