2022
DOI: 10.48550/arxiv.2201.12686
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Rank List Sensitivity of Recommender Systems to Interaction Perturbations

Abstract: While deep learning-based sequential recommender systems are widely used in practice, their sensitivity to untargeted training data perturbations is unknown. Untargeted perturbations aim to modify ranked recommendation lists for all users at test time, by inserting imperceptible input perturbations during training time. Existing perturbation methods are mostly targeted attacks optimized to change ranks of target items, but not suitable for untargeted scenarios. In this paper, we develop a novel framework in wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…Substitution-based adversarial attacks manipulate vulnerable items in previous or ongoing interactions to sabotage the recommendation (i.e., untargeted attacks) or manipulate the recommended items (i.e., targeted attacks) [16,20,26,37]. Previous works on profile pollution study attack algorithms and have the following limitations: (1) Existing methods designed for traditional recommenders can not be applied, or are not tailored for sequential recommenders [32,34,43]; (2) Previous methods do not explore substitution-based attacks, instead, they focus on the injection of adversarial items [36,43]; and (3) Adversarial defense methods are not discussed [24,32,34,36,43].…”
Section: Introductionmentioning
confidence: 99%
“…Substitution-based adversarial attacks manipulate vulnerable items in previous or ongoing interactions to sabotage the recommendation (i.e., untargeted attacks) or manipulate the recommended items (i.e., targeted attacks) [16,20,26,37]. Previous works on profile pollution study attack algorithms and have the following limitations: (1) Existing methods designed for traditional recommenders can not be applied, or are not tailored for sequential recommenders [32,34,43]; (2) Previous methods do not explore substitution-based attacks, instead, they focus on the injection of adversarial items [36,43]; and (3) Adversarial defense methods are not discussed [24,32,34,36,43].…”
Section: Introductionmentioning
confidence: 99%