SAShA: Semantic-Aware Shilling Attacks on Recommender Systems Exploiting Knowledge Graphs

Recommender systems (RS) play a focal position in modern user-centric online services. Among them, collaborative filtering (CF) approaches have shown leading accuracy performance compared to content-based filtering (CBF) methods. Their success is due to an effective exploitation of similarities/correlations encoded in user interaction patterns, which is computed by considering common items users rated in the past. However, their strength is also their weakness. Indeed, a malicious agent can alter recommendations by adding fake user profiles into the platform thereby altering the actual similarity values in an engineered way. The spread of well-curated information available in knowledge graphs (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {KG}$$\end{document}) has opened the door to several new possibilities in compromising the security of a recommender system. In fact, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {KG}$$\end{document} are a wealthy source of information that can dramatically increase the attacker’s (and the defender’s) knowledge of the underlying system. In this paper, we introduce SAShA, a new attack strategy that leverages semantic features extracted from a knowledge graph in order to strengthen the efficacy of the attack to standard CF models. We performed an extensive experimental evaluation in order to investigate whether SAShA is more effective than baseline attacks against CF models by taking into account the impact of various semantic features. Experimental results on two real-world datasets show the usefulness of our strategy in favor of attacker’s capacity in attacking CF models.

[1]  Yanchun Zhang,et al.  Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system , 2013, World Wide Web.

[2]  Neil J. Hurley,et al.  Collaborative recommendation: A robustness analysis , 2004, TOIT.

[3]  Neil J. Hurley,et al.  Robust Collaborative Recommendation , 2011, Recommender Systems Handbook.

[4]  Sumit Bhatia,et al.  That's Interesting, Tell Me More! Finding Descriptive Support Passages for Knowledge Graph Relationships , 2018, SEMWEB.

[5]  Marc Boullé,et al.  Comparing State-of-the-Art Collaborative Filtering Systems , 2007, MLDM.

[6]  Johannes Fürnkranz,et al.  Unsupervised generation of data mining features from linked open data , 2012, WIMS '12.

[7]  Minyi Guo,et al.  DKN: Deep Knowledge-Aware Network for News Recommendation , 2018, WWW.

[8]  Hugh Glaser,et al.  Linked Open Government Data: Lessons from Data.gov.uk , 2012, IEEE Intelligent Systems.

[9]  Greg Linden,et al.  Amazon . com Recommendations Item-to-Item Collaborative Filtering , 2001 .

[10]  Paolo Tomeo,et al.  An Analysis on Time- and Session-aware Diversification in Recommender Systems , 2017, UMAP.

[11]  John Riedl,et al.  GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.

[12]  Patrick P. K. Chan,et al.  Shilling attack based on item popularity and rated item correlation against collaborative filtering , 2019, Int. J. Mach. Learn. Cybern..

[13]  Tommaso Di Noia,et al.  How to make latent factors interpretable by feeding Factorization machines with knowledge graphs , 2019, SEMWEB.

[14]  Yixin Cao,et al.  Explainable Reasoning over Knowledge Graphs for Recommendation , 2018, AAAI.

[15]  Nicolas Hug,et al.  Surprise: A Python library for recommender systems , 2020, J. Open Source Softw..

[16]  George Karypis,et al.  Sparse linear methods with side information for top-n recommendations , 2012, RecSys.

[17]  Markus Schedl,et al.  Movie genome: alleviating new item cold start in movie recommendation , 2019, User Modeling and User-Adapted Interaction.

[18]  Proceedings of the First Workshop on Deep Learning for Knowledge Graphs and Semantic Technologies (DL4KGS) co-located with the 15th Extended Semantic Web Conerence (ESWC 2018), Heraklion, Crete, Greece, June 4, 2018 , 2018, DL4KGS@ESWC.

[19]  Paolo Tomeo,et al.  SPrank: Semantic Path-Based Ranking for Top-N Recommendations Using Linked Open Data , 2016, ACM Trans. Intell. Syst. Technol..

[20]  Tommaso Di Noia,et al.  Assessing the Impact of a User-Item Collaborative Attack on Class of Users , 2019, ImpactRS@RecSys.

[21]  Junhao Wen,et al.  SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems , 2016, Neurocomputing.

[22]  Jure Leskovec,et al.  Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.

[23]  Robin Burke,et al.  Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.

[24]  Diego Reforgiato Recupero,et al.  Proceedings of the Workshop on Deep Learning for Knowledge Graphs (DL4KG2019) Co-located with the 16th Extended Semantic Web Conference 2019 (ESWC 2019), Portoroz, Slovenia, June 2, 2019 , 2019, DL4KG@ESWC.

[25]  Yehuda Koren,et al.  Factor in the neighbors: Scalable and accurate collaborative filtering , 2010, TKDD.

[26]  Yizhou Sun,et al.  Personalized entity recommendation: a heterogeneous information network approach , 2014, WSDM.

[27]  Hong Yang,et al.  Recommendation with Multi-Source Heterogeneous Information , 2018, IJCAI.

[28]  Volker Tresp,et al.  A Recommender System for Complex Real-World Applications with Nonlinear Dependencies and Knowledge Graph Context , 2019, ESWC.

[29]  Markus Zanker,et al.  Linked open data to support content-based recommender systems , 2012, I-SEMANTICS '12.

[30]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[31]  Charu C. Aggarwal,et al.  Attack-Resistant Recommender Systems , 2016 .

[32]  ZhangYanchun,et al.  Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system , 2013 .

[33]  Tommaso Di Noia,et al.  2nd Workshop on Knowledge-aware and Conversational Recommender Systems - KaRS , 2019, CIKM.

[34]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[35]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[36]  Yehuda Koren,et al.  Matrix Factorization Techniques for Recommender Systems , 2009, Computer.

[37]  Huseyin Polat,et al.  Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.

[38]  Tommaso Di Noia,et al.  Ontology-based Linked Data Summarization in Semantics-aware Recommender Systems , 2018, SEBD.

[39]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.