Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Manipulating recommender systems: A survey of poisoning attacks and countermeasures
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …
help users locate specific information in a sea of data. However, existing studies show that …
Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
Recent developments in recommender systems: A survey
In this technical survey, the latest advancements in the field of recommender systems are
comprehensively summarized. The objective of this study is to provide an overview of the …
comprehensively summarized. The objective of this study is to provide an overview of the …
Poisoning GNN-based recommender systems with generative surrogate-based attacks
With recent advancements in graph neural networks (GNN), GNN-based recommender
systems (gRS) have achieved remarkable success in the past few years. Despite this …
systems (gRS) have achieved remarkable success in the past few years. Despite this …
Black-box attacks on sequential recommenders via data-free model extraction
We investigate whether model extraction can be used to 'steal'the weights of sequential
recommender systems, and the potential threats posed to victims of such attacks. This type …
recommender systems, and the potential threats posed to victims of such attacks. This type …
A comprehensive survey on trustworthy recommender systems
As one of the most successful AI-powered applications, recommender systems aim to help
people make appropriate decisions in an effective and efficient way, by providing …
people make appropriate decisions in an effective and efficient way, by providing …
Influence-driven data poisoning for robust recommender systems
Recent studies have shown that recommender systems are vulnerable, and it is easy for
attackers to inject well-designed malicious profiles into the system, resulting in biased …
attackers to inject well-designed malicious profiles into the system, resulting in biased …
Knowledge-enhanced black-box attacks for recommendations
Recent studies have shown that deep neural networks-based recommender systems are
vulnerable to adversarial attacks, where attackers can inject carefully crafted fake user …
vulnerable to adversarial attacks, where attackers can inject carefully crafted fake user …
Triple adversarial learning for influence based poisoning attack in recommender systems
As an important means to solve information overload, recommender systems have been
widely applied in many fields, such as e-commerce and advertising. However, recent studies …
widely applied in many fields, such as e-commerce and advertising. However, recent studies …
FedAttack: Effective and covert poisoning attack on federated recommendation via hard sampling
Federated learning (FL) is a feasible technique to learn personalized recommendation
models from decentralized user data. Unfortunately, federated recommender systems are …
models from decentralized user data. Unfortunately, federated recommender systems are …