Attacking Recommender Systems with Augmented User Profiles

05/17/2020
by   Chen Lin, et al.
0

Recommendation Systems (RS) have become an essential part of many online services. Due to its pivotal role of guiding customers towards purchasing, there is a natural motivation for unscrupulous parties to spoof RS for profits. In this paper we study the shilling attack: a subsistent and profitable attack where an adversarial party injects a number of user profiles to promote or demote a target item. Conventional shilling attack models are based on simple heuristics that can be easily detected, or directly adopt adversarial attack methods without a special design for RS. Moreover, the study on the attack impact on deep learning based RS is missing in the literature, making the effects of shilling attack against real RS doubtful. We present a novel Augmented Shilling Attack framework (AUSH) and implement it with the idea of Generative Adversarial Network. AUSH is capable of tailoring attacks against RS according to budget and complex attack goals such as targeting on a specific user group. We experimentally show that the attack impact of AUSH is noticeable on a wide range of RS including both classic and modern deep learning based RS, while it is virtually undetectable by the state-of-the-art attack detection model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/23/2022

Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles

Due to the pivotal role of Recommender Systems (RS) in guiding customers...
research
05/08/2023

Evaluating Impact of User-Cluster Targeted Attacks in Matrix Factorisation Recommenders

In practice, users of a Recommender System (RS) fall into a few clusters...
research
03/23/2018

Learning Recommendations While Influencing Interests

Personalized recommendation systems (RS) are extensively used in many se...
research
12/20/2022

A Comparison Between Tsetlin Machines and Deep Neural Networks in the Context of Recommendation Systems

Recommendation Systems (RSs) are ubiquitous in modern society and are on...
research
02/14/2023

Practical Cross-System Shilling Attacks with Limited Access to Data

In shilling attacks, an adversarial party injects a few fake user profil...
research
05/20/2020

Adversarial Machine Learning in Recommender Systems: State of the art and Challenges

Latent-factor models (LFM) based on collaborative filtering (CF), such a...
research
11/05/2020

A Black-Box Attack Model for Visually-Aware Recommender Systems

Due to the advances in deep learning, visually-aware recommender systems...

Please sign up or login with your details

Forgot password? Click here to reset