Abstract

The graph-based recommendation systems achieve significant success, yet they are accompanied by malicious attacks. In most scenes, attackers will inject crafted fake profiles into the recommendation system to boost the ranking of their target items in the recommendation lists. For an exploration of potential attacks hidden in real life, researchers have proposed various attacks with severe threats. However, current efforts in exploring attack strategies neglect the stealthiness aspect of the attack, i.e., the perturbation of recommendation performance after an attack can be quite noticeable, potentially alerting the defenders. To fill this research gap, this paper introduces a novel attack framework named InfoAtk, designed to conduct attacks while ensuring stealthiness. Specifically, given the dependency of precise recommendation predominantly on representations, the framework employs contrastive learning techniques to align representations before and after the attack, thereby augmenting stealthiness. Additionally, we optimize the representation of target items to outrank the last items in users’ recommendation lists, thereby promoting the visibility of the target item to increase the attack’s effectiveness. Extensive experiments on four public datasets validate the stealthiness and effectiveness of our proposed attack framework.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.