Reverse Attack: Black-box Attacks on Collaborative Recommendation

被引:14
作者
Zhang, Yihe [1 ]
Yuan, Xu [1 ]
Li, Jin [2 ]
Lou, Jiadong [1 ]
Chen, Li [1 ]
Tzeng, Nian-Feng [1 ]
机构
[1] Univ Louisiana Lafayette, Lafayette, LA 70504 USA
[2] Guangzhou Univ, Guangzhou, Guangdong, Peoples R China
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
美国国家科学基金会;
关键词
Recommender System; Poisoning Attack; MATRIX FACTORIZATION; KNOWLEDGE; SYSTEMS; GRAPH;
D O I
10.1145/3460120.3484805
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collaborative filtering (CF) recommender systems have been extensively developed and widely deployed in various social websites, promoting products or services to the users of interest. Meanwhile, work has been attempted at poisoning attacks to CF recommender systems for distorting the recommend results to reap commercial or personal gains stealthily. While existing poisoning attacks have demonstrated their effectiveness with the offline social datasets, they are impractical when applied to the real setting on online social websites. This paper develops a novel and practical poisoning attack solution toward the CF recommender systems without knowing involved specific algorithms nor historical social data information a priori. Instead of directly attacking the unknown recommender systems, our solution performs certain operations on the social websites to collect a set of sampling data for use in constructing a surrogate model for deeply learning the inherent recommendation patterns. This surrogate model can estimate the item proximities, learned by the recommender systems. By attacking the surrogate model, the corresponding solutions (for availability and target attacks) can be directly migrated to attack the original recommender systems. Extensive experiments validate the generated surrogate model's reproductive capability and demonstrate the effectiveness of our attack upon various CF recommender algorithms.
引用
收藏
页码:51 / 68
页数:18
相关论文
共 81 条
[1]  
Amazon, ROB TXT
[2]  
Amazon, 2020, AM
[3]   Global citation recommendation using knowledge graphs [J].
Ayala-Gomez, Frederick ;
Daroczy, Balint ;
Benczur, Andras ;
Mathioudakis, Michael ;
Gionis, Aristides .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (05) :3089-3100
[4]  
Barkan Oren, 2016, IEEE INT WORKSHOP MA
[5]   Large-Scale Machine Learning with Stochastic Gradient Descent [J].
Bottou, Leon .
COMPSTAT'2010: 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL STATISTICS, 2010, :177-186
[6]  
Breese J. S., 1998, UAI, P43, DOI 10.48550/arXiv.1301.7363
[7]  
BrovmanYuri M., 2020, COMPLEMENTARY ITEM R
[8]  
Burke Robin, 2005, Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), 19th International Joint Conference on Artificial Intelligence (IJCAI 2005, P17
[9]  
Burke Robin, 2005, PERSONALIZATION
[10]  
Canny J., 2002, Proceedings of SIGIR 2002. Twenty-Fifth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, P238, DOI 10.1145/564376.564419