Proceedings of the 13th International Conference on Web Search and Data Mining 2020
DOI: 10.1145/3336191.3371877
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning in Recommender Systems (AML-RecSys)

Abstract: Latent-factor models (LFM) based on collaborative filtering (CF), such as matrix factorization (MF) and deep CF methods, are widely used in modern recommender systems (RS) due to their excellent performance and recommendation accuracy. Notwithstanding their great success, in recent years, it has been shown that these methods are vulnerable to adversarial examples, i.e., subtle but non-random perturbations designed to force recommendation models to produce erroneous outputs. The main reason for this behavior is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(21 citation statements)
references
References 118 publications
(199 reference statements)
0
21
0
Order By: Relevance
“…Smart IoT products are often delivered in several forms, such as services, applications, systems, platforms, etc., with different use cases [ 35 , 36 , 37 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Smart IoT products are often delivered in several forms, such as services, applications, systems, platforms, etc., with different use cases [ 35 , 36 , 37 ].…”
Section: Methodsmentioning
confidence: 99%
“…The implicit rating is an indirect way to obtain user opinions about a specific product or service. User ratings will be predicted by tracking users’ past behaviors, including clicks, views, favorites, and purchase data [ 33 , 35 , 39 ].…”
Section: Methodsmentioning
confidence: 99%
“…We have found very few papers where the quality of data used in POI recommendation is discussed, one example is [94] 18 . Whereas in the classical recommendation problem the issue of robust recommendation ś in the sense that the recommendation algorithm should not be too sensitive to attacks from malicious users ś has been researched in the past and revisited recently with a diferent name [16,34], there are several open issues about this topic regarding POI recommenders and LBSN data, such as: how can these types of systems be attacked? Is it possible to assess if the data already collected has sufered from such attacks?…”
Section: Future Directionsmentioning
confidence: 99%
“…We have found very few papers where the quality of data used in POI recommendation is discussed, one example is [115] 17 . Whereas in the classical recommendation problem the issue of robust recommendation -in the sense that the recommendation algorithm should not be too sensitive to attacks from malicious users -has been researched in the past and revisited recently with a different name [16,37], there are several open issues about this topic regarding POI recommenders and LBSN data, such as: how can these types of systems be attacked? Is it possible to assess if the data already collected has suffered from such attacks?…”
Section: Consider User Types or Rolesmentioning
confidence: 99%