Access the full text.
Sign up today, get DeepDyve free for 14 days.
Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, N. Tzeng (2021)
Reverse Attack: Black-box Attacks on Collaborative RecommendationProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Chi Duong, Thanh Hoang, Haikun Dang, Quoc Nguyen, K. Aberer (2019)
On Node Features for Graph Neural NetworksArXiv, abs/1911.08795
Feng Yuan, Lina Yao, B. Benatallah (2019)
Adversarial Collaborative Neural Network for Robust RecommendationProceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval
Himan Abdollahpouri, M. Mansoury, R. Burke, B. Mobasher (2019)
The Unfairness of Popularity Bias in RecommendationArXiv, abs/1907.13286
Xiang Wang, Xiangnan He, Meng Wang, Fuli Feng, Tat-Seng Chua (2019)
Neural Graph Collaborative FilteringProceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval
WuZhiang, LiChangsheng, Caojie, Geyong (2020)
On Scalability of Association-rule-based Recommendation: A Unified Distributed-computing FrameworkACM Transactions on The Web, 14
Shijie Zhang, H. Yin, Tong Chen, Zi-Liang Huang, Quoc Nguyen, Li-zhen Cui (2021)
PipAttack: Poisoning Federated Recommender Systems for Manipulating Item PromotionProceedings of the Fifteenth ACM International Conference on Web Search and Data Mining
Hongyun Cai, V. Zheng, K. Chang (2017)
A Comprehensive Survey of Graph Embedding: Problems, Techniques, and ApplicationsIEEE Transactions on Knowledge and Data Engineering, 30
Xiangyu Song, Jianxin Li, Yifu Tang, Taige Zhao, Yunliang Chen, Ziyu Guan (2021)
JKT: A joint graph convolutional network based Deep Knowledge TracingInf. Sci., 580
W. Kool, H. Hoof, M. Welling (2019)
Stochastic Beams and Where to Find Them: The Gumbel-Top-k Trick for Sampling Sequences Without Replacement
Xiaowen Huang, J. Sang, Jian Yu, Changsheng Xu (2021)
Learning to Learn a Cold-start Sequential RecommenderACM Transactions on Information Systems (TOIS), 40
Lianghao Xia, Chao Huang, Yong Xu, Huance Xu, Xiang Li, Weiguo Zhang (2021)
Collaborative Reflection-Augmented Autoencoder Network for Recommender SystemsACM Transactions on Information Systems (TOIS), 40
Fatemeh Rezaimehr, Chitra Dadkhah (2020)
A survey of attack detection approaches in collaborative filtering recommender systemsArtificial Intelligence Review, 54
Taotao Cai, Jianxin Li, A. Mian, Ronghua Li, T. Sellis, J. Yu (2022)
Target-Aware Holistic Influence Maximization in Spatial Social NetworksIEEE Transactions on Knowledge and Data Engineering, 34
Shuchang Tao, Qi Cao, Huawei Shen, Junjie Huang, Yunfan Wu, Xueqi Cheng (2021)
Single Node Injection Attack against Graph Neural NetworksProceedings of the 30th ACM International Conference on Information & Knowledge Management
L. Baltrunas, K. Church, Alexandros Karatzoglou, Nuria Oliver (2015)
Frappe: Understanding the Usage and Perception of Mobile App Recommendations In-The-WildArXiv, abs/1505.03014
Jingtao Ding, Guanghui Yu, Yong Li, Xiangnan He, Depeng Jin (2020)
Improving Implicit Recommender Systems with Auxiliary DataACM Transactions on Information Systems (TOIS), 38
James Davidson, Benjamin Liebald, Junning Liu, Palash Nandy, T. Vleet, U. Gargi, Sujoy Gupta, Yu He, Mike Lambert, Blake Livingston, D. Sampath (2010)
The YouTube video recommendation system
[ (2016)
Recommender Systems, Vol
Ruihong Qiu, Zi Huang, Jingjing Li, H. Yin (2020)
Exploiting Cross-session Information for Session-based Recommendation with Graph Neural NetworksACM Transactions on Information Systems (TOIS), 38
Tong Chen, Hongzhi Yin, Hongxu Chen, Lin Wu, Hao Wang, Xiaofang Zhou, Xue Li (2018)
TADA: Trend Alignment with Dual-Attention Multi-task Recurrent Neural Networks for Sales Prediction2018 IEEE International Conference on Data Mining (ICDM)
T. Nguyen, M. Weidlich, Chi Duong, Hongzhi Yin, Nguyen Hung (2017)
Retaining Data from Streams of Social Platforms with Minimal Regret
Florian Tramèr, Fan Zhang, A. Juels, M. Reiter, T. Ristenpart (2016)
Stealing Machine Learning Models via Prediction APIs
Y. Koren, Robert Bell, C. Volinsky (2009)
Matrix Factorization Techniques for Recommender SystemsComputer, 42
Minghong Fang, Guolei Yang, N. Gong, Jia Liu (2018)
Poisoning Attacks to Graph-Based Recommender SystemsProceedings of the 34th Annual Computer Security Applications Conference
Jianmo Ni, Jiacheng Li, Julian McAuley (2019)
Justifying Recommendations using Distantly-Labeled Reviews and Fine-Grained Aspects
Mehmet Aktukmak, Y. Yilmaz, Ismail Uysal (2019)
Quick and accurate attack detection in recommender systems through user attributesProceedings of the 13th ACM Conference on Recommender Systems
Xiangyu Song, Jianxin Li, Qiuyu Lei, Wei Zhao, Yunliang Chen, A. Mian (2022)
Bi-CLKT: Bi-Graph Contrastive Learning based Knowledge TracingKnowl. Based Syst., 241
Jing Yao, Zhicheng Dou, Jun Xu, Jirong Wen (2021)
RLPS: A Reinforcement Learning–Based Framework for Personalized SearchACM Transactions on Information Systems (TOIS), 39
Tam Nguyen, T. Huynh, Hongzhi Yin, V. Tong, Darnbi Sakong, Bolong Zheng, Quoc Nguyen (2020)
Entity Alignment for Knowledge Graphs With Multi-Order Convolutional NetworksIEEE Transactions on Knowledge and Data Engineering, 34
I. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, Yoshua Bengio (2014)
Generative adversarial networksCommunications of the ACM, 63
Junshuai Song, Zhao Li, Zehong Hu, Yucheng Wu, Zhenpeng Li, Jian Li, Jun Gao (2020)
PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems2020 IEEE 36th International Conference on Data Engineering (ICDE)
Hui Fang, Danning Zhang, Yiheng Shu, G. Guo (2020)
Deep Learning for Sequential RecommendationACM Transactions on Information Systems (TOIS), 39
Zih-Wun Wu, Chiao-Ting Chen, Szu-Hao Huang (2021)
Poisoning attacks against knowledge graph-based recommendation systems using deep reinforcement learningNeural Computing and Applications, 34
Shijie Zhang, Hongzhi Yin, Tong Chen, Zi-Liang Huang, Li-zhen Cui, Xiangliang Zhang (2021)
Graph Embedding for Recommendation against Attribute Inference AttacksProceedings of the Web Conference 2021
Xiaoyun Wang, Joe Eaton, Cho-Jui Hsieh, S. Wu (2018)
Attack Graph Convolutional Networks by Adding Fake NodesArXiv, abs/1810.10751
F. Harper, J. Konstan, J. A. (2016)
The MovieLens Datasets: History and ContextACM Trans. Interact. Intell. Syst., 5
C. Chen, Min Zhang, Yongfeng Zhang, Yiqun Liu, Shaoping Ma (2020)
Efficient Neural Matrix Factorization without Sampling for RecommendationACM Transactions on Information Systems (TOIS), 38
Feng Xue, Xiangnan He, Xiang Wang, Jiandong Xu, Kai Liu, Richang Hong (2018)
Deep Item-based Collaborative Filtering for Top-N RecommendationACM Transactions on Information Systems (TOIS), 37
Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan, Linqiang Chen (2019)
Data Poisoning Attacks on Graph Convolutional Matrix Completion
Ihsan Gunes, C. Kaleli, Alper Bilge, H. Polat (2014)
Shilling attacks against recommender systems: a comprehensive surveyArtificial Intelligence Review, 42
Jiaxi Tang, Hongyi Wen, Ke Wang (2020)
Revisiting Adversarially Learned Injection Attacks Against Recommender SystemsProceedings of the 14th ACM Conference on Recommender Systems
Nicolas Papernot, P. Mcdaniel, I. Goodfellow (2016)
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial SamplesArXiv, abs/1605.07277
Xiangnan He, Kuan Deng, Xiang Wang, Yan Li, Yongdong Zhang, Meng Wang (2020)
LightGCN: Simplifying and Powering Graph Convolution Network for RecommendationProceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
A. Sundar, Feng Li, X. Zou, Tianchong Gao, Evan Russomanno (2020)
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive SurveyIEEE Access, 8
Xing Hao, Guigang Zhang, Shang Ma (2016)
Deep LearningInt. J. Semantic Comput., 10
Lei Guo, H. Yin, Tong Chen, Xiangliang Zhang, Kai Zheng (2021)
Hierarchical Hyperedge Embedding-Based Representation Learning for Group RecommendationACM Transactions on Information Systems (TOIS), 40
Yi Chang, Zhao Ren, THANH NGUYEN, W. Nejdl, B. Schuller (2022)
Example-based Explanations with Adversarial Attacks for Respiratory Sound AnalysisArXiv, abs/2203.16141
Hengtong Zhang, Changxin Tian, Yaliang Li, Lu Su, Nan Yang, Wayne Zhao, Jing Gao (2021)
Data Poisoning Attack against Recommender System Using Incomplete and Perturbed DataProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining
Dingyuan Zhu, Ziwei Zhang, Peng Cui, Wenwu Zhu (2019)
Robust Graph Convolutional Networks Against Adversarial AttacksProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
B. Mobasher, R. Burke, Runa Bhaumik, Chad Williams (2007)
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustnessACM Trans. Internet Techn., 7
Zhiang Wu, Changsheng Li, Jie Cao, Yong Ge (2020)
On Scalability of Association-rule-based RecommendationACM Transactions on the Web (TWEB), 14
Hai Huang, Jiaming Mu, N. Gong, Qi Li, Bin Liu, Mingwei Xu (2021)
Data Poisoning Attacks to Deep Learning Based Recommender SystemsArXiv, abs/2101.02644
Zhenrui Yue, Zhankui He, Huimin Zeng, Julian McAuley (2021)
Black-Box Attacks on Sequential Recommenders via Data-Free Model ExtractionProceedings of the 15th ACM Conference on Recommender Systems
Qiaoyu Tan, Ninghao Liu, Xing Zhao, Hongxia Yang, Jingren Zhou, Xia Hu (2020)
Learning to Hash with Graph Neural Networks for Recommender SystemsProceedings of The Web Conference 2020
Hui Fang, Danning Zhang, Yiheng Shu, G. Guo (2019)
Deep Learning for Sequential Recommendation: Algorithms, Influential Factors, and EvaluationsarXiv: Information Retrieval
Shiwen Wu, Wentao Zhang, Fei Sun, Bin Cui (2020)
Graph Neural Networks in Recommender Systems: A SurveyACM Computing Surveys, 55
Daniel Lowd, Christopher Meek (2005)
Adversarial learning
[ (2018)
Graph summarization methods and applications: A surveyACM Comput. Surv., 51
Nguyen Toan, Minh Pham, T. Nguyen, T. Huynh, Vinh Tong, Quoc Nguyen, T. Quan (2021)
Structural representation learning for network alignment with self-supervised anchor linksExpert Syst. Appl., 165
Ruining He, Julian McAuley (2015)
VBPR: Visual Bayesian Personalized Ranking from Implicit Feedback
Thanh Nguyen, T. Nguyen, T. Nguyen, Bay Vo, Jun Jo, Quoc Nguyen (2021)
JUDO: Just-in-time rumour detection in streaming social platformsInf. Sci., 570
Daniel Zügner, Amir Akbarnejad, Stephan Günnemann (2018)
Adversarial Attacks on Neural Networks for Graph DataProceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Hung, Zi-Liang Huang, Li-zhen Cui (2020)
GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster DetectionProceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
[ (2016)
Deep LearningMIT Press.
T. Huynh, Vinh Tong, T. Nguyen, H. Yin, M. Weidlich, Nguyen Hung (2020)
Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks2020 IEEE 36th International Conference on Data Engineering (ICDE)
Brijain Patel, Mr. Rana (2014)
A Survey on Decision Tree Algorithm for ClassificationInternational Journal of Engineering Development and Research, 2
Mingdan Si, Qingshan Li (2018)
Shilling attacks against collaborative recommender systems: a reviewArtificial Intelligence Review, 53
Bo Li, Yining Wang, Aarti Singh, Yevgeniy Vorobeychik (2016)
Data Poisoning Attacks on Factorization-Based Collaborative Filtering
Shuai Zhang, Lina Yao, Aixin Sun, Yi Tay, Shuai Zhang, Lina Yao, Aixin Sun (2017)
Deep Learning Based Recommender SystemACM Computing Surveys (CSUR), 52
Le Wu, Yonghui Yang, Kun Zhang, Richang Hong, Yanjie Fu, Meng Wang (2020)
Joint Item Recommendation and Attribute Inference: An Adaptive Graph Convolutional Network ApproachProceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
Liang Chen, Yangjun Xu, Fenfang Xie, Min Huang, Zibin Zheng (2019)
Data poisoning attacks on neighborhood‐based recommender systemsTransactions on Emerging Telecommunications Technologies, 32
Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, Tat-Seng Chua (2017)
Neural Collaborative FilteringProceedings of the 26th International Conference on World Wide Web
Paula Branco, L. Torgo, Rita Ribeiro (2016)
A Survey of Predictive Modeling on Imbalanced DomainsACM Computing Surveys (CSUR), 49
B. Sarwar, G. Karypis, J. Konstan, J. Riedl (2001)
Item-based collaborative filtering recommendation algorithms
Qinyong Wang, H. Yin, Tong Chen, Junliang Yu, Alexander Zhou, Xiangliang Zhang (2021)
Fast-adapting and privacy-preserving federated recommender systemThe VLDB Journal, 31
Yike Liu, Tara Safavi, A. Dighe, Danai Koutra (2016)
Graph Summarization Methods and ApplicationsACM Computing Surveys (CSUR), 51
[ (2014)
Generative adversarial netsAdv. Neural Inf. Process. Syst, 27
Thomas Kipf, M. Welling (2016)
Semi-Supervised Classification with Graph Convolutional NetworksArXiv, abs/1609.02907
[ (2019)
Deep learning based recommender system: A survey and new perspectivesACM Comput. Surv., 52
YangJun, MaWeizhi, Zhangmin, ZhouXin, LiuYiqun, MaShaoping (2021)
LegalGNN: Legal Information Enhanced Graph Neural Network for RecommendationACM Transactions on Information Systems
Vishnu Pendyala (2018)
Machine Learning Algorithms
With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate recommendation results as they desire. This might be due to the fact that existing poison attacks (and countermeasures) are either model-agnostic or specifically designed for traditional recommender algorithms (e.g., neighborhood-based, matrix-factorization-based, or deep-learning-based RSs) that are not gRS. As gRSs are widely adopted in the industry, the problem of how to design poison attacks for gRSs has become a need for robust user experience. Herein, we focus on the use of poison attacks to manipulate item promotion in gRSs. Compared to standard GNNs, attacking gRSs is more challenging due to the heterogeneity of network structure and the entanglement between users and items. To overcome such challenges, we propose GSPAttack—a generative surrogate-based poison attack framework for gRSs. GSPAttack tailors a learning process to surrogate a recommendation model as well as generate fake users and user-item interactions while preserving the data correlation between users and items for recommendation accuracy. Although maintaining high accuracy for other items rather than the target item seems counterintuitive, it is equally crucial to the success of a poison attack. Extensive evaluations on four real-world datasets revealed that GSPAttack outperforms all baselines with competent recommendation performance and is resistant to various countermeasures.
ACM Transactions on Information Systems (TOIS) – Association for Computing Machinery
Published: Feb 7, 2023
Keywords: Manipulative item promotion
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.