Adversarial Attacks for Black-Box Recommender Systems via Copying Transferable Cross-Domain User Profiles

被引:8
作者
Fan, Wenqi [1 ]
Zhao, Xiangyu [2 ]
Li, Qing [1 ]
Derr, Tyler [3 ]
Ma, Yao [4 ]
Liu, Hui [5 ]
Wang, Jianping
Tang, Jiliang [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
[3] Vanderbilt Univ, Nashville, TN 37235 USA
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
[5] Michigan State Univ, Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Recommender systems; Closed box; Motion pictures; Data models; Reinforcement learning; Computational modeling; Behavioral sciences; adversarial attacks; black-box attacks; trustworthy recommender systems; cross-domain recommendations;
D O I
10.1109/TKDE.2023.3272652
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As widely used in data-driven decision-making, recommender systems have been recognized for their capabilities to provide users with personalized services in many user-oriented online services, such as E-commerce (e.g., Amazon, Taobao, etc.) and Social Media sites (e.g., Facebook and Twitter). Recent works have shown that deep neural networks-based recommender systems are highly vulnerable to adversarial attacks, where adversaries can inject carefully crafted fake user profiles (i.e., a set of items that fake users have interacted with) into a target recommender system to promote or demote a set of target items. Instead of generating users with fake profiles from scratch, in this article, we introduce a novel strategy to obtain "fake" user profiles via copying cross-domain user profiles, where a reinforcement learning based black-box attacking framework (CopyAttack+) is developed to effectively and efficiently select cross-domain user profiles from the source domain to attack the target system. Moreover, we propose to train a local surrogate system for mimicking adversarial black-box attacks in the source domain, so as to provide transferable signals with the purpose of enhancing the attacking strategy in the target black-box recommender system. Comprehensive experiments on three real-world datasets are conducted to demonstrate the effectiveness of the proposed attacking framework.
引用
收藏
页码:12415 / 12429
页数:15
相关论文
共 58 条
[1]  
[Anonymous], 2012, P 18 ACM SIGKDD INT, DOI DOI 10.1145/2339530.2339684
[2]   Deep Reinforcement Learning A brief survey [J].
Arulkumaran, Kai ;
Deisenroth, Marc Peter ;
Brundage, Miles ;
Bharath, Anil Anthony .
IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) :26-38
[3]   Detecting shilling attacks in recommender systems based on analysis of user rating behavior [J].
Cai, Hongyun ;
Zhang, Fuzhi .
KNOWLEDGE-BASED SYSTEMS, 2019, 177 :22-43
[4]  
Cantador Ivan, 2015, Recommender Systems Handbook, P919, DOI DOI 10.1007/978-1-4899-7637-627
[5]  
Chen HK, 2019, AAAI CONF ARTIF INTE, P3312
[6]   Knowledge-enhanced Black-box Attacks for Recommendations [J].
Chen, Jingfan ;
Fan, Wenqi ;
Zhu, Guanghui ;
Zhao, Xiangyu ;
Yuan, Chunfeng ;
Li, Qing ;
Huang, Yihua .
PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, :108-117
[7]   Shilling Attack Detection using Rated Item Correlation for Collaborative Filtering [J].
Chen, Keke ;
Chan, Patrick P. K. ;
Yeung, Daniel S. .
2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, :3553-3558
[8]  
Chen Ting, 2019, PMLR
[9]  
Chen Xiao, 2023, WWW '23: Proceedings of the ACM Web Conference 2023, P3723, DOI 10.1145/3543507.3583355
[10]   Adversarial Attacks on an Oblivious Recommender [J].
Christakopoulou, Konstantina ;
Banerjee, Arindam .
RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, :322-330