In shilling attacks, an adversarial party injects a few fake user profiles into a Recommender System (RS) so that the target item can be promoted or demoted. Although much effort has been devoted to developing shilling attack methods, we find that existing approaches are still far from practical. In this paper, we analyze the properties a practical shilling attack method should have and propose a new concept of Cross-system Attack. With the idea of Cross-system Attack, we design a Practical Cross-system Shilling Attack (PC-Attack) framework that requires little information about the victim RS model and the target RS data for conducting attacks. PC-Attack is trained to capture graph topology knowledge from public RS data in a self-supervised manner. Then, it is fine-tuned on a small portion of target data that is easy to access to construct fake profiles. Extensive experiments have demonstrated the superiority of PC-Attack over state-of-the-art baselines. Our implementation of PC-Attack is available at https://github.com/KDEGroup/PC-Attack.
翻译:在先令攻击中,一个敌对方将一些假用户简介输入一个建议系统(RS),这样可以促进或降低目标项目。虽然已经为开发先令攻击方法付出了很大努力,但我们发现,现有的方法仍然远非实用。在这份文件中,我们分析一个实用先令攻击方法的属性,并提出一个新的跨系统攻击概念。有了跨系统攻击的概念,我们设计了一个实用的跨系统Shilling攻击(PC-Attack)框架,这个框架要求有关受害者RS模型和进行攻击的目标RS数据的信息很少。PC-Atack受过训练,以自我监督的方式从公共RS数据中获取图表的地形知识。然后,它精确地调整了易于建立假配置的目标数据的一小部分。广泛的实验表明PC-Attack优于州-艺术基线。我们实施PC-Atack的情况可在https://github.com/KDEGroup/PC-Atack查阅。