RUP-GAN: A Black-Box Attack Method for Social Intelligence Recommendation Systems Based on Adversarial Learning

被引:0
作者
Yu, Siyang [1 ,2 ]
Duan, Mingxing [2 ,3 ,4 ]
Wang, Kezhi [2 ]
Yang, Shenghong [2 ]
机构
[1] Hunan Univ Finance & Econ, Coll Informat Technol & Management, Changsha 410000, Peoples R China
[2] Hunan Univ, Sch Informat Sci & Engn, Changsha 410000, Peoples R China
[3] Hunan Univ, Key Lab Fus Comp Supercomp & Artificial Intelligen, Minist Educ, Changsha 410000, Peoples R China
[4] Hunan Univ, Shenzhen Inst, Shenzhen 518063, Peoples R China
基金
中国国家自然科学基金;
关键词
Costs; Closed box; Predictive models; Generative adversarial networks; Adversarial machine learning; User experience; Stability analysis; Social intelligence; User preference; Recommender systems; Social Intelligence Recommendation Systems (SIRS); Generative Adversarial Networks (GAN); shilling attacks; NETWORK;
D O I
10.26599/BDMA.2025.9020002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Physical Social Intelligence (CPSI) emphasizes the integration of social information and artificial system information from virtual spaces, enabling Social Intelligence Recommendation Systems (SIRS) to make intelligent decisions and optimizations based on more comprehensive data, thereby enhancing the accuracy of recommendations and user experience. However, as the combined application of CPSI and SIRS becomes increasingly widespread, they also face the risk of shilling attacks. Traditional shilling attacks are limited in terms of low stealthiness, specificity to certain systems, and generation of unrealistic fake profiles. In this paper, we propose a black-box attack method, Real User Preference Generative Adversarial Networks (RUP-GAN), based on adversarial learning. RUP-GAN optimizes the authenticity of user profiles and enhances the hit rate of target items within users' top-k recommendation lists. Through experiments conducted on real-world datasets, it has been proved that RUP-GAN surpasses baseline shilling attack methods in attack effectiveness, transferability, and invisibility. Our proposed model can effectively mitigate the risks posed by shilling attacks, and provide valuable insights for the defense research of CPSI and SIRS.
引用
收藏
页码:820 / 836
页数:17
相关论文
共 48 条
[1]   EHHR: an efficient evolutionary hyper-heuristic based recommender framework for short-text classifier selection [J].
Almas, Bushra ;
Mujtaba, Hasan ;
Khan, Kifayat Ullah .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02) :1425-1446
[2]  
[Anonymous], 2005, P 2005 WEBKDD WORKSH
[3]   Recommendation Based on Graph Neural Network with Structural Identity [J].
Bai, Wentao ;
Guo, Congying .
PROCEEDINGS OF 2022 THE 6TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING, ICMLSC 20222, 2022, :127-131
[4]   Deep Generative Medical Image Harmonization for Improving Cross-Site Generalization in Deep Learning Predictors [J].
Bashyam, Vishnu M. ;
Doshi, Jimit ;
Erus, Guray ;
Srinivasan, Dhivya ;
Abdulkadir, Ahmed ;
Singh, Ashish ;
Habes, Mohamad ;
Fan, Yong ;
Masters, Colin L. ;
Maruff, Paul ;
Zhuo, Chuanjun ;
Voelzke, Henry ;
Johnson, Sterling C. ;
Fripp, Jurgen ;
Koutsouleris, Nikolaos ;
Satterthwaite, Theodore D. ;
Wolf, Daniel H. ;
Gur, Raquel E. ;
Gur, Ruben C. ;
Morris, John C. ;
Albert, Marilyn S. ;
Grabe, Hans J. ;
Resnick, Susan M. ;
Bryan, Nick R. ;
Wittfeld, Katharina ;
Bulow, Robin ;
Wolk, David A. ;
Shou, Haochang ;
Nasrallah, Ilya M. ;
Davatzikos, Christos .
JOURNAL OF MAGNETIC RESONANCE IMAGING, 2022, 55 (03) :908-916
[5]  
Bojchevski A, 2018, PR MACH LEARN RES, V80
[6]  
Cai XY, 2018, AAAI CONF ARTIF INTE, P5747
[7]   Hierarchical Graph Neural Networks for Few-Shot Learning [J].
Chen, Cen ;
Li, Kenli ;
Wei, Wei ;
Zhou, Joey Tianyi ;
Zeng, Zeng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (01) :240-252
[8]   Citywide Traffic Flow Prediction Based on Multiple Gated Spatio-temporal Convolutional Neural Networks [J].
Chen, Cen ;
Li, Kenli ;
Teo, Sin G. ;
Zou, Xiaofeng ;
Li, Keqin ;
Zeng, Zeng .
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2020, 14 (04)
[9]   Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks [J].
Chen, Jian ;
Gao, Yuan ;
Shan, Jinyong ;
Peng, Kai ;
Wang, Chen ;
Jiang, Hongbo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) :1803-1813
[10]   A Bi-layered Parallel Training Architecture for Large-Scale Convolutional Neural Networks [J].
Chen, Jianguo ;
Li, Kenli ;
Bilal, Kashif ;
Zhou, Xu ;
Li, Keqin ;
Yu, Philip S. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (05) :965-976