Single-User Injection for Invisible Shilling Attack against Recommender Systems

被引:7
|
作者
Huang, Chengzhi [1 ]
Li, Hui [1 ]
机构
[1] Xiamen Univ, Minist Educ China, Key Lab Multimedia Trusted Percept & Efficient Co, Xiamen, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Shilling Attack; Recommender System; Adversarial Attack;
D O I
10.1145/3583780.3615062
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recommendation systems (RS) are crucial for alleviating the information overload problem. Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to launch attacks against RS to affect the decisions of normal users and gain illegal profits. Among various types of attacks, shilling attack is one of the most subsistent and profitable attacks. In shilling attack, an adversarial party injects a number of well-designed fake user profiles into the system to mislead RS so that the attack goal can be achieved. Although existing shilling attack methods have achieved promising results, they all adopt the attack paradigm of multi-user injection, where some fake user profiles are required. This paper provides the first study of shilling attack in an extremely limited scenario: only one fake user profile is injected into the victim RS to launch shilling attacks (i.e., single-user injection). We propose a novel single-user injection method SUI-Attack for invisible shilling attack. SUI-Attack is a graph based attack method that models shilling attack as a node generation task over the user-item bipartite graph of the victim RS, and it constructs the fake user profile by generating user features and edges that link the fake user to items. Extensive experiments demonstrate that SUI-Attack can achieve promising attack results in single-user injection. In addition to its attack power, SUI-Attack increases the stealthiness of shilling attack and reduces the risk of being detected. We provide our implementation at: https://github.com/KDEGroup/SUI-Attack.
引用
收藏
页码:864 / 873
页数:10
相关论文
共 50 条
  • [41] Bit and Power Allocation in Constrained Multicarrier Systems: The Single-User Case
    Nikolaos Papandreou
    Theodore Antonakopoulos
    EURASIP Journal on Advances in Signal Processing, 2008
  • [42] Single-User MIMO Systems for Simultaneous Wireless Information and Power Transfer
    Zhou, Jun
    Dai, Jian-Xin
    Liang, Jing-Wei
    Qi, Jie
    Liu, Shuai
    ELECTRONICS, COMMUNICATIONS AND NETWORKS V, 2016, 382 : 351 - 358
  • [43] Reverse Bandwagon Profile Inject Attack against Recommender Systems
    Zhang, Fuguo
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 15 - 18
  • [44] TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems
    Di Noia, Tommaso
    Malitesta, Daniele
    Mena, Felice Antonio
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 1 - 8
  • [45] Improved single-user detector for WCDMA systems based on Griffiths' algorithm
    Karlsson, J
    Imai, H
    IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 2352 - 2359
  • [46] Bit and power allocation in constrained multicarrier systems: The single-user case
    Papandreou, Nikolaos
    Antonakopoulos, Theodore
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008 (1)
  • [47] Hybrid Precoder and Combiner Design for Single-User mmWave MIMO Systems
    Zhang, Ran
    Zou, Weixia
    Wang, Ye
    Cui, Mingyang
    IEEE ACCESS, 2019, 7 : 63818 - 63828
  • [48] An Efficient CQI Feedback Scheme for Multi-user and Single-user MIMO/OFDMA Systems
    Cho, Myeon-gyun
    Kim, Shik
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 104 - 105
  • [49] Improved Linear Transmit Processing for Single-User and Multi-User MIMO Communications Systems
    Xiao, Pei
    Sellathurai, Mathini
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1768 - 1779
  • [50] Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis
    Xu, Yishu
    Zhang, Peng
    Yu, Hongtao
    Zhang, Fuzhi
    COMPUTER JOURNAL, 2024, 67 (02): : 604 - 616