A novel shilling attack on black-box recommendation systems for multiple targets

被引:0
|
作者
Shuangyu Liu [1 ]
Siyang Yu [1 ]
Huan Li [2 ]
Zhibang Yang [1 ]
Mingxing Duan [3 ]
Xiangke Liao [1 ]
机构
[1] Hunan University,School of Information Science and Engineering
[2] Hunan University of Finance and Economics,College of Information Technology and Management
[3] Changsha University,Hunan Province Key Laboratory of Industrial Internet Technology and Security
[4] Hunan University,Shenzhen Institute
[5] National University of Defense Technology,School of Computer Science
关键词
Recommender system; Shilling attack; GAN; Multi-target attack;
D O I
10.1007/s00521-024-10798-8
中图分类号
学科分类号
摘要
In the digital era, e-platforms ubiquitously deploy recommendation systems, utilizing machine learning paradigms to tailor content according to user preferences and needs. Yet, the integrity of these systems is often compromised by shilling attacks, where malicious entities inject fake user profiles to skew product exposure and sales. This vulnerability has catalyzed research efforts to bolster the robustness and security of recommendation systems, primarily through controlled attacks and reinforcement training. This paper introduces an innovative approach to combat the inefficiency of traditional single-target shilling attacks. We propose a novel multi-target shilling strategy for black-box recommendation systems, capable of generating convincing and aggressive fake user profiles. Given the complexity of the recommendation system algorithms, we employ surrogate models to replicate and understand the target system’s behavior. The surrogate model is then subjected to attacks using our proposed methodology. An attack is deemed successful when it achieves an 80% or higher success rate against the surrogate, preluding an attack on the actual recommendation system. Our model, RWA-GAN, stands out by integrating two components: a generative adversarial network (GAN) for crafting realistic fake user profiles, and a mechanism to enhance attack success rates. This dual approach not only expedites the attack process but also ensures the generation of more authentic and well-distributed fake profiles, making the model easier to migrate. Additionally, the paper delineates several defense strategies against such attacks, contributing significantly to the discourse on enhancing the robustness of recommender systems.
引用
收藏
页码:3399 / 3417
页数:18
相关论文
共 50 条
  • [21] Sparse Black-Box Video Attack with Reinforcement Learning
    Xingxing Wei
    Huanqian Yan
    Bo Li
    International Journal of Computer Vision, 2022, 130 : 1459 - 1473
  • [22] Sparse Black-Box Video Attack with Reinforcement Learning
    Wei, Xingxing
    Yan, Huanqian
    Li, Bo
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2022, 130 (06) : 1459 - 1473
  • [23] Projection & Probability-Driven Black-Box Attack
    Li, Jie
    Li, Rongrong
    Liu, Hong
    Liu, Jianzhuang
    Zhong, Bineng
    Deng, Cheng
    Tian, Qi
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 359 - 368
  • [24] An Effective Way to Boost Black-Box Adversarial Attack
    Feng, Xinjie
    Yao, Hongxun
    Che, Wenbin
    Zhang, Shengping
    MULTIMEDIA MODELING (MMM 2020), PT I, 2020, 11961 : 393 - 404
  • [25] Generalizable Black-Box Adversarial Attack With Meta Learning
    Yin, Fei
    Zhang, Yong
    Wu, Baoyuan
    Feng, Yan
    Zhang, Jingyi
    Fan, Yanbo
    Yang, Yujiu
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (03) : 1804 - 1818
  • [26] Black-box Bayesian adversarial attack with transferable priors
    Zhang, Shudong
    Gao, Haichang
    Shu, Chao
    Cao, Xiwen
    Zhou, Yunyi
    He, Jianping
    MACHINE LEARNING, 2024, 113 (04) : 1511 - 1528
  • [27] A black-box adversarial attack on demand side management
    Cramer, Eike
    Gao, Ji
    COMPUTERS & CHEMICAL ENGINEERING, 2024, 186
  • [28] Adaptive hyperparameter optimization for black-box adversarial attack
    Zhenyu Guan
    Lixin Zhang
    Bohan Huang
    Bihe Zhao
    Song Bian
    International Journal of Information Security, 2023, 22 : 1765 - 1779
  • [29] SCHMIDT: IMAGE AUGMENTATION FOR BLACK-BOX ADVERSARIAL ATTACK
    Shi, Yucheng
    Han, Yahong
    2018 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2018,
  • [30] Accelerate Black-Box Attack with White-Box Prior Knowledge
    Cai, Jinghui
    Wang, Boyang
    Wang, Xiangfeng
    Jin, Bo
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING, PT II, 2019, 11936 : 394 - 405