Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, N Quoc Viet Hung, TT Nguyen… - ACM Computing …, 2024 - dl.acm.org
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …

Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives

Y Himeur, SS Sohail, F Bensaali, A Amira… - Computers & Security, 2022 - Elsevier
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

Hidden backdoors in human-centric language models

S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu… - Proceedings of the 2021 …, 2021 - dl.acm.org
Natural language processing (NLP) systems have been proven to be vulnerable to backdoor
attacks, whereby hidden features (backdoors) are trained into a language model and may …

Black-box attacks on sequential recommenders via data-free model extraction

Z Yue, Z He, H Zeng, J McAuley - … of the 15th ACM conference on …, 2021 - dl.acm.org
We investigate whether model extraction can be used to 'steal'the weights of sequential
recommender systems, and the potential threats posed to victims of such attacks. This type …

Manipulating federated recommender systems: Poisoning with synthetic users and its countermeasures

W Yuan, QVH Nguyen, T He, L Chen… - Proceedings of the 46th …, 2023 - dl.acm.org
Federated Recommender Systems (FedRecs) are considered privacy-preserving
techniques to collaboratively learn a recommendation model without sharing user data …

Certified robustness of nearest neighbors against data poisoning and backdoor attacks

J Jia, Y Liu, X Cao, NZ Gong - Proceedings of the AAAI Conference on …, 2022 - ojs.aaai.org
Data poisoning attacks and backdoor attacks aim to corrupt a machine learning classifier via
modifying, adding, and/or removing some carefully selected training examples, such that the …

Fedrecattack: Model poisoning attack to federated recommendation

D Rong, S Ye, R Zhao, HN Yuen… - 2022 IEEE 38th …, 2022 - ieeexplore.ieee.org
Federated Recommendation (FR) has received con-siderable popularity and attention in the
past few years. In FR, for each user, its feature vector and interaction data are kept locally on …

Influence-driven data poisoning for robust recommender systems

C Wu, D Lian, Y Ge, Z Zhu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have shown that recommender systems are vulnerable, and it is easy for
attackers to inject well-designed malicious profiles into the system, resulting in biased …

Knowledge-enhanced black-box attacks for recommendations

J Chen, W Fan, G Zhu, X Zhao, C Yuan, Q Li… - Proceedings of the 28th …, 2022 - dl.acm.org
Recent studies have shown that deep neural networks-based recommender systems are
vulnerable to adversarial attacks, where attackers can inject carefully crafted fake user …