Manipulating recommender systems: A survey of poisoning attacks and countermeasures
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …
help users locate specific information in a sea of data. However, existing studies show that …
Filter-enhanced MLP is all you need for sequential recommendation
Recently, deep neural networks such as RNN, CNN and Transformer have been applied in
the task of sequential recommendation, which aims to capture the dynamic preference …
the task of sequential recommendation, which aims to capture the dynamic preference …
A survey on trustworthy recommender systems
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …
deployed in almost every corner of the web and facilitate the human decision-making …
FedAttack: Effective and covert poisoning attack on federated recommendation via hard sampling
Federated learning (FL) is a feasible technique to learn personalized recommendation
models from decentralized user data. Unfortunately, federated recommender systems are …
models from decentralized user data. Unfortunately, federated recommender systems are …
Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks
Given the availability of abundant data, deep learning models have been advanced and
become ubiquitous in the past decade. In practice, due to many different reasons (eg …
become ubiquitous in the past decade. In practice, due to many different reasons (eg …
Poisoning attacks against recommender systems: A survey
Modern recommender systems have seen substantial success, yet they remain vulnerable to
malicious activities, notably poisoning attacks. These attacks involve injecting malicious data …
malicious activities, notably poisoning attacks. These attacks involve injecting malicious data …
Shilling black-box recommender systems by learning to generate fake user profiles
C Lin, S Chen, M Zeng, S Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the pivotal role of recommender systems (RS) in guiding customers toward the
purchase, there is a natural motivation for unscrupulous parties to spoof RS for profits. In this …
purchase, there is a natural motivation for unscrupulous parties to spoof RS for profits. In this …
Adversarial recommender systems: Attack, defense, and advances
Adversarial machine learning is the research field investigating vulnerabilities inherent to
machine learning systems' design and ways to defend against them. Recently …
machine learning systems' design and ways to defend against them. Recently …
Single-user injection for invisible shilling attack against recommender systems
C Huang, H Li - Proceedings of the 32nd ACM International …, 2023 - dl.acm.org
Recommendation systems (RS) are crucial for alleviating the information overload problem.
Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to …
Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to …
Adversarial graph perturbations for recommendations at scale
Graph Neural Networks (GNNs) provide a class of powerful architectures that are effective
for graph-based collaborative filtering. Nevertheless, GNNs are known to be vulnerable to …
for graph-based collaborative filtering. Nevertheless, GNNs are known to be vulnerable to …