How Dataset Characteristics Affect the Robustness of Collaborative Recommendation Models

Shilling attacks against collaborative filtering (CF) models are characterized by several fake user profiles mounted on the system by an adversarial party to harvest recommendation outcomes toward a malicious desire. The vulnerability of CF models is directly tied with their reliance on the underlying interaction data ---like user-item rating matrix (URM) --- to train their models and their inherent inability to distinguish genuine profiles from non-genuine ones. The majority of works conducted so far for analyzing shilling attacks mainly focused on properties such as confronted recommendation models, recommendation outputs, and even users under attack. The under-researched element has been the impact of data characteristics on the effectiveness of shilling attacks on CF models. Toward this goal, this work presents a systematic and in-depth study by using an analytical modeling approach built on a regression model to test the hypothesis of whether URM properties can impact the outcome of CF recommenders under a shilling attack. We ran extensive experiments involving 97200 simulations on three different domains (movie, business, and music), and showed that URM properties considerably affect the robustness of CF models in shilling attack scenarios. Obtained results can be of great help for the system designer in understanding the cause of variations in a recommender system performance due to a shilling attack.

[1]  George Karypis,et al.  A Comprehensive Survey of Neighborhood-based Recommendation Methods , 2011, Recommender Systems Handbook.

[2]  Neil J. Hurley,et al.  Recommender Systems: Attack Types and Strategies , 2005, AAAI.

[3]  Richard A. Harshman,et al.  Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..

[4]  Patrick Seemann,et al.  Matrix Factorization Techniques for Recommender Systems , 2014 .

[5]  Conor Hayes,et al.  Using Linked Data to Build Open, Collaborative Recommender Systems , 2010, AAAI Spring Symposium: Linked Data Meets Artificial Intelligence.

[6]  Jianmin Chen,et al.  Robust collaborative filtering based on non-negative matrix factorization and R1-norm , 2017, Knowl. Based Syst..

[7]  Yehuda Koren,et al.  Matrix Factorization Techniques for Recommender Systems , 2009, Computer.

[8]  Roberto Turrin,et al.  Performance of recommender algorithms on top-n recommendation tasks , 2010, RecSys '10.

[9]  Alfred Kobsa,et al.  The Adaptive Web, Methods and Strategies of Web Personalization , 2007, The Adaptive Web.

[10]  Priscilla S. Markwood,et al.  The Long Tail: Why the Future of Business is Selling Less of More , 2006 .

[11]  F. Maxwell Harper,et al.  The MovieLens Datasets: History and Context , 2016, TIIS.

[12]  Neil J. Hurley,et al.  Collaborative recommendation: A robustness analysis , 2004, TOIT.

[13]  Huseyin Polat,et al.  Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.

[14]  Ismail Uysal,et al.  Quick and accurate attack detection in recommender systems through user attributes , 2019, RecSys.

[15]  Galit Shmueli,et al.  To Explain or To Predict? , 2010 .

[16]  Bamshad Mobasher,et al.  Segment-based injection attacks against collaborative filtering recommender systems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[17]  George Karypis,et al.  A Comprehensive Survey of Neighborhood-based Recommendation Methods , 2011, Recommender Systems Handbook.

[18]  Yevgeniy Vorobeychik,et al.  Data Poisoning Attacks on Factorization-Based Collaborative Filtering , 2016, NIPS.

[19]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[20]  Joemon M. Jose,et al.  Handling data sparsity in collaborative filtering using emotion and semantic based features , 2011, SIGIR.

[21]  Gediminas Adomavicius,et al.  Impact of data characteristics on recommender systems performance , 2012, TMIS.

[22]  Chun-Nan Hsu,et al.  Mining Skewed and Sparse Transaction Data for Personalized Shopping Recommendation , 2004, Machine Learning.

[23]  Yehuda Koren,et al.  Factor in the neighbors: Scalable and accurate collaborative filtering , 2010, TKDD.

[24]  Padhraic Smyth,et al.  Business applications of data mining , 2002, CACM.

[25]  Greg Linden,et al.  Two Decades of Recommender Systems at Amazon.com , 2017, IEEE Internet Computing.

[26]  Lior Rokach,et al.  Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.

[27]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[28]  Calyampudi Radhakrishna Rao,et al.  Linear Statistical Inference and its Applications , 1967 .

[29]  Tommaso Di Noia,et al.  Assessing the Impact of a User-Item Collaborative Attack on Class of Users , 2019, ImpactRS@RecSys.

[30]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[31]  Robin D. Burke,et al.  Hybrid Web Recommender Systems , 2007, The Adaptive Web.

[32]  Xiaoyu Du,et al.  Adversarial Personalized Ranking for Recommendation , 2018, SIGIR.

[33]  Douglas B. Terry,et al.  Using collaborative filtering to weave an information tapestry , 1992, CACM.

[34]  Kibeom Lee,et al.  Escaping your comfort zone: A graph-based recommender system for finding novel recommendations among relevant items , 2015, Expert Syst. Appl..

[35]  Neil J. Hurley,et al.  Promoting Recommendations: An Attack on Collaborative Filtering , 2002, DEXA.

[36]  John Riedl,et al.  Explaining collaborative filtering recommendations , 2000, CSCW '00.

[37]  Gerhard Friedrich,et al.  Recommender Systems - An Introduction , 2010 .

[38]  C. Radhakrishna Rao,et al.  Linear Statistical Inference and its Applications, Second Editon , 1973, Wiley Series in Probability and Statistics.

[39]  Hsinchun Chen,et al.  Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering , 2004, TOIS.

[40]  LeeKibeom,et al.  Escaping your comfort zone , 2015 .

[41]  Fernando Ortega,et al.  Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems , 2019, IEEE Access.

[42]  Tommaso Di Noia,et al.  Adversarial Machine Learning in Recommender Systems: State of the art and Challenges , 2020, ArXiv.

[43]  Roberto Turrin,et al.  Cross-Domain Recommender Systems , 2015, Recommender Systems Handbook.

[44]  Junhao Wen,et al.  SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems , 2016, Neurocomputing.

[45]  Lars Schmidt-Thieme,et al.  BPR: Bayesian Personalized Ranking from Implicit Feedback , 2009, UAI.

[46]  Nicolas Hug,et al.  Surprise: A Python library for recommender systems , 2020, J. Open Source Softw..

[47]  Yi Tay,et al.  Deep Learning based Recommender System: A Survey and New Perspectives , 2018 .

[48]  Bamshad Mobasher,et al.  Attacks and Remedies in Collaborative Recommendation , 2007, IEEE Intelligent Systems.

[49]  Yehuda Koren,et al.  Advances in Collaborative Filtering , 2011, Recommender Systems Handbook.

[50]  John Riedl,et al.  An algorithmic framework for performing collaborative filtering , 1999, SIGIR '99.

[51]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[52]  Tommaso Di Noia,et al.  SAShA: Semantic-Aware Shilling Attacks on Recommender Systems Exploiting Knowledge Graphs , 2020, ESWC.

[53]  Gediminas Adomavicius,et al.  Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.

[54]  Markus Schedl,et al.  The LFM-1b Dataset for Music Retrieval and Recommendation , 2016, ICMR.

[55]  Charu C. Aggarwal,et al.  Recommender Systems: The Textbook , 2016 .

[56]  Dit-Yan Yeung,et al.  Collaborative Deep Learning for Recommender Systems , 2014, KDD.