• Stars
    star
    129
  • Rank 279,262 (Top 6 %)
  • Language
  • License
    GNU General Publi...
  • Created over 4 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A curated collection of adversarial attack and defense on recommender systems.

Awesome Adversarial Learning on Recommender System (Updating)

Awesome Contributions Welcome

๐Ÿ‘‰ Table of Contents ๐Ÿ‘ˆ

Attack

2022

  • PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion, WSDM, ๐Ÿ“Paper
  • Targeted Data Poisoning Attack on News Recommendation System๏ผŒ Arxiv, ๐Ÿ“Paper
  • FedRecAttack: Model Poisoning Attack to Federated Recommendation, ICDE, ๐Ÿ“Paper, :octocat:Code
  • Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios, IJCAI, ๐Ÿ“Paper

2021

  • A Black-Box Attack Model for Visually-Aware Recommender Systems, WSDM, ๐Ÿ“Paper
  • Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling Attack, Information Sciences, ๐Ÿ“Paper
  • Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data, KDD, ๐Ÿ“Paper
  • Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems, KDD, ๐Ÿ“Paper
  • Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction, RecSys, ๐Ÿ“Paper
  • Membership Inference Attacks Against Recommender Systems, Arxiv, ๐Ÿ“Paper

2020

  • Data Poisoning Attacks on Neighborhood-based Recommender Systems, ETT, ๐Ÿ“Paper
  • Attacking Black-box Recommendations via Copying Cross-domain User Profiles, Arxiv, ๐Ÿ“Paper
  • Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems, SIGIR, ๐Ÿ“Paper
  • Adversarial Attacks on Linear Contextual Bandits, Arxiv, ๐Ÿ“Paper
  • Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start, Arxiv, ๐Ÿ“Paper, :octocat:Code
  • Influence Function based Data Poisoning Attacks to Top-N Recommender Systems, WWW, ๐Ÿ“Paper
  • TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems, Dependable and Secure Machine Learning (DSML), ๐Ÿ“Paper, :octocat:Code
  • Adversarial Attacks on Time Series, IEEE Transactions on Pattern Analysis and Machine Intelligence, ๐Ÿ“Paper
  • Attacking Recommender Systems with Augmented User Profiles, Arxiv, ๐Ÿ“Paper
  • Practical Data Poisoning Attack against Next-Item Recommendation, WWW, ๐Ÿ“Paper
  • PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems, ICDE, ๐Ÿ“Paper
  • Data Poisoning Attacks against Differentially Private Recommender Systems, SIGIR, ๐Ÿ“Paper
  • Revisiting Adversarially Learned Injection Attacks Against Recommender Systems, RecSys, ๐Ÿ“Paper

2019

  • Adversarial Attacks on an Oblivious Recommender, RecSys, ๐Ÿ“Paper
  • Targeted Poisoning Attacks on Social Recommender Systems, IEEE Global Communications Conference (GLOBECOM), ๐Ÿ“Paper
  • Data Poisoning Attacks on Graph Convolutional Matrix Completion๏ผŒInternational Conference on Algorithms and Architectures for Parallel Processing, ๐Ÿ“Paper
  • Data Poisoning Attacks on Stochastic Bandits, ICML, ๐Ÿ“Paper
  • Data Poisoning Attacks on Cross-domain Recommendation, CIKM, ๐Ÿ“Paper
  • Assessing the Impact of a User-Item Collaborative Attack on Class of Users, RecSys Workshop, ๐Ÿ“Paper

2018

  • Poisoning attacks to graph-based recommender systems, Annual Computer Security Applications Conference (ACSAC), ๐Ÿ“Paper, :octocat:Code

2017

  • Fake Co-visitation Injection Attacks to Recommender Systems, NDSS, ๐Ÿ“Paper
  • Hybrid attacks on model-based social recommender systems, Physica A: Statistical Mechanics and its Applications, ๐Ÿ“Paper

2016

  • Data Poisoning Attacks on Factorization-Based Collaborative Filtering, NIPS, ๐Ÿ“Paper, :octocat:Code
  • Segment-Focused Shilling Attacks against Recommendation Algorithms in Binary Ratings-based Recommender Systems, International Journal of Hybrid Information Technology, ๐Ÿ“Paper
  • Shilling attack models in recommender system, International Conference on Inventive Computation Technologies (ICICT), ๐Ÿ“Paper

Defense

2021

  • Graph Embedding for Recommendation against Attribute Inference Attacks, WWW, ๐Ÿ“Paper
  • Understanding the Effects of Adversarial Personalized Ranking Optimization Method on Recommendation Quality, Arxiv, ๐Ÿ“Paper

2020

  • GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection, Arxiv, ๐Ÿ“Paper
  • On Detecting Data Pollution Attacks On Recommender Systems Using Sequential GANs, ICML, ๐Ÿ“Paper
  • A Robust Hierarchical Graph Convolutional Network Model for Collaborative Filtering, Arxiv, ๐Ÿ“Paper
  • Adversarial Collaborative Auto-encoder for Top-N Recommendation, Arxiv, ๐Ÿ“Paper
  • Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems, Arxiv, ๐Ÿ“Paper
  • Adversarial Learning to Compare: Self-Attentive Prospective Customer Recommendation in Location based Social Networks, WSDM, ๐Ÿ“Paper
  • Certifiable Robustness to Discrete Adversarial Perturbations for Factorization Machines, SIGIR, ๐Ÿ“Paper
  • Directional Adversarial Training for Recommender Systems, ECAI, ๐Ÿ“Paper
  • Shilling Attack Detection Scheme in Collaborative Filtering Recommendation System Based on Recurrent Neural Network, Future of Information and Communication Conference, ๐Ÿ“Paper
  • Learning Product Rankings Robust to Fake Users๏ผŒ Arxiv, ๐Ÿ“Paper
  • Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning, WSDM, ๐Ÿ“Paper
  • Quick and accurate attack detection in recommender systems through user attributes, RecSys, ๐Ÿ“Paper
  • Global and Local Differential Privacy for Collaborative Bandits, RecSys, ๐Ÿ“Paper
  • Towards Safety and Sustainability: Designing Local Recommendations for Post-pandemic World, RecSys, ๐Ÿ“Paper
  • GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection, RecSys, ๐Ÿ“Paper

2019

  • Adversarial Training Towards Robust Multimedia Recommender System, TKDE, ๐Ÿ“Paper, :octocat:Code
  • Adversarial Collaborative Neural Network for Robust Recommendation, SIGIR, ๐Ÿ“Paper
  • Adversarial Mahalanobis Distance-based Attentive Song Recommender for Automatic Playlist Continuation, SIGIR, ๐Ÿ“Paper, :octocat:Code
  • Adversarial tensor factorization for context-aware recommendation, RecSys, ๐Ÿ“Paper, [:octocat:Code]
  • Adversarial Training-Based Mean Bayesian Personalized Ranking for Recommender System, IEEE Access, ๐Ÿ“Paper
  • Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach๏ผŒWWW, ๐Ÿ“Paper
  • Shilling Attack Detection in Recommender System Using PCA and SVM, Emerging technologies in data mining and information security, ๐Ÿ“Paper

2018

  • Adversarial Personalized Ranking for Recommendation, SIGIR, ๐Ÿ“Paper, :octocat:Code
  • A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network, The Computer Journal, ๐Ÿ“Paper
  • Adversarial Sampling and Training for Semi-Supervised Information Retrieval, WWW, ๐Ÿ“Paper
  • Enhancing the Robustness of Neural Collaborative Filtering Systems Under Malicious Attacks, IEEE Transactions on Multimedia, ๐Ÿ“Paper
  • An Obfuscated Attack Detection Approach for Collaborative Recommender Systems, Journal of computing and information technology, ๐Ÿ“Paper

2017

  • Detecting Abnormal Profiles in Collaborative Filtering Recommender Systems, Journal of Intelligent Information Systems, ๐Ÿ“Paper
  • Detection of Pro๏ฌle Injection Attacks in Social Recommender Systems Using Outlier Analysis, IEEE Big Data, ๐Ÿ“Paper
  • Prevention of shilling attack in recommender systems using discrete wavelet transform and support vector machine, Eighth International Conference on Advanced Computing (ICoAC), ๐Ÿ“Paper

2016

  • Discovering shilling groups in a real e-commerce platform, Online Information Review, ๐Ÿ“Paper
  • Shilling attack detection in collaborative filtering recommender system by PCA detection and perturbation, International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), ๐Ÿ“Paper
  • Re-scale AdaBoost for attack detection in collaborative filtering recommender systems, KBS, ๐Ÿ“Paper
  • SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems, Neurocomputing, ๐Ÿ“Paper

Survey

  • A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks, ACM Computing Surveys (CSUR) 2021, ๐Ÿ“Paper
  • Adversarial Machine Learning in Recommender Systems: State of the art and Challenges, Arxiv2020, ๐Ÿ“Paper
  • A Survey of Adversarial Learning on Graphs, Arxiv2020, ๐Ÿ“Paper
  • Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study, Arxiv2020, ๐Ÿ“Paper
  • Shilling attacks against collaborative recommender systems: a review, Artificial Intelligence Review, ๐Ÿ“Paper
  • Adversarial Attacks and Defenses in Images, Graphs and Text: A Review, Arxiv2019, ๐Ÿ“Paper
  • A Survey of Attacks in Collaborative Recommender Systems, Journal of Computational and Theoretical Nanoscience 2019, ๐Ÿ“Paper
  • Adversarial Attack and Defense on Graph Data: A Survey, Arxiv2018, ๐Ÿ“Paper
  • Adversarial Machine Learning: The Case of Recommendation Systems, IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), ๐Ÿ“Paper
  • Recommender Systems: Attack Types and Strategies, AAAI2005, ๐Ÿ“Paper
  • A Review of Attacks and Its Detection Attributes on Collaborative Recommender Systems, IJARCS2017, ๐Ÿ“Paper

Resource

  • Awesome Graph Adversarial Learning :octocat:Link
  • Awesome Graph Attack and Defense Papers :octocat:Link
  • Graph Adversarial Learning Literature :octocat:Link
  • A Complete List of All (arXiv) Adversarial Example Papers ๐ŸŒLink
  • Robust Matrix Completion via Robust Gradient Descent ๐ŸŒLink
  • **Adversarial Machine Learning in Recommender Systems:Literature Review and Future Visions ** :octocat:Link

Slides

  • UCI Lecture ๐ŸŒLink
  • RecSys2020 Tutorial :octocat:Link

More Repositories

1

Awesome-Masked-Autoencoders

A collection of literature after or concurrent with Masked Autoencoder (MAE) (Kaiming He el al.).
761
star
2

Graph-Adversarial-Learning

A curated collection of adversarial attack and defense on graph data.
Python
546
star
3

GraphGallery

GraphGallery is a gallery for benchmarking Graph Neural Networks, From InplusLab.
Python
458
star
4

Awesome-Learning-Resource

A curated list of all kinds of learning resources, blogs, books, videos and so on.
291
star
5

Awesome-Fair-Graph-Learning

Paper List for Fair Graph Learning (FairGL).
123
star
6

ICLR2023-OpenReviewData

ICLR 2023 Paper submission analysis from https://openreview.net/group?id=ICLR.cc/2023/Conference
Jupyter Notebook
100
star
7

ICLR2022-OpenReviewData

ICLR 2022 Paper submission trend analysis from https://openreview.net/group?id=ICLR.cc/2022/Conference
Jupyter Notebook
84
star
8

GreatX

A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).
Python
83
star
9

MaskGAE

[KDD 2023] Whatโ€™s Behind the Mask: Understanding Masked Graph Modeling for Graph Autoencoders
Python
73
star
10

SpikeNet

[AAAI 2023] Scaling Up Dynamic Graph Representation Learning via Spiking Neural Networks
Python
55
star
11

ICDM2022_competition_3rd_place_solution

3rd place solution of ICDM 2022 Risk Commodities Detection on Large-Scale E-Commence Graphs
Python
36
star
12

GraphData

A collection of graph data used for semi-supervised node classification.
34
star
13

DCIC-2023-Solution

DCIC2023 Fraud Risk Identification Competition Solution.
Jupyter Notebook
23
star
14

SpikeGCL

[ICLR 2024] Official implementation of Spiking Graph Contrastive Learning (0๏ธโƒฃ1๏ธโƒฃ SpikeGCL)
Python
22
star
15

arxiv-daily

arxiv-daily
Python
12
star
16

Awesome-SAR-Detection

A curated list of SAR detection datasets.
9
star
17

GUARD

[CIKM 2023] GUARD: Graph Universal Adversarial Defense
Python
9
star
18

SGAttack

Official Repository for "Adversarial Attack on Large Scale Graph." [TKDE 2021]
Jupyter Notebook
9
star
19

Mooon

Graph Data Augmentation Library for PyTorch Geometric
Python
6
star
20

STEP

Python
6
star
21

MAGI

[KDD 2024] Revisiting Modularity Maximization for Graph Clustering: A Contrastive Learning Perspective
Python
6
star
22

SAT

Python
5
star
23

SpikingNeuralNetworks

Spiking Neural Networks ๏ผˆ่„‰ๅ†ฒ็ฅž็ป็ฝ‘็ปœ่ฐƒ็ ”๏ผ‰
5
star
24

MedianGCN

Official PyTorch implementation of MedianGCN and TrimmedGCN in Understanding Structural Vulnerability in Graph Convolutional Networks (IJCAI 2021).
Jupyter Notebook
5
star
25

CIKM22_FL_Competition

4th place (4/1746) solution of CIKM 2022 AnalytiCup Competition.
Python
4
star
26

GraphAdv

TensorFlow 2 implementation of state-of-the-arts graph adversarial attack and defense models (methods).
Python
4
star
27

GraphSSM

[arXiv 2024] State Space Models on Temporal Graphs: A First-Principles Study
4
star
28

SVD_HMM

Python implement of SVD+HMM for face recognition.
Jupyter Notebook
3
star
29

EdisonLeeeee.github.io

Github pages
Python
3
star
30

BlockGCL

PyTorch implementation of Blockwise Graph Contrastive Learning (BlockGCL)
Python
3
star
31

SAR-Ship-Detection-Detectron2

SAR Ship detection with Detection2
Jupyter Notebook
3
star
32

CenterSAR

CenterNet for SAR ship detection based on Detectron2
Jupyter Notebook
2
star
33

SGC_tf2.0

Python implement of SGC with Tensorflow 2.0.
Jupyter Notebook
2
star
34

Hetero2Net

Python
2
star
35

EdisonLeeeee

1
star
36

tensorflow-jupyterlab-docker

Tensorflow 2.1 GPU with Python 3.6 and jupyterlab
Dockerfile
1
star
37

Introduction_to_graph_adversarial_learning

An introduction to graph adversarial learning
1
star
38

TemporalDatasets

1
star
39

DropPath

Implementation of DropPath: A Structured Dropout for Graph Neural Networks in PyTorch.
Python
1
star
40

glcore

graph learing toolbox
Cuda
1
star
41

lrGAE

Python
1
star