Adversarial Attacks for Black-Box Recommender Systems via Copying Transferable Cross-Domain User Profiles

被引:5
|
作者
Fan, Wenqi [1 ]
Zhao, Xiangyu [2 ]
Li, Qing [1 ]
Derr, Tyler [3 ]
Ma, Yao [4 ]
Liu, Hui [5 ]
Wang, Jianping
Tang, Jiliang [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
[3] Vanderbilt Univ, Nashville, TN 37235 USA
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
[5] Michigan State Univ, Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Recommender systems; Closed box; Motion pictures; Data models; Reinforcement learning; Computational modeling; Behavioral sciences; adversarial attacks; black-box attacks; trustworthy recommender systems; cross-domain recommendations;
D O I
10.1109/TKDE.2023.3272652
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As widely used in data-driven decision-making, recommender systems have been recognized for their capabilities to provide users with personalized services in many user-oriented online services, such as E-commerce (e.g., Amazon, Taobao, etc.) and Social Media sites (e.g., Facebook and Twitter). Recent works have shown that deep neural networks-based recommender systems are highly vulnerable to adversarial attacks, where adversaries can inject carefully crafted fake user profiles (i.e., a set of items that fake users have interacted with) into a target recommender system to promote or demote a set of target items. Instead of generating users with fake profiles from scratch, in this article, we introduce a novel strategy to obtain "fake" user profiles via copying cross-domain user profiles, where a reinforcement learning based black-box attacking framework (CopyAttack+) is developed to effectively and efficiently select cross-domain user profiles from the source domain to attack the target system. Moreover, we propose to train a local surrogate system for mimicking adversarial black-box attacks in the source domain, so as to provide transferable signals with the purpose of enhancing the attacking strategy in the target black-box recommender system. Comprehensive experiments on three real-world datasets are conducted to demonstrate the effectiveness of the proposed attacking framework.
引用
收藏
页码:12415 / 12429
页数:15
相关论文
共 40 条
  • [21] Demographic Inference via Knowledge Transfer in Cross-Domain Recommender Systems
    Shang, Jin
    Sun, Mingxuan
    Collins-Thompson, Kevyn
    2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 1218 - 1223
  • [22] POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
    Chen, Jinyin
    Su, Mengmeng
    Shen, Shijing
    Xiong, Hui
    Zheng, Haibin
    COMPUTERS & SECURITY, 2019, 85 : 89 - 106
  • [23] HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization
    Liu, Zhaorong
    Xiong, Xi
    Li, Yuanyuan
    Yu, Yan
    Lu, Jiazhong
    Zhang, Shuai
    Xiong, Fei
    NEURAL NETWORKS, 2024, 178
  • [24] Knowledge transfer by domain-independent user latent factor for cross-domain recommender systems
    Sahu, Ashish Kumar
    Dwivedi, Pragya
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 320 - 333
  • [25] Source-free and black-box domain adaptation via distributionally adversarial training *
    Shi, Yucheng
    Wu, Kunhong
    Han, Yahong
    Shao, Yunfeng
    Li, Bingshuai
    Wu, Fei
    PATTERN RECOGNITION, 2023, 143
  • [26] Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems
    Wang, Fangwei
    Song, Ruixin
    Li, Qingru
    Wang, Changguang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT V, 2024, 14491 : 257 - 276
  • [27] Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems
    Xue, Meng
    Peng, Kuang
    Gong, Xueluan
    Zhang, Qian
    Chen, Yanjiao
    Li, Routing
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2023, 7 (03):
  • [28] Explain2Attack: Text Adversarial Attacks via Cross-Domain Interpretability
    Hossam, Mahmoud
    Trung Le
    Zhao, He
    Dinh Phung
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 8922 - 8928
  • [29] User and item spaces transfer from additional domains for cross-domain recommender systems
    Ashish Kumar Sahu
    Applied Intelligence, 2023, 53 : 5766 - 5783
  • [30] User and item spaces transfer from additional domains for cross-domain recommender systems
    Sahu, Ashish Kumar
    APPLIED INTELLIGENCE, 2023, 53 (05) : 5766 - 5783