Ownership Recommendation via Iterative Adversarial Training

被引:6
作者
Paul, Agyemang [1 ]
Zhao, Xunming [1 ]
Fang, Luping [1 ]
Wu, Zhefu [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
关键词
Ownership recommendation; Sharing platforms; Iterative perturbation; Adversarial training; SYSTEMS;
D O I
10.1007/s11063-021-10647-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning classifiers are vulnerable to adversarial perturbation, and their presence raises security concerns, especially in recommendation systems. While attacks and defense mechanisms in recommendation systems have received significant attention, Basic Iterative Method (BIM), which has been shown in Computer Vision to increase attack effectiveness by more than 60%, has received little attention in ownership recommendation. As a result, ownership recommender systems may be more sensitive to iterative perturbations, resulting in significant generalization errors. Adversarial Training, a regularization strategy that can withstand worst-case iterative perturbations, could be a viable option for improving model robustness and generalization. In this paper, we implement BIM for ownership recommendations. Through adversarial training, we propose the Adversarial Consumer and Producer Recommendation (ACPR) approach that integrates ownership features into a multi-objective pairwise ranking to capture the user's preferences. The ACPR method learns a core embedding for each user and two transformation matrices that project the user's core embedding into two role embeddings (i.e., a producer and consumer role) using an extension of matrix factorization. To minimize the impact of iterative perturbation, we train a consumer and producer recommender objective function using minimax adversarial training. Empirical studies on two Large-scale applications show that our method outperforms standard recommendation methods and recent methods that model ownership information.
引用
收藏
页码:637 / 655
页数:19
相关论文
共 52 条
  • [1] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [2] A Neural Collaborative Filtering Model with Interaction-based Neighborhood
    Bai, Ting
    Wen, Ji-Rong
    Zhang, Jun
    Zhao, Wayne Xin
    [J]. CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2017, : 1979 - 1982
  • [3] Latent Cross: Making Use of Context in Recurrent Recommender Systems
    Beutel, Alex
    Covington, Paul
    Jain, Sagar
    Xu, Can
    Li, Jia
    Gatto, Vince
    Chi, Ed H.
    [J]. WSDM'18: PROCEEDINGS OF THE ELEVENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2018, : 46 - 54
  • [4] Hybrid recommender systems: Survey and experiments
    Burke, R
    [J]. USER MODELING AND USER-ADAPTED INTERACTION, 2002, 12 (04) : 331 - 370
  • [5] Embedding Factorization Models for Jointly Recommending Items and User Generated Lists
    Cao, Da
    Nie, Liqiang
    He, Xiangnan
    Wei, Xiaochi
    Zhu, Shunzhi
    Chua, Tat-Seng
    [J]. SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 585 - 594
  • [6] Adversarial Tensor Factorization for Context-aware Recommendation
    Chen, Huiyuan
    Li, Jing
    [J]. RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, : 363 - 367
  • [7] Chen Tao, 2016, P 24 ACM INT C MULTI, P1018
  • [8] Leveraging Consumption Intention with Identity Information on Sharing Economy Platforms
    Cho, Sunyoung
    Park, ChongWoo
    Kim, Junghwan
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (02) : 178 - 187
  • [9] Cremonesi Paolo, 2010, P 4 ACM C REC SYST B, P39
  • [10] de Gemmis M., 2015, Recommender Systems Handbook, P119, DOI DOI 10.1007/978-1-4899-7637-6_4