Reverse Attack: Black-box Attacks on Collaborative Recommendation

被引:14
作者
Zhang, Yihe [1 ]
Yuan, Xu [1 ]
Li, Jin [2 ]
Lou, Jiadong [1 ]
Chen, Li [1 ]
Tzeng, Nian-Feng [1 ]
机构
[1] Univ Louisiana Lafayette, Lafayette, LA 70504 USA
[2] Guangzhou Univ, Guangzhou, Guangdong, Peoples R China
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
美国国家科学基金会;
关键词
Recommender System; Poisoning Attack; MATRIX FACTORIZATION; KNOWLEDGE; SYSTEMS; GRAPH;
D O I
10.1145/3460120.3484805
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collaborative filtering (CF) recommender systems have been extensively developed and widely deployed in various social websites, promoting products or services to the users of interest. Meanwhile, work has been attempted at poisoning attacks to CF recommender systems for distorting the recommend results to reap commercial or personal gains stealthily. While existing poisoning attacks have demonstrated their effectiveness with the offline social datasets, they are impractical when applied to the real setting on online social websites. This paper develops a novel and practical poisoning attack solution toward the CF recommender systems without knowing involved specific algorithms nor historical social data information a priori. Instead of directly attacking the unknown recommender systems, our solution performs certain operations on the social websites to collect a set of sampling data for use in constructing a surrogate model for deeply learning the inherent recommendation patterns. This surrogate model can estimate the item proximities, learned by the recommender systems. By attacking the surrogate model, the corresponding solutions (for availability and target attacks) can be directly migrated to attack the original recommender systems. Extensive experiments validate the generated surrogate model's reproductive capability and demonstrate the effectiveness of our attack upon various CF recommender algorithms.
引用
收藏
页码:51 / 68
页数:18
相关论文
共 81 条
[61]  
Sarwar B. M., 2001, Proceedings of the 10th International Conference on World Wide Web, WWW '01, P285
[62]   Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning [J].
Schuster, Roei ;
Schuster, Tal ;
Meri, Yoav ;
Shmatikov, Vitaly .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1295-1313
[63]   Attacking Item-Based Recommender Systems with Power Items [J].
Seminario, Carlos E. ;
Wilson, David C. .
PROCEEDINGS OF THE 8TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS'14), 2014, :57-64
[64]   Two Decades of Recommender Systems at Amazon.com [J].
Smith, Brent ;
Linden, Greg .
IEEE INTERNET COMPUTING, 2017, 21 (03) :12-18
[65]   PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems [J].
Song, Junshuai ;
Li, Zhao ;
Hu, Zehong ;
Wu, Yucheng ;
Li, Zhenpeng ;
Li, Jian ;
Gao, Jun .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :157-168
[66]   Recommender systems based on social networks [J].
Sun, Zhoubao ;
Han, Lixin ;
Huang, Wenliang ;
Wang, Xueting ;
Zeng, Xiaoqin ;
Wang, Min ;
Yan, Hong .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 99 :109-119
[67]  
Synced, 2020, CHINAS AI POWERED NE
[68]   Adversarial Training Towards Robust Multimedia Recommender System [J].
Tang, Jinhui ;
Du, Xiaoyu ;
He, Xiangnan ;
Yuan, Fajie ;
Tian, Qi ;
Chua, Tat-Seng .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (05) :855-867
[69]  
Wang C, 2018, AAAI CONF ARTIF INTE, P434
[70]   Collaborative Deep Learning for Recommender Systems [J].
Wang, Hao ;
Wang, Naiyan ;
Yeung, Dit-Yan .
KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2015, :1235-1244