Practical Cross-System Shilling Attacks with Limited Access to Data

نویسندگان

چکیده

In shilling attacks, an adversarial party injects a few fake user profiles into Recommender System (RS) so that the target item can be promoted or demoted. Although much effort has been devoted to developing attack methods, we find existing approaches are still far from practical. this paper, analyze properties practical method should have and propose new concept of Cross-system Attack. With idea Attack, design Practical Shilling Attack (PC-Attack) framework requires little information about victim RS model data for conducting attacks. PC-Attack is trained capture graph topology knowledge public in self-supervised manner. Then, it fine-tuned on small portion easy access construct profiles. Extensive experiments demonstrated superiority over state-of-the-art baselines. Our implementation available at https://github.com/KDEGroup/PC-Attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Limited Knowledge Shilling Attacks in Collaborative Filtering Systems

Recent research in recommender systems has shown that collaborative filtering algorithms are highly susceptible to attacks that insert biased profile data. Theoretical analyses and empirical experiments have shown that certain attacks can have a significant impact on the recommendations a system provides. These analyses have generally not taken into account the cost of mounting an attack or the...

متن کامل

Using Neural Networks with Limited Data to Estimate Manufacturing Cost

Neural networks were used to estimate the cost of jet engine components, specifically shafts and cases. The neural network process was compared with results produced by the current conventional cost estimation software and linear regression methods. Due to the complex nature of the parts and the limited amount of information available, data expansion techniques such as doubling-data and data-cr...

متن کامل

Shilling Attacks against Privacy-Preserving Collaborative Filtering

Although collaborative filtering with privacy schemes protect individual user privacy while still providing accurate recommendations, they might be subject to shilling attacks like traditional schemes without privacy. There are various studies focusing on either proposing privacypreserving collaborative filtering schemes or developing robust recommendation algorithms against shilling attacks. H...

متن کامل

Solving the Problem of Scheduling Unrelated Parallel Machines with Limited Access to Jobs

Nowadays, by successful application of on time production concept in other concepts like production management and storage, the need to complete the processing of jobs in their delivery time is considered a key issue in industrial environments. Unrelated parallel machines scheduling is a general mood of classic problems of parallel machines. In some of the applications of unrelated parallel mac...

متن کامل

Solving the Problem of Scheduling Unrelated Parallel Machines with Limited Access to Jobs

Nowadays, by successful application of on time production concept in other concepts like production management and storage, the need to complete the processing of jobs in their delivery time is considered a key issue in industrial environments. Unrelated parallel machines scheduling is a general mood of classic problems of parallel machines. In some of the applications of unrelated parallel mac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence

سال: 2023

ISSN: ['2159-5399', '2374-3468']

DOI: https://doi.org/10.1609/aaai.v37i4.25612