Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack

被引:29
作者
Wu, Fan [1 ,2 ]
Gao, Min [1 ,2 ]
Yu, Junliang [3 ]
Wang, Zongwei [2 ]
Liu, Kecheng [4 ]
Wang, Xu [5 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 401331, Peoples R China
[3] Univ Queensland, Sch Informat Technol & Elect Engn, St Lucia, Qld 4072, Australia
[4] Univ Reading, Infomat Res Ctr, Henley Business Sch, Reading RG6 6UD, Berks, England
[5] Chongqing Univ, Sch Mech Engn, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Collaborative filtering; Shilling attack; Generative adversarial networks; Graph convolution; Recommender systems; ADVERSARIAL NETWORKS; MODEL;
D O I
10.1016/j.ins.2021.07.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To explore the robustness of recommender systems, researchers have proposed various shilling attack models and analyzed their adverse effects. Primitive attacks are highly fea-sible but less effective due to simplistic handcrafted rules, while upgraded attacks are more powerful but costly and difficult to deploy because they require more knowledge from rec-ommendations. In this paper, we explore a novel shilling attack called Graph cOnvolution-based generative shilling ATtack (GOAT) to balance the attacks' feasibility and effective-ness. GOAT adopts the primitive attacks' paradigm that assigns items for fake users by sampling and the upgraded attacks' paradigm that generates fake ratings by a deep learning-based model. It deploys a generative adversarial network (GAN) that learns the real rating distribution to generate fake ratings. Additionally, the generator combines a tai-lored graph convolution structure that leverages the correlations between co-rated items to smoothen the fake ratings and enhance their authenticity. The extensive experiments on two public datasets evaluate GOAT's performance from multiple perspectives. Our study of the GOAT demonstrates technical feasibility for building a more powerful and intelligent attack model with a much-reduced cost, enables analysis the threat of such an attack and guides for investigating necessary prevention measures. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:683 / 701
页数:19
相关论文
共 50 条
[31]   A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks [J].
Deldjoo, Yashar ;
Di Noia, Tommaso ;
Merra, Felice Antonio .
ACM COMPUTING SURVEYS, 2021, 54 (02)
[32]   An AP-Based Shilling Attack Detector for Collaborative Filtering Recommendation Systems [J].
Wang, Qingxian ;
Wan, Meng ;
Shang, Mingsheng ;
Cai, Shimin .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05) :985-993
[33]   Recommender systems based on generative adversarial networks: A problem-driven perspective [J].
Gao, Min ;
Zhang, Junwei ;
Yu, Junliang ;
Li, Jundong ;
Wen, Junhao ;
Xiong, Qingyu .
INFORMATION SCIENCES, 2021, 546 :1166-1185
[34]   Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems [J].
Ren, Yizhi ;
Li, Zelong ;
Yuan, Lifeng ;
Zhang, Zhen ;
Su, Chunhua ;
Wang, Yujuan ;
Wu, Guohua .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) :289-299
[35]   A probabilistic graph-based method to solve precision-diversity dilemma in recommender systems [J].
Joorabloo, Nima ;
Jalili, Mahdi ;
Ren, Yongli .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 184
[36]   Distinguishing Social Ties in Recommender Systems by Graph-Based Algorithms [J].
Wei, Xiaochi ;
Huang, Heyan ;
Xin, Xin ;
Yang, Xianxiang .
WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT I, 2013, 8180 :219-228
[37]   Detecting shilling attacks in social recommender systems based on time series analysis and trust features [J].
Xu, Yishu ;
Zhang, Fuzhi .
KNOWLEDGE-BASED SYSTEMS, 2019, 178 :25-47
[38]   Recommender Systems Based on Graph Embedding Techniques: A Review [J].
Deng, Yue .
IEEE ACCESS, 2022, 10 :51587-51633
[39]   A Survey on Knowledge Graph-Based Recommender Systems [J].
Guo, Qingyu ;
Zhuang, Fuzhen ;
Qin, Chuan ;
Zhu, Hengshu ;
Xie, Xing ;
Xiong, Hui ;
He, Qing .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (08) :3549-3568
[40]   Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering [J].
Zhang, Fuzhi ;
Wang, Shilei .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (05) :1189-1199