Manipulating recommender systems: A survey of poisoning attacks and countermeasures
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …
help users locate specific information in a sea of data. However, existing studies show that …
Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication
Multi-user semantic communication (MUSC) has emerged as a promising paradigm for
future 6G networks and applications, where massive clients (eg, mobile devices) …
future 6G networks and applications, where massive clients (eg, mobile devices) …
ToDA: Target-oriented Diffusion Attacker against Recommendation System
Recommendation systems (RS) have become indispensable tools for web services to
address information overload, thus enhancing user experiences and bolstering platforms' …
address information overload, thus enhancing user experiences and bolstering platforms' …
HidAttack: An Effective and Undetectable Model Poisoning Attack to Federated Recommenders
Privacy concerns in recommender systems are potentially addressed due to constitutional
and commercial requirements. Centralized recommendation models are susceptible to …
and commercial requirements. Centralized recommendation models are susceptible to …
A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security
The widespread adoption of smartphones and Location-Based Social Networks has led to a
massive influx of spatio-temporal data, creating unparalleled opportunities for enhancing …
massive influx of spatio-temporal data, creating unparalleled opportunities for enhancing …
ReOP: Generating Transferable Fake Users for Recommendation Systems via Reverse Optimization
F Qian, Y Cui, H Chen, W Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent research has demonstrated that recommendation systems exhibit vulnerability under
data poisoning attacks. The primary process of data poisoning attacks involves generating …
data poisoning attacks. The primary process of data poisoning attacks involves generating …
Advancements in Recommender Systems: A Comprehensive Analysis Based on Data, Algorithms, and Evaluation
X Ma, M Li, X Liu - arXiv preprint arXiv:2407.18937, 2024 - arxiv.org
Using 286 research papers collected from Web of Science, ScienceDirect, SpringerLink,
arXiv, and Google Scholar databases, a systematic review methodology was adopted to …
arXiv, and Google Scholar databases, a systematic review methodology was adopted to …
Data poisoning attacks detection based on the convergence of the Peter and Clark algorithm and Bayesian adversarial federated learning
E Alsuwat - Journal of Electronic Imaging, 2023 - spiedigitallibrary.org
Effective Bayesian network structure learning algorithms, such as the Peter and Clark (PC)
algorithm, must be designed and used with data integrity as a top priority. Deep learning …
algorithm, must be designed and used with data integrity as a top priority. Deep learning …
Protecting Recommendations: Combating BIAS and Manipulation in Recommendation
PA Infant, PM Kumar, GR Jainish - … on I-SMAC (IoT in Social …, 2024 - ieeexplore.ieee.org
Recommender systems assist consumers in navigating the deluge of information by helping
them find services and goods. The effectiveness of recommender systems has been …
them find services and goods. The effectiveness of recommender systems has been …
[引用][C] Attacchi Avversari di Avvelenamento dei Dati contro Sistemi di Recommendation Next-Item
G Tocco