Securing Tag-based recommender systems against profile injection attacks: A comparative study. (Extended Report)

01/24/2019
by   Georgios K. Pitsilis, et al.
0

This work addresses the challenges related to attacks on collaborative tagging systems, which often comes in a form of malicious annotations or profile injection attacks. In particular, we study various countermeasures against two types of such attacks for social tagging systems, the Overload attack and the Piggyback attack. The countermeasure schemes studied here include baseline classifiers such as, Naive Bayes filter and Support Vector Machine, as well as a Deep Learning approach. Our evaluation performed over synthetic spam data generated from del.icio.us dataset, shows that in most cases, Deep Learning can outperform the classical solutions, providing high-level protection against threats.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/30/2018

Securing Tag-based recommender systems against profile injection attacks: A comparative study

This work addresses challenges related to attacks on social tagging syst...
research
08/21/2023

Single-User Injection for Invisible Shilling Attack against Recommender Systems

Recommendation systems (RS) are crucial for alleviating the information ...
research
08/11/2020

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Recommender systems play an important role in modern information and e-c...
research
09/04/2019

Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

In this paper, we introduce the concept of two-way coding, which origina...
research
05/04/2021

An Overview of Laser Injection against Embedded Neural Network Models

For many IoT domains, Machine Learning and more particularly Deep Learni...
research
05/19/2022

Dissemination Control in Dynamic Data Clustering For Dense IIoT Against False Data Injection Attack

The IoT has made possible the development of increasingly driven service...
research
06/02/2020

Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start

E-commerce platforms provide their customers with ranked lists of recomm...

Please sign up or login with your details

Forgot password? Click here to reset