论文标题
通过复制跨域用户配置文件来攻击黑盒建议
Attacking Black-box Recommendations via Copying Cross-domain User Profiles
论文作者
论文摘要
最近,推荐的系统旨在提出个性化的项目列表供用户与在线互动的用户互动。实际上,其中许多最先进的技术都是基于深度学习的。最近的研究表明,这些深度学习模型(尤其是针对推荐系统)容易受到攻击的影响,例如数据中毒,这会产生用户来推广一组选定的项目。但是,最近,已经制定了防御策略来检测具有虚假配置文件的这些生成的用户。因此,在基于深度学习的推荐系统的领域中,创建更多“现实”用户配置文件的高级注入攻击仍然是一个关键挑战。在这项工作中,我们介绍了我们的框架CopyAttack,这是一种基于增强学习的黑框攻击方法,它通过将其配置文件复制到目标域中,以促进项目子集来利用来自源域的真实用户。 CopyAttack的构建是为了有效而有效地学习的策略梯度网络,然后首先选择,然后进一步完善/craft,从源域中进行用户配置文件,最终将其复制到目标域中。 CopyAttack的目标是最大化目标域中用户的顶部$ K $推荐列表中目标项目的命中率。我们已经在两个现实世界数据集上进行了实验,并在经验上验证了我们提出的框架的有效性,并进行了彻底的模型分析。
Recently, recommender systems that aim to suggest personalized lists of items for users to interact with online have drawn a lot of attention. In fact, many of these state-of-the-art techniques have been deep learning based. Recent studies have shown that these deep learning models (in particular for recommendation systems) are vulnerable to attacks, such as data poisoning, which generates users to promote a selected set of items. However, more recently, defense strategies have been developed to detect these generated users with fake profiles. Thus, advanced injection attacks of creating more `realistic' user profiles to promote a set of items is still a key challenge in the domain of deep learning based recommender systems. In this work, we present our framework CopyAttack, which is a reinforcement learning based black-box attack method that harnesses real users from a source domain by copying their profiles into the target domain with the goal of promoting a subset of items. CopyAttack is constructed to both efficiently and effectively learn policy gradient networks that first select, and then further refine/craft, user profiles from the source domain to ultimately copy into the target domain. CopyAttack's goal is to maximize the hit ratio of the targeted items in the Top-$k$ recommendation list of the users in the target domain. We have conducted experiments on two real-world datasets and have empirically verified the effectiveness of our proposed framework and furthermore performed a thorough model analysis.