2020
DOI: 10.1002/ett.3872
|View full text |Cite
|
Sign up to set email alerts
|

Data poisoning attacks on neighborhood‐based recommender systems

Abstract: Nowadays, collaborative filtering recommender systems have been widely deployed in many commercial companies to make profit. Neighbourhood-based collaborative filtering is common and effective. To date, despite its effectiveness, there has been little effort to explore their robustness and the impact of data poisoning attacks on their performance. Can the neighbourhood-based recommender systems be easily fooled? To this end, we shed light on the robustness of neighbourhood-based recommender systems and propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…For instance, random attacks just choose rated items at random from the whole item set for fake users, and bandwagon attacks tend to select certain items with high popularity in the dataset for fake users. The algorithm-specific data poisoning attacks are optimized to a specific type of recommender systems and have been developed for graph-based recommender systems [13], association-rule-based recommender systems [46], matrix-factorization-based recommender systems [12], [28], and neighborhood-based recommender systems [4]. As these attacks are optimized, they often are more effective.…”
Section: B Attacks To Recommender Systemsmentioning
confidence: 99%
“…For instance, random attacks just choose rated items at random from the whole item set for fake users, and bandwagon attacks tend to select certain items with high popularity in the dataset for fake users. The algorithm-specific data poisoning attacks are optimized to a specific type of recommender systems and have been developed for graph-based recommender systems [13], association-rule-based recommender systems [46], matrix-factorization-based recommender systems [12], [28], and neighborhood-based recommender systems [4]. As these attacks are optimized, they often are more effective.…”
Section: B Attacks To Recommender Systemsmentioning
confidence: 99%
“…Adversaries often regard the GCN model as their attack target, due to its outstanding performance on node classification. Traditionally, a GCN model with two layers is represented by: z = sof tmax( Âσ( ÂXW (1) )W (2) ),…”
Section: Nettackmentioning
confidence: 99%
“…Using different adversarial attack methods, adversaries can downgrade the performance of graph data mining algorithms by adding or removing some nodes or links. For example, adversaries can register fake accounts and add some fake records to mislead a recommendation system to recommend illegal products to ordinary users, leading to serious consequences [1], [2].…”
Section: Introductionmentioning
confidence: 99%
“…The recommendation list is the suggestion provided by the recommender. Personalized recommendation refers to providing recommendations that meet the user's preferences based on understanding the user 1,2 …”
Section: Introductionmentioning
confidence: 99%