Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms

08/12/2021
by   Anahita Samadi, et al.
0

Recently, some studies have shown that text classification tasks are vulnerable to poisoning and evasion attacks. However, little work has investigated attacks against decision making algorithms that use text embeddings, and their output is a ranking. In this paper, we focus on ranking algorithms for recruitment process, that employ text embeddings for ranking applicants resumes when compared to a job description. We demonstrate both white box and black box attacks that identify text items, that based on their location in embedding space, have significant contribution in increasing the similarity score between a resume and a job description. The adversary then uses these text items to improve the ranking of their resume among others. We tested recruitment algorithms that use the similarity scores obtained from Universal Sentence Encoder (USE) and Term Frequency Inverse Document Frequency (TF IDF) vectors. Our results show that in both adversarial settings, on average the attacker is successful. We also found that attacks against TF IDF is more successful compared to USE.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/12/2020

Model Robustness with Text Classification: Semantic-preserving adversarial attacks

We propose algorithms to create adversarial attacks to assess model robu...
research
04/28/2023

Topic-oriented Adversarial Attacks against Black-box Neural Ranking Models

Neural ranking models (NRMs) have attracted considerable attention in in...
research
09/06/2018

Adversarial Reprogramming of Sequence Classification Neural Networks

Adversarial Reprogramming has demonstrated success in utilizing pre-trai...
research
05/29/2019

A backdoor attack against LSTM-based text classification systems

With the widespread use of deep learning system in many applications, th...
research
06/28/2022

Item Matching using Text Description and Similarity Search

In this paper, we focus on the problem of item matching using only the d...
research
12/01/2018

Discrete Attacks and Submodular Optimization with Applications to Text Classification

Adversarial examples are carefully constructed modifications to an input...
research
11/01/2022

Manipulation of individual judgments in the quantitative pairwise comparisons method

Decision-making methods very often use the technique of comparing altern...

Please sign up or login with your details

Forgot password? Click here to reset