RUP-GAN: A Black-Box Attack Method for Social Intelligence Recommendation Systems Based on Adversarial Learning

被引:0
作者
Yu, Siyang [1 ,2 ]
Duan, Mingxing [2 ,3 ,4 ]
Wang, Kezhi [2 ]
Yang, Shenghong [2 ]
机构
[1] Hunan Univ Finance & Econ, Coll Informat Technol & Management, Changsha 410000, Peoples R China
[2] Hunan Univ, Sch Informat Sci & Engn, Changsha 410000, Peoples R China
[3] Hunan Univ, Key Lab Fus Comp Supercomp & Artificial Intelligen, Minist Educ, Changsha 410000, Peoples R China
[4] Hunan Univ, Shenzhen Inst, Shenzhen 518063, Peoples R China
基金
中国国家自然科学基金;
关键词
Costs; Closed box; Predictive models; Generative adversarial networks; Adversarial machine learning; User experience; Stability analysis; Social intelligence; User preference; Recommender systems; Social Intelligence Recommendation Systems (SIRS); Generative Adversarial Networks (GAN); shilling attacks; NETWORK;
D O I
10.26599/BDMA.2025.9020002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Physical Social Intelligence (CPSI) emphasizes the integration of social information and artificial system information from virtual spaces, enabling Social Intelligence Recommendation Systems (SIRS) to make intelligent decisions and optimizations based on more comprehensive data, thereby enhancing the accuracy of recommendations and user experience. However, as the combined application of CPSI and SIRS becomes increasingly widespread, they also face the risk of shilling attacks. Traditional shilling attacks are limited in terms of low stealthiness, specificity to certain systems, and generation of unrealistic fake profiles. In this paper, we propose a black-box attack method, Real User Preference Generative Adversarial Networks (RUP-GAN), based on adversarial learning. RUP-GAN optimizes the authenticity of user profiles and enhances the hit rate of target items within users' top-k recommendation lists. Through experiments conducted on real-world datasets, it has been proved that RUP-GAN surpasses baseline shilling attack methods in attack effectiveness, transferability, and invisibility. Our proposed model can effectively mitigate the risks posed by shilling attacks, and provide valuable insights for the defense research of CPSI and SIRS.
引用
收藏
页码:820 / 836
页数:17
相关论文
共 48 条
[11]  
Chen K, 2023, Arxiv, DOI arXiv:2301.12227
[12]   A multitask recommendation algorithm based on DeepFM and Graph Convolutional Network [J].
Chen, Liqiong ;
Bi, Xiaoyu ;
Fan, Guoqing ;
Sun, Huaiying .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (02)
[13]   A novel sEMG data augmentation based on WGAN-GP [J].
Coelho, Fabricio ;
Pinto, Milena F. ;
Melo, Aurelio G. ;
Ramos, Gabryel S. ;
Marcato, Andre L. M. .
COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING, 2023, 26 (09) :1008-1017
[14]  
Devakumar Sreedev, 2023, Procedia Computer Science, P1612, DOI 10.1016/j.procs.2023.01.139
[15]  
Fan W, 2022, arXiv
[16]   Series arc fault diagnosis method of photovoltaic arrays based on GASF and improved DCGAN [J].
Gao, Wei ;
Jin, Hui ;
Yang, Gengjie .
ADVANCED ENGINEERING INFORMATICS, 2022, 54
[17]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[18]  
[黄学坚 Huang Xuejian], 2022, [数据分析与知识发现, Data Analysis and Knowledge Discovery], V6, P93
[19]   Shilling Attack Detection System for Online Recommenders [J].
Jeny, J. R., V ;
Sowmya, R. ;
Kiran, G. Sai ;
Babu, M. Kiran ;
Arjun, Ch .
2022 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES, ICICT 2022, 2022, :988-992
[20]   Maintaining Academic Integrity in Programming: Locality-Sensitive Hashing and Recommendations [J].
Karnalim, Oscar .
EDUCATION SCIENCES, 2023, 13 (01)