TY - GEN
T1 - Attacking Black-box Recommendations via Copying Cross-domain User Profiles
AU - Fan, Wenqi
AU - Derr, Tyler
AU - Zhao, Xiangyu
AU - Ma, Yao
AU - Liu, Hui
AU - Wang, Jianping
AU - Tang, Jiliang
AU - Li, Qing
N1 - Funding Information:
ACKNOWLEDGMENT The research described in this paper has been partly supported by an internal research fund from the Hong Kong Polytechnic University (project no. P0036200), the Hong Kong Research Grants Council (RGC) under the General Research Fund (project no. 11204919) and RIF project R5060-19. Tyler Derr, Xiangyu Zhao, Yao Ma and Jiliang Tang are supported by the National Science Foundation (NSF) under grant numbers IIS-1714741, IIS-1715940, IIS-1845081, IIS-1907704, IIS-1928278 and CNS-1815636.
Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Recently, recommender systems that aim to suggest personalized lists of items for users to interact with online have drawn a lot of attention. In fact, many of these state-of-the-art techniques have been deep learning based. Recent studies have shown that these deep learning models (in particular for recommendation systems) are vulnerable to attacks, such as data poisoning, which generates users to promote a selected set of items. However, more recently, defense strategies have been developed to detect these generated users with fake profiles. Thus, advanced injection attacks of creating more `realistic' user profiles to promote a set of items is still a key challenge in the domain of deep learning based recommender systems. In this work, we present our framework CopyAttack, which is a reinforcement learning based black-box attack method that harnesses real users from a source domain by copying their profiles into the target domain with the goal of promoting a subset of items. CopyAttack is constructed to both efficiently and effectively learn policy gradient networks that first select, and then further refine/craft, user profiles from the source domain to ultimately copy into the target domain. CopyAttack's goal is to maximize the hit ratio of the targeted items in the Top-k recommendation list of the users in the target domain. We have conducted experiments on two real-world datasets and have empirically verified the effectiveness of our proposed framework and furthermore performed a thorough model analysis.
AB - Recently, recommender systems that aim to suggest personalized lists of items for users to interact with online have drawn a lot of attention. In fact, many of these state-of-the-art techniques have been deep learning based. Recent studies have shown that these deep learning models (in particular for recommendation systems) are vulnerable to attacks, such as data poisoning, which generates users to promote a selected set of items. However, more recently, defense strategies have been developed to detect these generated users with fake profiles. Thus, advanced injection attacks of creating more `realistic' user profiles to promote a set of items is still a key challenge in the domain of deep learning based recommender systems. In this work, we present our framework CopyAttack, which is a reinforcement learning based black-box attack method that harnesses real users from a source domain by copying their profiles into the target domain with the goal of promoting a subset of items. CopyAttack is constructed to both efficiently and effectively learn policy gradient networks that first select, and then further refine/craft, user profiles from the source domain to ultimately copy into the target domain. CopyAttack's goal is to maximize the hit ratio of the targeted items in the Top-k recommendation list of the users in the target domain. We have conducted experiments on two real-world datasets and have empirically verified the effectiveness of our proposed framework and furthermore performed a thorough model analysis.
KW - Adversarial Attacks
KW - Black-box Attacks
KW - Cross-Domain
KW - Data Poisoning Attacks
KW - Recommender Systems
UR - http://www.scopus.com/inward/record.url?scp=85110796113&partnerID=8YFLogxK
U2 - 10.1109/ICDE51399.2021.00140
DO - 10.1109/ICDE51399.2021.00140
M3 - Conference article published in proceeding or book
T3 - Proceedings - International Conference on Data Engineering
SP - 1583
EP - 1594
BT - Proceedings - 2021 IEEE 37th International Conference on Data Engineering, ICDE 2021
T2 - 37th IEEE International Conference on Data Engineering, ICDE 2021
Y2 - 19 April 2021 through 22 April 2021
ER -