Practical Data Poisoning Attack against Next-Item Recommendation
暂无分享,去创建一个
Yaliang Li | Bolin Ding | Jing Gao | Hengtong Zhang | Jing Gao | Yaliang Li | Bolin Ding | Hengtong Zhang
[1] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[2] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[3] Naman Agarwal,et al. Second-Order Stochastic Optimization for Machine Learning in Linear Time , 2016, J. Mach. Learn. Res..
[4] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[5] Fabio Roli,et al. Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization , 2017, AISec@CCS.
[6] Ke Wang,et al. Personalized Top-N Sequential Recommendation via Convolutional Sequence Embedding , 2018, WSDM.
[7] Xiaojin Zhu,et al. Optimal Adversarial Attack on Autoregressive Models , 2019, ArXiv.
[8] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[9] S. Weisberg,et al. Residuals and Influence in Regression , 1982 .
[10] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[11] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[12] H. Sebastian Seung,et al. Algorithms for Non-negative Matrix Factorization , 2000, NIPS.
[13] Xiaojin Zhu,et al. Optimal Attack against Autoregressive Models by Manipulating the Environment , 2019, AAAI.
[14] Lars Schmidt-Thieme,et al. BPR: Bayesian Personalized Ranking from Implicit Feedback , 2009, UAI.
[15] Paul Barford,et al. Data Poisoning Attacks against Autoregressive Models , 2016, AAAI.
[16] Yevgeniy Vorobeychik,et al. Data Poisoning Attacks on Factorization-Based Collaborative Filtering , 2016, NIPS.
[17] Neil J. Hurley,et al. Collaborative recommendation: A robustness analysis , 2004, TOIT.
[18] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[19] Lars Schmidt-Thieme,et al. Factorizing personalized Markov chains for next-basket recommendation , 2010, WWW '10.
[20] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[21] Julian J. McAuley,et al. Self-Attentive Sequential Recommendation , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[22] Xiaojin Zhu,et al. The Security of Latent Dirichlet Allocation , 2015, AISTATS.
[23] Julian J. McAuley,et al. Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering , 2016, WWW.
[24] Ying Cai,et al. Fake Co-visitation Injection Attacks to Recommender Systems , 2017, NDSS.