Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Manipulating recommender systems: A survey of poisoning attacks and countermeasures
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …
help users locate specific information in a sea of data. However, existing studies show that …
Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Hidden backdoors in human-centric language models
Natural language processing (NLP) systems have been proven to be vulnerable to backdoor
attacks, whereby hidden features (backdoors) are trained into a language model and may …
attacks, whereby hidden features (backdoors) are trained into a language model and may …
Black-box attacks on sequential recommenders via data-free model extraction
We investigate whether model extraction can be used to 'steal'the weights of sequential
recommender systems, and the potential threats posed to victims of such attacks. This type …
recommender systems, and the potential threats posed to victims of such attacks. This type …
Manipulating federated recommender systems: Poisoning with synthetic users and its countermeasures
Federated Recommender Systems (FedRecs) are considered privacy-preserving
techniques to collaboratively learn a recommendation model without sharing user data …
techniques to collaboratively learn a recommendation model without sharing user data …
Certified robustness of nearest neighbors against data poisoning and backdoor attacks
Data poisoning attacks and backdoor attacks aim to corrupt a machine learning classifier via
modifying, adding, and/or removing some carefully selected training examples, such that the …
modifying, adding, and/or removing some carefully selected training examples, such that the …
Fedrecattack: Model poisoning attack to federated recommendation
D Rong, S Ye, R Zhao, HN Yuen… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
Federated Recommendation (FR) has received con-siderable popularity and attention in the
past few years. In FR, for each user, its feature vector and interaction data are kept locally on …
past few years. In FR, for each user, its feature vector and interaction data are kept locally on …
Influence-driven data poisoning for robust recommender systems
Recent studies have shown that recommender systems are vulnerable, and it is easy for
attackers to inject well-designed malicious profiles into the system, resulting in biased …
attackers to inject well-designed malicious profiles into the system, resulting in biased …
Knowledge-enhanced black-box attacks for recommendations
Recent studies have shown that deep neural networks-based recommender systems are
vulnerable to adversarial attacks, where attackers can inject carefully crafted fake user …
vulnerable to adversarial attacks, where attackers can inject carefully crafted fake user …