Proceedings of the 13th ACM Conference on Recommender Systems 2019
DOI: 10.1145/3298689.3347050
|View full text |Cite
|
Sign up to set email alerts
|

Quick and accurate attack detection in recommender systems through user attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Variational Bayesian Principal Component Analysis (VBPCA) is a fully bayesian treatment of the linear latent variable model defined above, specifically proposed for missing value estimation [15]. Bayesian treatment is especially beneficial for application domains containing high fraction of missing values such as Recommender systems [30], [31]. Unlike PPCA models [29], VBPCA algorithm treats all the model parameters as random variables in addition to the factors.…”
Section: ) Bayesian Methodsmentioning
confidence: 99%
“…Variational Bayesian Principal Component Analysis (VBPCA) is a fully bayesian treatment of the linear latent variable model defined above, specifically proposed for missing value estimation [15]. Bayesian treatment is especially beneficial for application domains containing high fraction of missing values such as Recommender systems [30], [31]. Unlike PPCA models [29], VBPCA algorithm treats all the model parameters as random variables in addition to the factors.…”
Section: ) Bayesian Methodsmentioning
confidence: 99%
“…However, a lot of defense approaches against injecting fake users also have been proposed, including attack detection (Kumar, Garg, and Rana 2015;Aktukmak, Yilmaz, and Uysal 2019) and adversarial training (Wu et al 2021a,b). By applying these defense methods can mitigate the issues from fake users.…”
Section: Data Poisoning On Recommendation Systemmentioning
confidence: 99%
“…For news recommendation systems, we can inject fake users to achieve the goal of poisoning. However, some recent studies propose defense methods, such as detect fake users (Kumar, Garg, and Rana 2015;Aktukmak, Yilmaz, and Uysal 2019) and adversarial train (Wu et al 2021a,b), which mitigate the damage of poisoning. Nevertheless, news recommendation is different from other scenarios, because the item for recommendation is news, which contains more information and provides more spaces to be perturbed.…”
Section: Introductionmentioning
confidence: 99%
“…Few existing algorithms, such as CF-attack [36] and RL-attack [8], provide untargeted perturbations for recommender systems that reduce the model's prediction accuracy significantly. However, those methods do not work on deep sequential recommendation models, focus on attacking the model's prediction accuracy but not the ranked lists of all users, or are easily detectable as they make user or item perturbations [4,15]. Poisoning Attacks and Perturbations in Other Domains.…”
Section: Related Workmentioning
confidence: 99%
“…While existing work focuses on targeted attacks [8,12,16,18,19,39,49,59,68,69], and most work is on traditional non-deep recommendation systems [18,36,59,60] with detectable user or item perturbations [4,15], new methods are needed to study the impact of untargeted perturbations on deep sequential recommenders using minor interaction-level perturbations.…”
Section: Introductionmentioning
confidence: 99%