论文标题

使用增强用户配置文件的攻击推荐系统

Attacking Recommender Systems with Augmented User Profiles

论文作者

Lin, Chen, Chen, Si, Li, Hui, Xiao, Yanghua, Li, Lianyun, Yang, Qian

论文摘要

推荐系统(RS)已成为许多在线服务的重要组成部分。由于其在指导客户购买购买方面的关键作用,因此,不道德的政党自然而然地动机来欺骗利润。在本文中,我们研究了Shilling Attack:一种自卑而有利可图的攻击,在该攻击中,对抗方注入了许多用户资料来促进或降低目标项目。传统的先令攻击模型基于可以轻松检测到的简单启发式方法,或者直接采用了无RS设计的对抗性攻击方法。此外,文献中缺少对基于深度学习的RS影响的攻击影响的研究,从而使对真正的RS的先令攻击产生了令人怀疑的影响。我们提出了一个新颖的增强先令攻击框架(AUSH),并以生成对抗网络的想法实施。 Aush能够根据预算和复杂的攻击目标来调整针对RS的攻击,例如针对特定的用户组。我们在实验上表明,AUSH的攻击影响在包括经典和现代深度学习的RS在内的广泛RS上很明显,而最先进的攻击检测模型实际上是无法检测到的。

Recommendation Systems (RS) have become an essential part of many online services. Due to its pivotal role in guiding customers towards purchasing, there is a natural motivation for unscrupulous parties to spoof RS for profits. In this paper, we study the shilling attack: a subsistent and profitable attack where an adversarial party injects a number of user profiles to promote or demote a target item. Conventional shilling attack models are based on simple heuristics that can be easily detected, or directly adopt adversarial attack methods without a special design for RS. Moreover, the study on the attack impact on deep learning based RS is missing in the literature, making the effects of shilling attack against real RS doubtful. We present a novel Augmented Shilling Attack framework (AUSH) and implement it with the idea of Generative Adversarial Network. AUSH is capable of tailoring attacks against RS according to budget and complex attack goals, such as targeting a specific user group. We experimentally show that the attack impact of AUSH is noticeable on a wide range of RS including both classic and modern deep learning based RS, while it is virtually undetectable by the state-of-the-art attack detection model.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源