ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.04127
  4. Cited By
Poisoning Attacks to Graph-Based Recommender Systems

Poisoning Attacks to Graph-Based Recommender Systems

11 September 2018
Minghong Fang
Guolei Yang
Neil Zhenqiang Gong
Jia-Wei Liu
    AAML
ArXivPDFHTML

Papers citing "Poisoning Attacks to Graph-Based Recommender Systems"

25 / 25 papers shown
Title
Preventing the Popular Item Embedding Based Attack in Federated Recommendations
Preventing the Popular Item Embedding Based Attack in Federated Recommendations
J. Zhang
Huan Li
Dazhong Rong
Yan Zhao
Ke Chen
Lidan Shou
AAML
60
4
0
18 Feb 2025
Towards Robust Recommendation: A Review and an Adversarial Robustness Evaluation Library
Towards Robust Recommendation: A Review and an Adversarial Robustness Evaluation Library
Lei Cheng
Xiaowen Huang
Jitao Sang
Jian Yu
AAML
25
1
0
27 Apr 2024
Fooling Neural Networks for Motion Forecasting via Adversarial Attacks
Fooling Neural Networks for Motion Forecasting via Adversarial Attacks
Edgar Medina
Leyong Loh
AAML
27
0
0
07 Mar 2024
Unveiling Vulnerabilities of Contrastive Recommender Systems to
  Poisoning Attacks
Unveiling Vulnerabilities of Contrastive Recommender Systems to Poisoning Attacks
Zongwei Wang
Junliang Yu
Min Gao
Hongzhi Yin
Bin Cui
S. Sadiq
AAML
26
7
0
30 Nov 2023
Single-User Injection for Invisible Shilling Attack against Recommender
  Systems
Single-User Injection for Invisible Shilling Attack against Recommender Systems
Chengzhi Huang
Hui Li
24
13
0
21 Aug 2023
PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
Jinyuan Jia
Yupei Liu
Yuepeng Hu
Neil Zhenqiang Gong
13
13
0
26 Mar 2023
A Survey of Trustworthy Federated Learning with Perspectives on
  Security, Robustness, and Privacy
A Survey of Trustworthy Federated Learning with Perspectives on Security, Robustness, and Privacy
Yifei Zhang
Dun Zeng
Jinglong Luo
Zenglin Xu
Irwin King
FedML
81
47
0
21 Feb 2023
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for
  Federated Learning
XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning
Jianyi Zhang
Fangjiao Zhang
Qichao Jin
Zhiqiang Wang
Xiaodong Lin
X. Hei
AAML
FedML
32
0
0
28 Dec 2022
A Survey on Federated Recommendation Systems
A Survey on Federated Recommendation Systems
Zehua Sun
Yonghui Xu
Y. Liu
Weiliang He
Lanju Kong
Fangzhao Wu
Y. Jiang
Li-zhen Cui
FedML
24
60
0
27 Dec 2022
Federated Learning based on Defending Against Data Poisoning Attacks in
  IoT
Federated Learning based on Defending Against Data Poisoning Attacks in IoT
Jiayin Li
Wenzhong Guo
Xingshuo Han
Jianping Cai
Ximeng Liu
AAML
69
1
0
14 Sep 2022
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in
  Contrastive Learning
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
25
34
0
13 May 2022
Poisoning Deep Learning Based Recommender Model in Federated Learning
  Scenarios
Poisoning Deep Learning Based Recommender Model in Federated Learning Scenarios
Dazhong Rong
Qinming He
Jianhai Chen
FedML
11
41
0
26 Apr 2022
FedRecAttack: Model Poisoning Attack to Federated Recommendation
FedRecAttack: Model Poisoning Attack to Federated Recommendation
Dazhong Rong
Shuai Ye
Ruoyan Zhao
Hon Ning Yuen
Jianhai Chen
Qinming He
AAML
FedML
11
57
0
01 Apr 2022
Projective Ranking-based GNN Evasion Attacks
Projective Ranking-based GNN Evasion Attacks
He Zhang
Xingliang Yuan
Chuan Zhou
Shirui Pan
AAML
36
23
0
25 Feb 2022
PipAttack: Poisoning Federated Recommender Systems forManipulating Item
  Promotion
PipAttack: Poisoning Federated Recommender Systems forManipulating Item Promotion
Shijie Zhang
Hongzhi Yin
Tong Chen
Zi Huang
Quoc Viet Hung Nguyen
Li-zhen Cui
FedML
AAML
9
96
0
21 Oct 2021
Ready for Emerging Threats to Recommender Systems? A Graph
  Convolution-based Generative Shilling Attack
Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling Attack
Fan Wu
Min Gao
Junliang Yu
Zongwei Wang
Kecheng Liu
Wange Xu
AAML
11
34
0
22 Jul 2021
Turning Federated Learning Systems Into Covert Channels
Turning Federated Learning Systems Into Covert Channels
Gabriele Costa
Fabio Pinelli
S. Soderi
Gabriele Tolomei
FedML
37
10
0
21 Apr 2021
Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Minghong Fang
Minghao Sun
Qi Li
Neil Zhenqiang Gong
Jinhua Tian
Jia-Wei Liu
47
34
0
18 Feb 2021
Data Poisoning Attacks to Deep Learning Based Recommender Systems
Data Poisoning Attacks to Deep Learning Based Recommender Systems
Hai Huang
Jiaming Mu
Neil Zhenqiang Gong
Qi Li
Bin Liu
Mingwei Xu
AAML
17
129
0
07 Jan 2021
Robust and Verifiable Information Embedding Attacks to Deep Neural
  Networks via Error-Correcting Codes
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
AAML
19
5
0
26 Oct 2020
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Jonas Geiping
Liam H. Fowl
W. R. Huang
W. Czaja
Gavin Taylor
Michael Moeller
Tom Goldstein
AAML
19
215
0
04 Sep 2020
Data Poisoning Attacks Against Federated Learning Systems
Data Poisoning Attacks Against Federated Learning Systems
Vale Tolpegin
Stacey Truex
Mehmet Emre Gursoy
Ling Liu
FedML
23
637
0
16 Jul 2020
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and
  Data Poisoning Attacks
Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks
Avi Schwarzschild
Micah Goldblum
Arjun Gupta
John P. Dickerson
Tom Goldstein
AAML
TDI
11
162
0
22 Jun 2020
Data Poisoning Attacks to Local Differential Privacy Protocols
Data Poisoning Attacks to Local Differential Privacy Protocols
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAML
25
76
0
05 Nov 2019
Attacking Graph-based Classification via Manipulating the Graph
  Structure
Attacking Graph-based Classification via Manipulating the Graph Structure
Binghui Wang
Neil Zhenqiang Gong
AAML
24
152
0
01 Mar 2019
1