Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, N Quoc Viet hung, TT Nguyen… - ACM Computing …, 2024 - dl.acm.org
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …

Filter-enhanced MLP is all you need for sequential recommendation

K Zhou, H Yu, WX Zhao, JR Wen - … of the ACM web conference 2022, 2022 - dl.acm.org
Recently, deep neural networks such as RNN, CNN and Transformer have been applied in
the task of sequential recommendation, which aims to capture the dynamic preference …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2024 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

FedAttack: Effective and covert poisoning attack on federated recommendation via hard sampling

C Wu, F Wu, T Qi, Y Huang, X Xie - … of the 28th ACM SIGKDD Conference …, 2022 - dl.acm.org
Federated learning (FL) is a feasible technique to learn personalized recommendation
models from decentralized user data. Unfortunately, federated recommender systems are …

Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks

W Qian, C Zhao, W Le, M Ma, M Huai - Proceedings of the 29th ACM …, 2023 - dl.acm.org
Given the availability of abundant data, deep learning models have been advanced and
become ubiquitous in the past decade. In practice, due to many different reasons (eg …

Poisoning attacks against recommender systems: A survey

Z Wang, M Gao, J Yu, H Ma, H Yin, S Sadiq - arXiv preprint arXiv …, 2024 - arxiv.org
Modern recommender systems have seen substantial success, yet they remain vulnerable to
malicious activities, notably poisoning attacks. These attacks involve injecting malicious data …

Shilling black-box recommender systems by learning to generate fake user profiles

C Lin, S Chen, M Zeng, S Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the pivotal role of recommender systems (RS) in guiding customers toward the
purchase, there is a natural motivation for unscrupulous parties to spoof RS for profits. In this …

Adversarial recommender systems: Attack, defense, and advances

VW Anelli, Y Deldjoo, T DiNoia, FA Merra - Recommender systems …, 2021 - Springer
Adversarial machine learning is the research field investigating vulnerabilities inherent to
machine learning systems' design and ways to defend against them. Recently …

Single-user injection for invisible shilling attack against recommender systems

C Huang, H Li - Proceedings of the 32nd ACM International …, 2023 - dl.acm.org
Recommendation systems (RS) are crucial for alleviating the information overload problem.
Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to …

Adversarial graph perturbations for recommendations at scale

H Chen, K Zhou, KH Lai, X Hu, F Wang… - Proceedings of the 45th …, 2022 - dl.acm.org
Graph Neural Networks (GNNs) provide a class of powerful architectures that are effective
for graph-based collaborative filtering. Nevertheless, GNNs are known to be vulnerable to …