Adversarial Attacks for Black-Box Recommender Systems via Copying Transferable Cross-Domain User Profiles

被引:5
|
作者
Fan, Wenqi [1 ]
Zhao, Xiangyu [2 ]
Li, Qing [1 ]
Derr, Tyler [3 ]
Ma, Yao [4 ]
Liu, Hui [5 ]
Wang, Jianping
Tang, Jiliang [5 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
[3] Vanderbilt Univ, Nashville, TN 37235 USA
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
[5] Michigan State Univ, Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Recommender systems; Closed box; Motion pictures; Data models; Reinforcement learning; Computational modeling; Behavioral sciences; adversarial attacks; black-box attacks; trustworthy recommender systems; cross-domain recommendations;
D O I
10.1109/TKDE.2023.3272652
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As widely used in data-driven decision-making, recommender systems have been recognized for their capabilities to provide users with personalized services in many user-oriented online services, such as E-commerce (e.g., Amazon, Taobao, etc.) and Social Media sites (e.g., Facebook and Twitter). Recent works have shown that deep neural networks-based recommender systems are highly vulnerable to adversarial attacks, where adversaries can inject carefully crafted fake user profiles (i.e., a set of items that fake users have interacted with) into a target recommender system to promote or demote a set of target items. Instead of generating users with fake profiles from scratch, in this article, we introduce a novel strategy to obtain "fake" user profiles via copying cross-domain user profiles, where a reinforcement learning based black-box attacking framework (CopyAttack+) is developed to effectively and efficiently select cross-domain user profiles from the source domain to attack the target system. Moreover, we propose to train a local surrogate system for mimicking adversarial black-box attacks in the source domain, so as to provide transferable signals with the purpose of enhancing the attacking strategy in the target black-box recommender system. Comprehensive experiments on three real-world datasets are conducted to demonstrate the effectiveness of the proposed attacking framework.
引用
收藏
页码:12415 / 12429
页数:15
相关论文
共 40 条
  • [31] Enhancing Transferability of Black-box Adversarial Attacks via Lifelong Learning for Speech Emotion Recognition Models
    Ren, Zhao
    Han, Jing
    Cummins, Nicholas
    Schuller, Bjoern W.
    INTERSPEECH 2020, 2020, : 496 - 500
  • [32] Black-box adversarial examples via frequency distortion against fault diagnosis systems
    Lee, Sangho
    Kim, Hoki
    Lee, Woojin
    Son, Youngdoo
    APPLIED SOFT COMPUTING, 2025, 171
  • [33] Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
    Lee, Deokjae
    Moon, Seungyong
    Lee, Junhyeok
    Song, Hyun Oh
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
  • [34] KT-CDULF: Knowledge Transfer in Context-Aware Cross-Domain Recommender Systems via Latent User Profiling
    Cheema, Adeel Ashraf
    Sarfraz, Muhammad Shahzad
    Usman, Muhammad
    Zaman, Qamar Uz
    Habib, Usman
    Boonchieng, Ekkarat
    IEEE ACCESS, 2024, 12 : 102111 - 102125
  • [35] SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems
    Beijing University of Posts and Telecommunications, China
    IEEE Veh Technol Conf, 2022,
  • [36] SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems
    Li, Zeju
    Zhou, Jinfei
    Nan, Guoshun
    Li, Zhichun
    Cui, Qimei
    Tao, Xiaofeng
    2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [37] Adversarial Black-Box Attacks on Automatic Speech Recognition Systems using Multi-Objective Evolutionary Optimization
    Khare, Shreya
    Aralikatte, Rahul
    Mani, Senthil
    INTERSPEECH 2019, 2019, : 3208 - 3212
  • [38] Cross-Domain Transfer Learning with CoRTe: Consistent and Reliable Transfer from Black-Box to Lightweight Segmentation Model
    Cuttano, Claudia
    Tavera, Antonio
    Cermelli, Fabio
    Averta, Giuseppe
    Caputo, Barbara
    2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS, ICCVW, 2023, : 1404 - 1414
  • [39] Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques
    Lopez, Christian
    Solano, Jesus
    Rivera, Esteban
    Tengana, Lizzy
    Florez-Lozano, Johana
    Castelblanco, Alejandra
    Ochoa, Martin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1665 - 1685
  • [40] Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques
    Christian López
    Jesús Solano
    Esteban Rivera
    Lizzy Tengana
    Johana Florez-Lozano
    Alejandra Castelblanco
    Martín Ochoa
    International Journal of Information Security, 2023, 22 : 1665 - 1685