Adversarial Attacks for Black-Box Recommender Systems via Copying Transferable Cross-Domain User Profiles

被引:5
|
作者
Fan, Wenqi [1 ]
Zhao, Xiangyu [2 ]
Li, Qing [1 ]
Derr, Tyler [3 ]
Ma, Yao [4 ]
Liu, Hui [5 ]
Wang, Jianping
Tang, Jiliang [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
[3] Vanderbilt Univ, Nashville, TN 37235 USA
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
[5] Michigan State Univ, Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Recommender systems; Closed box; Motion pictures; Data models; Reinforcement learning; Computational modeling; Behavioral sciences; adversarial attacks; black-box attacks; trustworthy recommender systems; cross-domain recommendations;
D O I
10.1109/TKDE.2023.3272652
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As widely used in data-driven decision-making, recommender systems have been recognized for their capabilities to provide users with personalized services in many user-oriented online services, such as E-commerce (e.g., Amazon, Taobao, etc.) and Social Media sites (e.g., Facebook and Twitter). Recent works have shown that deep neural networks-based recommender systems are highly vulnerable to adversarial attacks, where adversaries can inject carefully crafted fake user profiles (i.e., a set of items that fake users have interacted with) into a target recommender system to promote or demote a set of target items. Instead of generating users with fake profiles from scratch, in this article, we introduce a novel strategy to obtain "fake" user profiles via copying cross-domain user profiles, where a reinforcement learning based black-box attacking framework (CopyAttack+) is developed to effectively and efficiently select cross-domain user profiles from the source domain to attack the target system. Moreover, we propose to train a local surrogate system for mimicking adversarial black-box attacks in the source domain, so as to provide transferable signals with the purpose of enhancing the attacking strategy in the target black-box recommender system. Comprehensive experiments on three real-world datasets are conducted to demonstrate the effectiveness of the proposed attacking framework.
引用
收藏
页码:12415 / 12429
页数:15
相关论文
共 40 条
  • [1] Attacking Black-box Recommendations via Copying Cross-domain User Profiles
    Fan, Wenqi
    Derr, Tyler
    Zhao, Xiangyu
    Ma, Yao
    Liu, Hui
    Wang, Jianping
    Tang, Jiliang
    Li, Qing
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 1583 - 1594
  • [2] Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation
    Patel, Umang
    Bhilare, Shruti
    Hati, Avik
    PATTERN ANALYSIS AND APPLICATIONS, 2024, 27 (02)
  • [3] Black-box transferable adversarial attacks based on ensemble advGAN
    Huang S.-N.
    Li Y.-X.
    Mao Y.-H.
    Ban A.-Y.
    Zhang Z.-Y.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (10): : 2391 - 2398
  • [4] Shilling Black-Box Recommender Systems by Learning to Generate Fake User Profiles
    Lin, Chen
    Chen, Si
    Zeng, Meifang
    Zhang, Sheng
    Gao, Min
    Li, Hui
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (01) : 1305 - 1319
  • [5] Black-box attacks on dynamic graphs via adversarial topology perturbations
    Tao, Haicheng
    Cao, Jie
    Chen, Lei
    Sun, Hongliang
    Shi, Yong
    Zhu, Xingquan
    NEURAL NETWORKS, 2024, 171 : 308 - 319
  • [6] Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
    Aithal, Manjushree B.
    Li, Xiaohua
    IEEE ACCESS, 2022, 10 : 12395 - 12411
  • [7] Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization
    Moon, Seungyong
    An, Gaon
    Song, Hyun Oh
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 97, 2019, 97
  • [8] Ensemble adversarial black-box attacks against deep learning systems
    Hang, Jie
    Han, Keji
    Chen, Hui
    Li, Yun
    PATTERN RECOGNITION, 2020, 101
  • [9] Cross-domain recommender systems via multimodal domain adaptation
    Shyam, Adamya
    Kamani, Ramya
    Kagita, Venkateswara Rao
    Kumar, Vikas
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [10] Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
    Zhang, Yinghua
    Song, Yangqiu
    Bai, Kun
    Yang, Qiang
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 2661 - 2670