skip to main content
research-article

A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks

Published:05 March 2021Publication History
Skip Abstract Section

Abstract

Latent-factor models (LFM) based on collaborative filtering (CF), such as matrix factorization (MF) and deep CF methods, are widely used in modern recommender systems (RS) due to their excellent performance and recommendation accuracy. However, success has been accompanied with a major new arising challenge: Many applications of machine learning (ML) are adversarial in nature [146]. In recent years, it has been shown that these methods are vulnerable to adversarial examples, i.e., subtle but non-random perturbations designed to force recommendation models to produce erroneous outputs.

The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., attacking and defense recommendation models) and (ii) to show another successful application of AML in generative adversarial networks (GANs) for generative applications, thanks to their ability for learning (high-dimensional) data distributions. In this survey, we provide an exhaustive literature review of 76 articles published in major RS and ML journals and conferences. This review serves as a reference for the RS community working on the security of RS or on generative models using GANs to improve their quality.

References

  1. Himan Abdollahpouri, Gediminas Adomavicius, Robin Burke, Ido Guy, Dietmar Jannach, Toshihiro Kamishima, Jan Krasnodebski, and Luiz Pizzato. 2020. Multistakeholder recommendation: Survey and research directions. User Model. User-adapt. Interact. 30, 1 (2020), 127--158.Google ScholarGoogle ScholarCross RefCross Ref
  2. Charu C. Aggarwal. 2016. Ensemble-based and hybrid recommender systems. In Recommender Systems. Springer, 199--224.Google ScholarGoogle Scholar
  3. Naveed Akhtar and Ajmal Mian. 2018. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6 (2018), 14410--14430.Google ScholarGoogle ScholarCross RefCross Ref
  4. Naveed Akhtar and Ajmal S. Mian. 2018. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6 (2018), 14410--14430.Google ScholarGoogle ScholarCross RefCross Ref
  5. Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2020. Multi-step adversarial perturbations on recommender systems embeddings. arXiv 2010.01329.Google ScholarGoogle Scholar
  6. Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, and Antonio Ferrara. 2019. Towards effective device-aware federated learning. In Proceedings of the International Conference of the Italian Association for Artificial Intelligence. Springer, 477--491.Google ScholarGoogle ScholarCross RefCross Ref
  7. Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, Antonio Ferrara, and Fedelucio Narducci. 2021. How to put users in control of their data in federated top-N recommendation with learning to rank. In Proceedings of the 36th ACM/SIGAPP Symposium on Applied Computing (SAC’21).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2020. Adversarial learning for recommendation: Applications for security and generative tasks—concept to code. In Proceedings of the 14th ACM Conference on Recommender Systems. ACM, 738--741.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Vito Walter Anelli, Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2020. Assessing perceptual and recommendation mutation of adversarially poisoned visual recommenders. In Proceedings of the Doctoral Consortium co-located with the Conference of the Italian Association for Artificial Intelligence (DDC@AI*IA’20). CEUR-WS.org.Google ScholarGoogle Scholar
  10. Vito Walter Anelli, Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2020. An Empirical Study of DNNs Robustification Inefficacy in Protecting Visual Recommenders. arxiv:2010.00984Google ScholarGoogle Scholar
  11. Martín Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein GAN. CoRR abs/1701.07875 (2017).Google ScholarGoogle Scholar
  12. Ghazaleh Beigi, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, and Huan Liu. 2020. Privacy-aware recommendation with private-attribute protection using adversarial learning. In Proceedings of the 13th ACM International Conference on Web Search and Data Mining. 34--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Alejandro Bellogin, Pablo Castells, and Ivan Cantador. 2011. Precision-oriented evaluation of recommender systems: An algorithmic comparison. In Proceedings of the 5th ACM International Conference on Recommender Systems. 333--336.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Shlomo Berkovsky and Jill Freyne. 2015. Web personalization and recommender systems. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2307--2308.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. David Berthelot, Tom Schumm, and Luke Metz. 2017. BEGAN: Boundary equilibrium generative adversarial networks. CoRR abs/1703.10717 (2017).Google ScholarGoogle Scholar
  16. Homanga Bharadhwaj, Homin Park, and Brian Y. Lim. 2018. RecGAN: Recurrent generative adversarial networks for recommendation systems. In Proceedings of the ACM International Conference on Recommender Systems. ACM, 372--376.Google ScholarGoogle Scholar
  17. Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. In Proceedings of the International Conference on Machine Learning (ICML’12).Google ScholarGoogle Scholar
  18. Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, and Fabio Roli. 2018. Poisoning behavioral malware clustering. arxiv 1811.09985 (2018).Google ScholarGoogle Scholar
  19. Jesús Bobadilla, Fernando Ortega, Antonio Hernando, and Abraham Gutiérrez. 2013. Recommender systems survey. Knowl.-based Syst. 46 (2013), 109--132.Google ScholarGoogle Scholar
  20. Xiaoyan Cai, Junwei Han, and Libin Yang. 2018. Generative adversarial network based heterogeneous bibliographic network representation for personalized citation recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18). AAAI Press, 5747--5754.Google ScholarGoogle Scholar
  21. Iván Cantador, Ignacio Fernández-Tobías, Shlomo Berkovsky, and Paolo Cremonesi. 2015. Cross-domain recommender systems. In Recommender Systems Handbook. Springer, 919--959.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yuanjiang Cao, Xiaocong Chen, Lina Yao, Xianzhi Wang, and Wei Emma Zhang. 2020. Adversarial attacks and detection on reinforcement learning-based interactive recommender systems. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 1669--1672.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian J. Goodfellow, Aleksander Madry, and Alexey Kurakin. 2019. On evaluating adversarial robustness. CoRR abs/1902.06705 (2019).Google ScholarGoogle Scholar
  24. Nicholas Carlini and David A. Wagner. 2016. Defensive distillation is not robust to adversarial examples. CoRR abs/1607.04311 (2016).Google ScholarGoogle Scholar
  25. Nicholas Carlini and David A. Wagner. 2017. Towards evaluating the robustness of neural networks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 39--57.Google ScholarGoogle Scholar
  26. Pablo Castells, Neil J. Hurley, and Saul Vargas. 2015. Novelty and diversity in recommender systems. In Recommender Systems Handbook. Springer, 881--918.Google ScholarGoogle Scholar
  27. Dong-Kyu Chae, Jin-Soo Kang, Sang-Wook Kim, and Jaeho Choi. 2019. Rating augmentation with generative adversarial networks towards accurate collaborative filtering. In Proceedings of the World Wide Web Conference. ACM, 2616--2622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dong-Kyu Chae, Jin-Soo Kang, Sang-Wook Kim, and Jung-Tae Lee. 2018. CFGAN: A generic collaborative filtering framework based on generative adversarial networks. In Proceedings of the Conference on Information and Knowledge Management (CIKM’18). ACM, 137--146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Chae and S. Kim. 2018. Adversarial training of deep autoencoders towards recommendation tasks. In Proceedings of the International Conference on Network Infrastructure and Digital Content (IC-NIDC’18). 91--95.Google ScholarGoogle Scholar
  30. Dong-Kyu Chae, Jung Ah Shin, and Sang-Wook Kim. 2019. Collaborative adversarial autoencoders: An effective collaborative filtering model under the GAN framework. IEEE Access 7 (2019), 37650--37663.Google ScholarGoogle ScholarCross RefCross Ref
  31. Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. CoRR abs/1810.00069 (2018).Google ScholarGoogle Scholar
  32. Huiyuan Chen and Jing Li. 2019. Adversarial tensor factorization for context-aware recommendation. In Proceedings of the ACM International Conference on Recommender Systems. ACM, 363--367.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Jiawei Chen, Hande Dong, Xiang Wang, Fuli Feng, Meng Wang, and Xiangnan He. 2020. Bias and debias in recommender system: A survey and future directions. Arxiv Preprint Arxiv:2010.03240 (2020).Google ScholarGoogle Scholar
  34. Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, and Zibin Zheng. 2020. A survey of adversarial learning on graphs. CoRR abs/2003.05730 (2020).Google ScholarGoogle Scholar
  35. Wang Chen, Hai-Tao Zheng, Yang Wang, Wei Wang, and Rui Zhang. 2019. Utilizing generative adversarial networks for recommendation based on ratings and reviews. In Proceedings of the International Joint Conference on Neural Networks (IJCNN’19). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  36. Xinshi Chen, Shuang Li, Hui Li, Shaohua Jiang, Yuan Qi, and Le Song. 2019. Generative adversarial user model for reinforcement learning based recommendation system. In Proceedings of the International Conference on Machine Learning (ICML’19) (Proc. of Machine Learning Research), Vol. 97. PMLR, 1052--1061.Google ScholarGoogle Scholar
  37. Xu Chen, Yongfeng Zhang, Hongteng Xu, Zheng Qin, and Hongyuan Zha. 2019. Adversarial distillation for efficient recommendation with external knowledge. ACM Trans. Inf. Syst. 37, 1 (2019), 12:1--12:28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Kyunghyun Cho, Bart van Merrienboer, Çaglar Gülçehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’14). 1724--1734.Google ScholarGoogle ScholarCross RefCross Ref
  39. Parichat Chonwiharnphan, Pipop Thienprapasith, and Ekapol Chuangsuwanich. 2020. Generating realistic users using generative adversarial network with recommendation-based embedding. IEEE Access 8 (2020), 41384--41393.Google ScholarGoogle ScholarCross RefCross Ref
  40. Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial attacks on an oblivious recommender. In Proceedings of the 13th ACM Conference on Recommender Systems (RecSys’19). 322--330.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Rami Cohen, Oren Sar Shalom, Dietmar Jannach, and Amihood Amir. 2020. A Black-box Attack Model for Visually Aware Recommender Systems. arxiv:cs.LG/2011.02701Google ScholarGoogle Scholar
  42. Felipe Soares Da Costa and Peter Dolog. 2019. Convolutional adversarial latent factor model for recommender system. In Proceedings of the 32nd International Florida Artificial Intelligence Research Society Conference. 419--424.Google ScholarGoogle Scholar
  43. Yashar Deldjoo, Vito Walter Anelli, Hamed Zamani, Alejandro Bellogin, and Tommaso Di Noia. 2021. A flexible framework for evaluating user and item fairness in recommender systems. User Model. User-adapt. Interact. (2021), 1--55.Google ScholarGoogle Scholar
  44. Yashar Deldjoo, Mihai Gabriel Constantin, Hamid Eghbal-Zadeh, Bogdan Ionescu, Markus Schedl, and Paolo Cremonesi. 2018. Audio-visual encoding of multimedia content for enhancing movie recommendations. In Proceedings of the 12th ACM Conference on Recommender Systems. 455--459.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Yashar Deldjoo, Maurizio Ferrari Dacrema, Mihai Gabriel Constantin, Hamid Eghbal-zadeh, Stefano Cereda, Markus Schedl, Bogdan Ionescu, and Paolo Cremonesi. 2019. Movie genome: Alleviating new item cold start in movie recommendation. User Model. User-adapt. Interact. 29, 2 (2019), 291--343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2020. How dataset characteristics affect the robustness of collaborative recommendation models. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2019. Assessing the impact of a user-item collaborative attack on class of users. In Proceedings of the 1st Workshop on the Impact of Recommender Systems co-located with the 13th ACM Conference on Recommender Systems (ImpactRS@RecSys’19).Google ScholarGoogle Scholar
  48. Yashar Deldjoo, Tommaso Di Noia, and Felice Antonio Merra. 2020. Adversarial machine learning in recommender systems (AML-RecSys). In Proceedings of the 13th ACM International Conference on Web Search and Data Mining. ACM, 869--872.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Yashar Deldjoo, Markus Schedl, Paolo Cremonesi, and Gabriella Pasi. 2020. Recommender systems leveraging multimedia content. ACM Comput. Surv. 53, 5 (2020), 106:1--106:38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Yashar Deldjoo, Markus Schedl, Balasz Hidasi, Yinwei Wei, and Xiangnan He. 2020. Multimedia recommender systems. In Recommender Systems Handbook. Springer US.Google ScholarGoogle Scholar
  51. Tommaso Di Noia, Daniele Malitesta, and Felice Antonio Merra. 2020. TAaMR: Targeted adversarial attack against multimedia recommender systems. In Proceedings of the Dependable Systems and Networks Workshops. IEEE, 1--8.Google ScholarGoogle Scholar
  52. Yali Du, Meng Fang, Jinfeng Yi, Chang Xu, Jun Cheng, and Dacheng Tao. 2019. Enhancing the robustness of neural collaborative filtering systems under malicious attacks. IEEE Trans. Multim. 21, 3 (2019), 555--565.Google ScholarGoogle ScholarCross RefCross Ref
  53. Cynthia Dwork. 2006. Differential privacy. In Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP’06) (Lecture Notes in Computer Science), Vol. 4052. Springer, 1--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Michael D. Ekstrand, John Riedl, and Joseph A. Konstan. 2011. Collaborative filtering recommender systems. Found. Trends Hum.-comput. Interact. 4, 2 (2011), 175--243.Google ScholarGoogle Scholar
  55. Wenqi Fan, Tyler Derr, Yao Ma, Jianping Wang, Jiliang Tang, and Qing Li. 2019. Deep adversarial social recommendation. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI’19). 1351--1357.Google ScholarGoogle ScholarCross RefCross Ref
  56. Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, François Laviolette, Mario Marchand, and Victor S. Lempitsky. 2017. Domain-adversarial training of neural networks. In Domain Adaptation in Computer Vision Applications. Springer, 189--209.Google ScholarGoogle Scholar
  57. Guangyu Gao, Liling Liu, Li Wang, and Yihang Zhang. 2019. Fashion clothes matching scheme based on siamese network and autoencoder. Multim. Syst. 25, 6 (2019), 593--602.Google ScholarGoogle ScholarCross RefCross Ref
  58. Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. 2016. Image style transfer using convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 2414--2423.Google ScholarGoogle ScholarCross RefCross Ref
  59. David Goldberg, David A. Nichols, Brian M. Oki, and Douglas B. Terry. 1992. Using collaborative filtering to weave an information tapestry. Commun. ACM 35, 12 (1992), 61--70.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Felipe González, Yihan Yu, Andrea Figueroa, Claudia López, and Cecilia R. Aragon. 2019. Global reactions to the Cambridge Analytica scandal: A cross-language social media study. In Proceedings of the World Wide Web Conference. ACM, 799--806.Google ScholarGoogle Scholar
  61. Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative adversarial networks. CoRR abs/1406.2661 (2014).Google ScholarGoogle Scholar
  62. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In Proceedings of the 3rd International Conference on Learning Representations (ICLR’15)Google ScholarGoogle Scholar
  63. Ihsan Gunes, Cihan Kaleli, Alper Bilge, and Huseyin Polat. 2014. Shilling attacks against recommender systems: A comprehensive survey. Artif. Intell. Rev. 42, 4 (2014), 767--799.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Junwei Han, Dingwen Zhang, Gong Cheng, Nian Liu, and Dong Xu. 2018. Advanced deep-learning techniques for salient and category-specific object detection: A survey. IEEE Sig. Proc. Mag. 35, 1 (2018), 84--100.Google ScholarGoogle ScholarCross RefCross Ref
  65. Gaole He, Junyi Li, Wayne Xin Zhao, Peiju Liu, and Ji-Rong Wen. 2020. Mining implicit entity preference from user-item interaction data for knowledge graph completion via adversarial learning. In Proceedings of the WWW. ACM, 740--751.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  67. Ruining He and Julian J. McAuley. 2016. VBPR: Visual Bayesian personalized ranking from implicit feedback. In Proceedings of the 30th AAAI Conference on Artificial Intelligence. 144--150.Google ScholarGoogle Scholar
  68. Xiangnan He, Zhankui He, Xiaoyu Du, and Tat-Seng Chua. 2018. Adversarial personalized ranking for recommendation. In Proceedings of the SIGIR Conference on Research and Development in Information Retrieval. ACM, 355--364.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. 2017. Neural collaborative filtering. In Proceedings of the World Wide Web Conference. ACM, 173--182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Balázs Hidasi, Alexandros Karatzoglou, Linas Baltrunas, and Domonkos Tikk. 2016. Session-based recommendations with recurrent neural networks. In Proceedings of the 4th International Conference on Learning Representations (ICLR’16).Google ScholarGoogle Scholar
  71. Geoffrey E. Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the knowledge in a neural network. CoRR abs/1503.02531 (2015).Google ScholarGoogle Scholar
  72. Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. 2011. Adversarial machine learning. In Proceedings of the ACM Workshop on Artificial Intelligence and Security. ACM, 43--58.Google ScholarGoogle Scholar
  73. Cong Phuoc Huynh, Arridhana Ciptadi, Ambrish Tyagi, and Amit Agrawal. 2018. CRAFT: Complementary recommendation by adversarial feature transform. In Proceedings of the European Conference on Computer Vision Workshops (Lecture Notes in Computer Science), Vol. 11131. Springer, 54--66.Google ScholarGoogle Scholar
  74. Eric Jang, Shixiang Gu, and Ben Poole. 2017. Categorical reparameterization with Gumbel-Softmax. In Proceedings of the International Conference on Learning Representations (Poster).Google ScholarGoogle Scholar
  75. Sang-Young Jo, Sun-Hye Jang, Hee-Eun Cho, and Jin-Woo Jeong. 2019. Scenery-based fashion recommendation with cross-domain geneartive adverserial networks. In Proceedings of the International Conference on Big Data and Smart Computing. IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  76. Zach Jorgensen, Yan Zhou, and W. Meador Inge. 2008. A multiple instance learning strategy for combating good word attacks on spam filters. J. Mach. Learn. Res. 9 (2008), 1115--1146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Rafal Józefowicz, Wojciech Zaremba, and Ilya Sutskever. 2015. An empirical exploration of recurrent network architectures. In Proceedings of the International Conference on Machine Learning (ICML’15).Google ScholarGoogle Scholar
  78. Marius Kaminskas and Derek Bridge. 2016. Diversity, serendipity, novelty, and coverage: A survey and empirical analysis of beyond-accuracy objectives in recommender systems. ACM Trans. Interact. Intell. Syst. 7, 1 (2016), 1--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Wang-Cheng Kang, Chen Fang, Zhaowen Wang, and Julian J. McAuley. 2017. Visually aware fashion recommendation and design with generative image models. In Proceedings of the IEEE International Conference on Data Mining (ICDM’17). 207--216.Google ScholarGoogle Scholar
  80. Michal Kompan, Ondrej Kassák, and Mária Bieliková. 2017. Beyond user preferences: The short-term behaviour modelling. In Proceedings of the 1st Workshop on Temporal Reasoning in Recommender Systems co-located with the 11th International Conference on Recommender Systems (RecSys’17). 1--3.Google ScholarGoogle Scholar
  81. Yehuda Koren. 2010. Collaborative filtering with temporal dynamics. Commun. ACM 53, 4 (2010), 89--97.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Yehuda Koren, Robert M. Bell, and Chris Volinsky. 2009. Matrix factorization techniques for recommender systems. IEEE Comput. 42, 8 (2009), 30--37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Adit Krishnan, Hari Cheruvu, Tao Cheng, and Hari Sundaram. 2019. A modular adversarial approach to social recommendation. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM’19).Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Adit Krishnan, Ashish Sharma, Aravind Sankar, and Hari Sundaram. 2018. An adversarial approach to improve long-tail performance in neural collaborative filtering. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18).Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Sudhir Kumar and Mithun Das Gupta. 2019. c+GAN: Complementary fashion item recommendation. In Proceedings of the Workshop on AI for Fashion.Google ScholarGoogle Scholar
  86. Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In Proceedings of the 5th International Conference on Learning Representations (ICLR’17).Google ScholarGoogle Scholar
  87. Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial machine learning at scale. In Proceedings of the 5th International Conference on Learning Representations (ICLR’17).Google ScholarGoogle Scholar
  88. Wonsung Lee, Kyungwoo Song, and Il-Chul Moon. 2017. Augmented variational autoencoders for collaborative filtering with auxiliary information. In Proceedings of the Conference on Information and Knowledge Management (CIKM’17). ACM, 1139--1148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In Proceedings of the Conference on Neural Information Processing Systems. 1885--1893.Google ScholarGoogle Scholar
  90. Ruirui Li, Liangda Li, Xian Wu, Yunhong Zhou, and Wei Wang. 2019. Click feedback-aware query recommendation using adversarial examples. In Proceedings of the World Wide Web Conference. ACM, 2978--2984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Ruirui Li, Xian Wu, and Wei Wang. 2020. Adversarial learning to compare: Self-attentive prospective customer recommendation in location based social networks. In Proceedings of the 13th ACM International Conference on Web Search and Data Mining. 349--357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Ying Li, Jia-Jie Xu, Pengpeng Zhao, Junhua Fang, Wei Chen, and Lei Zhao. 2020. ATLRec: An attentional adversarial transfer learning network for cross-domain recommendation. J. Comput. Sci. Technol. 35, 4 (2020), 794--808.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Zhaoqiang Li, Jiajin Huang, and Ning Zhong. 2018. Leveraging reconstructive profiles of users and items for tag-aware recommendation. In Proceedings of the IEEE International Conference on Data Mining Workshops. IEEE, 1294--1299.Google ScholarGoogle ScholarCross RefCross Ref
  94. Jianxun Lian, Fuzheng Zhang, Xing Xie, and Guangzhong Sun. 2017. CCCFNet: A content-boosted collaborative filtering neural network for cross domain recommender systems. In Proceedings of the World Wide Web Conference. ACM, 817--818.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Chen Lin, Si Chen, Hui Li, Yanghua Xiao, Lianyun Li, and Qian Yang. 2020. Attacking recommender systems with augmented user profiles. In Proceedings of the 29th ACM International Conference on Information and Knowledge Management. 855--864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Jixiong Liu, Weike Pan, and Zhong Ming. 2020. CoFiGAN: Collaborative filtering by generative and discriminative training for one-class recommendation. Knowl.-based Syst. 191 (2020), 105255.Google ScholarGoogle Scholar
  97. Ming-Yu Liu, Thomas Breuel, and Jan Kautz. 2017. Unsupervised image-to-image translation networks. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 700--708.Google ScholarGoogle Scholar
  98. Qiang Liu, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, and Victor C. M. Leung. 2018. A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access 6 (2018), 12103--12117.Google ScholarGoogle ScholarCross RefCross Ref
  99. Wei Liu, Zhi-Jie Wang, Bin Yao, and Jian Yin. 2019. Geo-ALM: POI recommendation by fusing geographical information and adversarial learning mechanism. In Proceedings of the International Joint Conference on Artificial Intelligence. 1807--1813.Google ScholarGoogle ScholarCross RefCross Ref
  100. Yang Liu, Xianzhuo Xia, Liang Chen, Xiangnan He, Carl Yang, and Zibin Zheng. 2020. Certifiable robustness to discrete adversarial perturbations for factorization machines. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Zhuoran Liu and Martha A. Larson. 2020. Adversarial item promotion: Vulnerabilities at the core of top-n recommenders that use images to address cold start. arXiv 2006.01888.Google ScholarGoogle Scholar
  102. Gilles Louppe, Michael Kagan, and Kyle Cranmer. 2017. Learning to pivot with adversarial networks. In Proceedings of the Conference on Advances in Neural Information Processing Systems, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 981--990.Google ScholarGoogle Scholar
  103. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In Proceedings of the 6th International Conference on Learning Representations (ICLR’18).Google ScholarGoogle Scholar
  104. Jarana Manotumruksa and Emine Yilmaz. 2020. Sequential-based adversarial optimisation for personalised top-n item recommendation. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Xudong Mao, Qing Li, Haoran Xie, Raymond Y. K. Lau, Zhen Wang, and Stephen Paul Smolley. 2017. Least squares generative adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). 2813--2821.Google ScholarGoogle ScholarCross RefCross Ref
  106. Julian J. McAuley, Christopher Targett, Qinfeng Shi, and Anton van den Hengel. 2015. Image-based recommendations on styles and substitutes. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. 43--52.Google ScholarGoogle Scholar
  107. Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang. 2018. Personalized privacy-preserving social recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18). AAAI Press, 3796--3803.Google ScholarGoogle Scholar
  108. Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang. 2019. Towards privacy preserving social recommendation under personalized privacy settings. World Wide Web 22, 6 (2019), 2853--2881.Google ScholarGoogle ScholarCross RefCross Ref
  109. Lars M. Mescheder, Sebastian Nowozin, and Andreas Geiger. 2017. Adversarial variational Bayes: Unifying variational autoencoders and generative adversarial networks. In Proceedings of the International Conference on Machine Learning (ICML’17) (Proceedings of Machine Learning Research), Vol. 70. PMLR, 2391--2400.Google ScholarGoogle Scholar
  110. Weiqing Min, Bing-Kun Bao, Changsheng Xu, and M. Shamim Hossain. 2015. Cross-platform multi-modal topic modeling for personalized inter-platform recommendation. IEEE Trans. Multim. 17, 10 (2015), 1787--1801.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. CoRR abs/1411.1784 (2014).Google ScholarGoogle Scholar
  112. Linh Nguyen and Tsukasa Ishigaki. 2018. Domain-to-domain translation model for recommender system. CoRR abs/1812.06229 (2018).Google ScholarGoogle Scholar
  113. Augustus Odena, Christopher Olah, and Jonathon Shlens. 2017. Conditional image synthesis with auxiliary classifier GANs. In Proceedings of the International Conference on Machine Learning (ICML’17) (Proceedings of Machine Learning Research), Vol. 70. PMLR, 2642--2651.Google ScholarGoogle Scholar
  114. Ivan Palomares, Carlos Porcel, Luiz Pizzato, Ido Guy, and Enrique Herrera-Viedma. 2020. Reciprocal recommender systems: Analysis of state-of-art literature, challenges and opportunities on social recommendation. Arxiv Preprint Arxiv:2007.16120 (2020).Google ScholarGoogle Scholar
  115. Zhaoqing Pan, Weijie Yu, Xiaokai Yi, Asifullah Khan, Feng Yuan, and Yuhui Zheng. 2019. Recent progress on generative adversarial networks (GANs): A survey. IEEE Access 7 (2019), 36322--36333.Google ScholarGoogle ScholarCross RefCross Ref
  116. Nicolas Papernot, Patrick D. McDaniel, and Ian J. Goodfellow. 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. CoRR abs/1605.07277 (2016).Google ScholarGoogle Scholar
  117. Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. 2016. Distillation as a defense to adversarial perturbations against deep neural networks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 582--597.Google ScholarGoogle ScholarCross RefCross Ref
  118. Dae Hoon Park and Yi Chang. 2019. Adversarial sampling and training for semi-supervised information retrieval. In Proceedings of the World Wide Web Conference (WWW’19). 1443--1453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Dilruk Perera and Roger Zimmermann. 2019. CnGAN: Generative adversarial networks for cross-network user preference generation for non-overlapped users. In Proceedings of the World Wide Web Conference. ACM, 3144--3150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Massimo Quadrana, Paolo Cremonesi, and Dietmar Jannach. 2018. Sequence-aware recommender systems. ACM Comput. Surv. 51, 4 (2018), 66:1--66:36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Dimitrios Rafailidis and Fabio Crestani. 2019. Adversarial training for review-based recommendations. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’19). 1057--1060.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Ruiyang Ren, Zhaoyang Liu, Yaliang Li, Wayne Xin Zhao, Hui Wang, Bolin Ding, and Ji-Rong Wen. 2020. Sequential recommendation with self-attentive multi-adversarial network. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI’09). 452--461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Steffen Rendle and Lars Schmidt-Thieme. 2010. Pairwise interaction tensor factorization for personalized tag recommendation. In Proceedings of the International Conference on Web Search and Data Mining. ACM, 81--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. Yehezkel S. Resheff, Yanai Elazar, Moni Shahar, and Oren Sar Shalom. 2019. Privacy and fairness in recommender systems via adversarial training of user representations. In Proceedings of the International Conference on Pattern Recognition Applications and Methods. SciTePress, 476--482.Google ScholarGoogle ScholarCross RefCross Ref
  126. Andras Rozsa, Ethan M. Rudd, and Terrance E. Boult. 2016. Adversarial diversity and hard positive generation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPR’16). IEEE Computer Society, 410--417.Google ScholarGoogle Scholar
  127. Ruslan Salakhutdinov and Geoffrey E. Hinton. 2009. Semantic hashing. Int. J. Approx. Reas. 50, 7 (2009), 969--978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Tim Salimans, Ian J. Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, and Xi Chen. 2016. Improved techniques for training GANs. In Proceedings of the Conference on Neural Information Processing Systems. 2226--2234.Google ScholarGoogle Scholar
  129. Dandan Sha, Daling Wang, Xiangmin Zhou, Shi Feng, Yifei Zhang, and Ge Yu. 2016. An approach for clothing recommendation based on multiple image attributes. In Proceedings of the 17th International Conference on Web-Age Information Management (WAIM’16) (Lecture Notes in Computer Science), Bin Cui, Nan Zhang, Jianliang Xu, Xiang Lian, and Dexi Liu (Eds.), Vol. 9658. Springer, 272--285.Google ScholarGoogle ScholarCross RefCross Ref
  130. Yue Shi, Martha Larson, and Alan Hanjalic. 2014. Collaborative filtering beyond the user-item matrix: A survey of the state of the art and future challenges. ACM Comput. Surv. 47, 1 (2014), 3:1--3:45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Yue Shi, Martha A. Larson, and Alan Hanjalic. 2010. List-wise learning to rank with matrix factorization for collaborative filtering. In Proceedings of the ACM International Conference on Recommender Systems. ACM, 269--272.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Yong-Siang Shih, Kai-Yueh Chang, Hsuan-Tien Lin, and Min Sun. 2018. Compatibility family learning for item recommendation and generation. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18). AAAI Press, 2403--2410.Google ScholarGoogle Scholar
  133. Hyejin Shin, Sungwook Kim, Junbum Shin, and Xiaokui Xiao. 2018. Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans. Knowl. Data Eng. 30, 9 (2018), 1770--1782.Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Till Speicher, Hoda Heidari, Nina Grgic-Hlaca, Krishna P. Gummadi, Adish Singla, Adrian Weller, and Muhammad Bilal Zafar. 2018. A unified approach to quantifying algorithmic unfairness: Measuring individual & group unfairness via inequality indices. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2239--2248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Changfeng Sun, Han Liu, Meng Liu, Zhaochun Ren, Tian Gan, and Liqiang Nie. 2020. LARA: Attribute-to-feature adversarial learning for new-item recommendation. In Proceedings of the 13th ACM International Conference on Web Search and Data Mining. 582--590.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. Zhongchuan Sun, Bin Wu, Yunpeng Wu, and Yangdong Ye. 2019. APL: Adversarial pairwise learning for recommender systems. Expert Syst. Appl. 118 (2019), 573--584.Google ScholarGoogle ScholarCross RefCross Ref
  137. Richard S. Sutton, David A. McAllester, Satinder P. Singh, and Yishay Mansour. 1999. Policy gradient methods for reinforcement learning with function approximation. In Proceedings of the Conference on Neural Information Processing Systems. The MIT Press, 1057--1063.Google ScholarGoogle Scholar
  138. Christian Szegedy, Sergey Ioffe, Vincent Vanhoucke, and Alexander A. Alemi. 2017. Inception-v4, inception-resnet and the impact of residual connections on learning. In Proceedings of the 31st AAAI Conference on Artificial Intelligence. 4278--4284.Google ScholarGoogle Scholar
  139. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In Proceedings of the International Conference on Learning Representations.Google ScholarGoogle Scholar
  140. J. Tang, X. Du, X. He, F. Yuan, Q. Tian, and T. Chua. 2019. Adversarial training towards robust multimedia recommender system. IEEE Trans. Knowl. Data Eng. (2019), 1--1.Google ScholarGoogle Scholar
  141. Yuzhen Tong, Yadan Luo, Zheng Zhang, Shazia Sadiq, and Peng Cui. 2019. Collaborative generative adversarial network for recommendation systems. In Proceedings of the IEEE International Conference on Data Engineering Workshops. IEEE, 161--168.Google ScholarGoogle ScholarCross RefCross Ref
  142. Thanh Tran, Renee Sweeney, and Kyumin Lee. 2019. Adversarial Mahalanobis distance-based attentive song recommender for automatic playlist continuation. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’19). 245--254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Iacopo Vagliano, Lukas Galke, Florian Mai, and Ansgar Scherp. 2018. Using adversarial autoencoders for multi-modal automatic playlist continuation. In Proceedings of the ACM International Conference on Recommender Systems Challenge. ACM, 5:1--5:6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. Sahil Verma and Julia Rubin. 2018. Fairness definitions explained. In Proceedings of the International Workshop on Software Fairness (FairWare@ICSE’18). ACM, 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Riccardo Volpi, Pietro Morerio, Silvio Savarese, and Vittorio Murino. 2018. Adversarial feature augmentation for unsupervised domain adaptation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). IEEE Computer Society, 5495--5504. DOI:https://doi.org/10.1109/CVPR.2018.00576Google ScholarGoogle ScholarCross RefCross Ref
  146. Yevgeniy Vorobeychik and Murat Kantarcioglu. 2018. Adversarial Machine Learning. Morgan & Claypool Publishers.Google ScholarGoogle Scholar
  147. C. Wang, M. Niepert, and H. Li. 2020. RecSys-DAN: Discriminative adversarial networks for cross-domain recommender systems. IEEE Trans. Neural Netw. Learn. Syst. 31, 8 (2020), 2731--2740.Google ScholarGoogle ScholarCross RefCross Ref
  148. Hongwei Wang, Jia Wang, Jialin Wang, Miao Zhao, Weinan Zhang, Fuzheng Zhang, Xing Xie, and Minyi Guo. 2018. GraphGAN: Graph representation learning with generative adversarial nets. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18). AAAI Press, 2508--2515.Google ScholarGoogle Scholar
  149. Jianfang Wang and Pengfei Han. 2020. Adversarial training-based mean Bayesian personalized ranking for recommender system. IEEE Access 8 (2020), 7958--7968.Google ScholarGoogle ScholarCross RefCross Ref
  150. Jun Wang, Lantao Yu, Weinan Zhang, Yu Gong, Yinghui Xu, Benyou Wang, Peng Zhang, and Dell Zhang. 2017. IRGAN: A minimax game for unifying generative and discriminative information retrieval models. In Proceedings of the SIGIR Conference on Research and Development in Information Retrieval. ACM, 515--524.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Ke Wang, Janak J. Parekh, and Salvatore J. Stolfo. 2006. Anagram: A content anomaly detector resistant to mimicry attack. In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID’06) (Lecture Notes in Computer Science), Vol. 4219. Springer, 226--248.Google ScholarGoogle Scholar
  152. Qinyong Wang, Hongzhi Yin, Zhiting Hu, Defu Lian, Hao Wang, and Zi Huang. 2018. Neural memory streaming recommender networks with adversarial training. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, 2467--2475.Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. Qinyong Wang, Hongzhi Yin, Hao Wang, Quoc Viet Hung Nguyen, Zi Huang, and Lizhen Cui. 2019. Enhancing collaborative filtering with generative augmentation. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, 548--556.Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. Yang Wang, Hai-Tao Zheng, Wang Chen, and Rui Zhang. 2019. LambdaGAN: Generative adversarial nets for recommendation task with lambda strategy. In Proceedings of the International Joint Conference on Neural Networks. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  155. Zongwei Wang, Min Gao, Xinyi Wang, Junliang Yu, Junhao Wen, and Qingyu Xiong. 2019. A minimax game for generative and discriminative sample models for recommendation. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (Lecture Notes in Computer Science), Vol. 11440. Springer, 420--431.Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, and Archy de Berker. 2019. Adversarial examples in modern machine learning: A review. CoRR abs/1911.05268 (2019).Google ScholarGoogle Scholar
  157. Chao-Yuan Wu, Amr Ahmed, Alex Beutel, Alexander J. Smola, and How Jing. 2017. Recurrent recommender networks. In Proceedings of the 10th ACM International Conference on Web Search and Data Mining (WSDM’17). 495--503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Chuhan Wu, Fangzhao Wu, Suyu Ge, Tao Qi, Yongfeng Huang, and Xing Xie. 2019. Neural news recommendation with multi-head self-attention. In Proceedings of the Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP’19).Google ScholarGoogle ScholarCross RefCross Ref
  159. Chuhan Wu, Fangzhao Wu, Xiting Wang, Yongfeng Huang, and Xing Xie. 2020. Fairness-aware news recommendation with decomposed adversarial learning. arXiv 2006.16742.Google ScholarGoogle Scholar
  160. Qiong Wu, Yong Liu, Chunyan Miao, Binqiang Zhao, Yin Zhao, and Lu Guan. 2019. PD-GAN: Adversarial learning for personalized diversity-promoting recommendation. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI’19). 3870--3876.Google ScholarGoogle ScholarCross RefCross Ref
  161. Yao Wu, Christopher DuBois, Alice X. Zheng, and Martin Ester. 2016. Collaborative denoising auto-encoders for top-n recommender systems. In Proceedings of the 9th ACM International Conference on Web Search and Data Mining. 153--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, and Fabio Roli. 2015. Support vector machines under adversarial label contamination. Neurocomputing 160 (2015), 53--62. DOI:https://doi.org/10.1016/j.neucom.2014.08.081Google ScholarGoogle ScholarCross RefCross Ref
  163. Han Xiao, Huang Xiao, and Claudia Eckert. 2012. Adversarial label flips attack on support vector machines. In Proceedings of the European Conference on Artificial Intelligence (Frontiers in Artificial Intelligence and Applications).Google ScholarGoogle Scholar
  164. Dingqi Yang, Bingqing Qu, and Philippe Cudré-Mauroux. 2019. Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31, 3 (2019), 507--520.Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. Zilin Yang, Zhuo Su, Yang Yang, and Ge Lin. 2018. From recommendation to generation: A novel fashion clothing advising framework. Proceedings of the 7th International Conference on Digital Home (ICDH’18) 1, 1 (2018), 180--186.Google ScholarGoogle ScholarCross RefCross Ref
  166. Jin Yi, Jiajin Huang, and Jin Qin. 2018. Rating prediction in review-based recommendations via adversarial auto-encoder. In Proceedings of the International Conference on Web Intelligence. IEEE Computer Society, 144--149.Google ScholarGoogle ScholarCross RefCross Ref
  167. Ruiping Yin, Kan Li, Jie Lu, and Guangquan Zhang. 2019. RsyGAN: Generative adversarial network for recommender systems. In Proceedings of the International Joint Conference on Neural Networks. IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  168. Junliang Yu, Min Gao, Jundong Li, Chongming Gao, and Qinyong Wang. 2019. Generating reliable friends via adversarial training to improve social recommendation. CoRR abs/1909.03529 (2019).Google ScholarGoogle Scholar
  169. Xianwen Yu, Xiaoning Zhang, Yang Cao, and Min Xia. 2019. VAEGAN: A collaborative filtering framework based on adversarial variational autoencoders. In Proceedings of the International Joint Conference on Artificial Intelligence. ijcai.org, 4206--4212.Google ScholarGoogle ScholarCross RefCross Ref
  170. Fajie Yuan, Guibing Guo, Joemon M. Jose, Long Chen, Haitao Yu, and Weinan Zhang. 2016. LambdaFM: Learning optimal ranking with factorization machines using lambda surrogates. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM’16). 227--236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. Feng Yuan, Lina Yao, and Boualem Benatallah. 2019. Adversarial collaborative auto-encoder for top-n recommendation. In Proceedings of the International Joint Conference on Neural Networks (IJCNN’19). 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  172. Feng Yuan, Lina Yao, and Boualem Benatallah. 2019. Adversarial collaborative neural network for robust recommendation. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’19). 1065--1068.Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Feng Yuan, Lina Yao, and Boualem Benatallah. 2020. Exploring missing interactions: A convolutional generative adversarial network for collaborative filtering. In Proceedings of the 29th ACM International Conference on Information and Knowledge Management. 1773--1782.Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. G. Zhang, Y. Liu, and X. Jin. 2018. Adversarial variational autoencoder for top-n recommender systems. In Proceedings of the IEEE 9th International Conference on Software Engineering and Service Science (ICSESS’18). 853--856.Google ScholarGoogle Scholar
  175. Jiani Zhang, Xingjian Shi, Irwin King, and Dit-Yan Yeung. 2017. Dynamic key-value memory networks for knowledge tracing. In Proceedings of the 26th International Conference on World Wide Web (WWW’17). 765--774.Google ScholarGoogle ScholarDigital LibraryDigital Library
  176. Shuai Zhang, Lina Yao, Aixin Sun, and Yi Tay. 2019. Deep learning based recommender system: A survey and new perspectives. ACM Comput. Surv. 52, 1 (2019), 5:1--5:38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. Ye Zhang, Libin Yang, Xiaoyan Cai, and Hang Dai. 2018. A novel personalized citation recommendation approach based on GAN. In Proceedings of the International Symposium on Methodologies for Intelligent Systems (Lecture Notes in Computer Science), Vol. 11177. Springer, 268--278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. Pengyu Zhao, Tianxiao Shui, Yuanxing Zhang, Kecheng Xiao, and Kaigui Bian. 2020. Adversarial oracular seq2seq learning for sequential recommendation. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI’20).Google ScholarGoogle ScholarCross RefCross Ref
  179. W. Zhao, B. Wang, M. Yang, J. Ye, Z. Zhao, X. Chen, and Y. Shen. 2020. Leveraging long and short-term information in content-aware movie recommendation via adversarial training. IEEE Trans. Cyber. 50, 11 (2020), 4680--4693.Google ScholarGoogle ScholarCross RefCross Ref
  180. Wei Zhao, Benyou Wang, Jianbo Ye, Yongqiang Gao, Min Yang, and Xiaojun Chen. 2018. PLASTIC: Prioritize long and short-term information in top-n recommendation using adversarial training. In Proceedings of the International Joint Conference on Artificial Intelligence. ijcai.org, 3676--3682.Google ScholarGoogle ScholarCross RefCross Ref
  181. Fan Zhou, Ruiyang Yin, Kunpeng Zhang, Goce Trajcevski, Ting Zhong, and Jin Wu. 2019. Adversarial point-of-interest recommendation. In Proceedings of the World Wide Web Conference. ACM, 3462--34618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Renjie Zhou, Samamon Khemmarat, and Lixin Gao. 2010. The impact of YouTube recommendation system on video views. In Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference (IMC’10). 404--410.Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Shizhan Zhu, Sanja Fidler, Raquel Urtasun, Dahua Lin, and Chen Change Loy. 2017. Be your own Prada: Fashion synthesis with structural coherence. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). IEEE Computer Society, 1689--1697.Google ScholarGoogle ScholarCross RefCross Ref
  184. Ziwei Zhu, Jianling Wang, and James Caverlee. 2020. Measuring and mitigating item under-recommendation bias in personalized ranking systems. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’20). ACM, 449--458.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 54, Issue 2
            March 2022
            800 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/3450359
            Issue’s Table of Contents

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 March 2021
            • Revised: 1 November 2020
            • Accepted: 1 November 2020
            • Received: 1 May 2020
            Published in csur Volume 54, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format