Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling Attack

by   Fan Wu, et al.
Chongqing University

To explore the robustness of recommender systems, researchers have proposed various shilling attack models and analyzed their adverse effects. Primitive attacks are highly feasible but less effective due to simplistic handcrafted rules, while upgraded attacks are more powerful but costly and difficult to deploy because they require more knowledge from recommendations. In this paper, we explore a novel shilling attack called Graph cOnvolution-based generative shilling ATtack (GOAT) to balance the attacks' feasibility and effectiveness. GOAT adopts the primitive attacks' paradigm that assigns items for fake users by sampling and the upgraded attacks' paradigm that generates fake ratings by a deep learning-based model. It deploys a generative adversarial network (GAN) that learns the real rating distribution to generate fake ratings. Additionally, the generator combines a tailored graph convolution structure that leverages the correlations between co-rated items to smoothen the fake ratings and enhance their authenticity. The extensive experiments on two public datasets evaluate GOAT's performance from multiple perspectives. Our study of the GOAT demonstrates technical feasibility for building a more powerful and intelligent attack model with a much-reduced cost, enables analysis the threat of such an attack and guides for investigating necessary prevention measures.


page 1

page 2

page 3

page 4


Data Poisoning Attacks to Deep Learning Based Recommender Systems

Recommender systems play a crucial role in helping users to find their i...

Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles

Due to the pivotal role of Recommender Systems (RS) in guiding customers...

PORE: Provably Robust Recommender Systems against Data Poisoning Attacks

Data poisoning attacks spoof a recommender system to make arbitrary, att...

Poisoning Attacks to Graph-Based Recommender Systems

Recommender system is an important component of many web services to hel...

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Recommender systems play an important role in modern information and e-c...

Towards Robust Recommender Systems via Triple Cooperative Defense

Recommender systems are often susceptible to well-crafted fake profiles,...

An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network

As a widely deployed security scheme, text-based CAPTCHAs have become mo...

Please sign up or login with your details

Forgot password? Click here to reset