Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack
نویسندگان
چکیده
To explore the robustness of recommender systems , researchers have proposed various shilling attack models and analyzed their adverse effects. Primitive attacks are highly feasible but less effective due to simplistic handcrafted rules, while upgraded more powerful costly difficult deploy because they require knowledge from recommendations. In this paper, we a novel called Graph cOnvolution-based generative ATtack (GOAT) balance attacks’ feasibility effectiveness. GOAT adopts primitive paradigm that assigns items for fake users by sampling generates ratings deep learning-based model. It deploys adversarial network (GAN) learns real rating distribution generate ratings. Additionally, generator combines tailored graph convolution structure leverages correlations between co-rated smoothen enhance authenticity. The extensive experiments on two public datasets evaluate GOAT’s performance multiple perspectives. Our study demonstrates technical building intelligent model with much-reduced cost, enables analysis threat such an guides investigating necessary prevention measures.
منابع مشابه
Shilling Attack Prevention for Recommender Systems Using Social-based Clustering
Shilling Attack Prevention for Recommender Systems Using Social-based Clustering Tak Man Desmond Lee A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for reco...
متن کاملShilling Attack Detection in Recommender Systems Using Classification Techniques
Collaborative filtering based recommender system is prone to shilling attacks because of its open nature. Shillers inject pseudonomous profiles in the system’s database with the intent of manipulating the recommendations to their benefits. Prior study has shown that the system’s behavior can be easily influenced by even a less number of shilling profiles. In this paper, we simulated various att...
متن کاملEffective Attack Models for Shilling Item-Based Collaborative Filtering Systems
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on userspecified judgments for building profiles. Attackers who cannot be readily distinguished from ordinary users may introduce biased data in an attempt to force the system to “adapt” in a manner...
متن کاملa new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
15 صفحه اولCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences
سال: 2021
ISSN: ['0020-0255', '1872-6291']
DOI: https://doi.org/10.1016/j.ins.2021.07.041