ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.08025
  4. Cited By
Influence Function based Data Poisoning Attacks to Top-N Recommender
  Systems
v1v2v3 (latest)

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

The Web Conference (WWW), 2020
19 February 2020
Minghong Fang
Neil Zhenqiang Gong
Jia-Wei Liu
    TDI
ArXiv (abs)PDFHTML

Papers citing "Influence Function based Data Poisoning Attacks to Top-N Recommender Systems"

50 / 58 papers shown
IndirectAD: Practical Data Poisoning Attacks against Recommender Systems for Item Promotion
IndirectAD: Practical Data Poisoning Attacks against Recommender Systems for Item Promotion
Zihao Wang
Tianhao Mao
XiaoFeng Wang
Di Tang
Xiaozhong Liu
AAML
172
0
0
08 Nov 2025
Accumulative SGD Influence Estimation for Data Attribution
Accumulative SGD Influence Estimation for Data Attribution
Yunxiao Shi
Shuo Yang
Yixin Su
Rui-Xun Zhang
Min Xu
TDI
283
0
0
30 Oct 2025
StealthAttack: Robust 3D Gaussian Splatting Poisoning via Density-Guided Illusions
StealthAttack: Robust 3D Gaussian Splatting Poisoning via Density-Guided Illusions
Bo-Hsu Ke
You-Zhe Xie
Yu-Lun Liu
Wei-Chen Chiu
AAML3DGS
188
2
0
02 Oct 2025
Retrieval-Augmented Review Generation for Poisoning Recommender Systems
Retrieval-Augmented Review Generation for Poisoning Recommender Systems
Shiyi Yang
Xinshu Li
Guanglin Zhou
Chen Wang
Xiwei Xu
Liming Zhu
Lina Yao
AAML
277
1
0
21 Aug 2025
Understanding Data Influence with Differential Approximation
Understanding Data Influence with Differential Approximation
Haoru Tan
Sitong Wu
Xiuzhe Wu
Wang Wang
Bo Zhao
Zeke Xie
Gui-Song Xia
Xiaojuan Qi
TDI
296
1
0
20 Aug 2025
Enhancing Training Data Attribution with Representational Optimization
Enhancing Training Data Attribution with Representational Optimization
W. Sun
Haokun Liu
Nikhil Kandpal
Colin Raffel
Yiming Yang
TDI
477
0
0
24 May 2025
Detecting Instruction Fine-tuning Attacks using Influence Function
Detecting Instruction Fine-tuning Attacks using Influence Function
Jiawei Li
TDIAAML
366
1
0
12 Apr 2025
Preventing the Popular Item Embedding Based Attack in Federated Recommendations
Preventing the Popular Item Embedding Based Attack in Federated RecommendationsIEEE International Conference on Data Engineering (ICDE), 2024
Junxuan Zhang
Huan Li
Dazhong Rong
Yan Zhao
Ke Chen
Lidan Shou
AAML
356
8
0
18 Feb 2025
Data Poisoning Attacks to Local Differential Privacy Protocols for Graphs
Data Poisoning Attacks to Local Differential Privacy Protocols for GraphsIEEE International Conference on Data Engineering (ICDE), 2024
Xi He
Kai Huang
Qingqing Ye
Haibo Hu
AAML
249
3
0
31 Dec 2024
A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender
  Systems: Insights and Future Research
A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research
Falguni Roy
Xiaofeng Ding
K. -K. R. Choo
Pan Zhou
FaML
215
2
0
19 Sep 2024
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Feilong Wang
Xin Wang
X. Ban
AAML
220
29
0
06 Jul 2024
Towards Robust Recommendation: A Review and an Adversarial Robustness Evaluation Library
Towards Robust Recommendation: A Review and an Adversarial Robustness Evaluation Library
Lei Cheng
Xiaowen Huang
Jitao Sang
Jian Yu
AAML
402
2
0
27 Apr 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Zhenghao Hu
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
296
12
0
02 Feb 2024
Toward Robust Recommendation via Real-time Vicinal Defense
Toward Robust Recommendation via Real-time Vicinal Defense
Yichang Xu
Chenwang Wu
Defu Lian
AAML
171
0
0
29 Sep 2023
Shilling Black-box Review-based Recommender Systems through Fake Review
  Generation
Shilling Black-box Review-based Recommender Systems through Fake Review GenerationKnowledge Discovery and Data Mining (KDD), 2023
Hung-Yun Chiang
Yi-Syuan Chen
Yun-Zhu Song
Hong-Han Shuai
Jason J. S. Chang
AAML
182
20
0
27 Jun 2023
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection Framework
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection FrameworkACM Transactions on Management Information Systems (ACM TMIS), 2023
Minglei Yin
Bin Liu
Neil Zhenqiang Gong
Xin Li
AAML
202
1
0
11 Jun 2023
Assessing Vulnerabilities of Adversarial Learning Algorithm through
  Poisoning Attacks
Assessing Vulnerabilities of Adversarial Learning Algorithm through Poisoning Attacks
Jingfeng Zhang
Bo Song
Bo Han
Lei Liu
Gang Niu
Masashi Sugiyama
AAML
185
2
0
30 Apr 2023
Secure Split Learning against Property Inference, Data Reconstruction,
  and Feature Space Hijacking Attacks
Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking AttacksEuropean Symposium on Research in Computer Security (ESORICS), 2023
Yunlong Mao
Zexi Xin
Zhenyu Li
Jue Hong
Qingyou Yang
Sheng Zhong
MIACVAAML
209
16
0
19 Apr 2023
FairRoad: Achieving Fairness for Recommender Systems with Optimized
  Antidote Data
FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote DataACM Symposium on Access Control Models and Technologies (SACMAT), 2022
Minghong Fang
Jia-Wei Liu
Michinari Momma
Yi Sun
187
5
0
13 Dec 2022
AFLGuard: Byzantine-robust Asynchronous Federated Learning
AFLGuard: Byzantine-robust Asynchronous Federated LearningAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Minghong Fang
Jia-Wei Liu
Neil Zhenqiang Gong
Elizabeth S. Bentley
AAML
198
40
0
13 Dec 2022
Training Data Influence Analysis and Estimation: A Survey
Training Data Influence Analysis and Estimation: A SurveyMachine-mediated learning (ML), 2022
Zayd Hammoudeh
Daniel Lowd
TDI
553
155
0
09 Dec 2022
Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Self-Ensemble Protection: Training Checkpoints Are Good Data ProtectorsInternational Conference on Learning Representations (ICLR), 2022
Sizhe Chen
Geng Yuan
Xinwen Cheng
Yifan Gong
Minghai Qin
Yanzhi Wang
Xiaolin Huang
AAML
252
23
0
22 Nov 2022
Towards Adversarially Robust Recommendation from Adaptive Fraudster
  Detection
Towards Adversarially Robust Recommendation from Adaptive Fraudster DetectionIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Y. Lai
Yulin Zhu
Wenqi Fan
Xiaoge Zhang
Wei Song
AAML
216
9
0
08 Nov 2022
Towards Robust Recommender Systems via Triple Cooperative Defense
Towards Robust Recommender Systems via Triple Cooperative DefenseWISE (WISE), 2022
Qingyang Wang
Defu Lian
Chenwang Wu
Enhong Chen
AAML
141
8
0
25 Oct 2022
Characterizing the Influence of Graph Elements
Characterizing the Influence of Graph ElementsInternational Conference on Learning Representations (ICLR), 2022
Zizhang Chen
Peizhao Li
Hongfu Liu
Pengyu Hong
TDI
210
26
0
14 Oct 2022
Discussion about Attacks and Defenses for Fair and Robust Recommendation
  System Design
Discussion about Attacks and Defenses for Fair and Robust Recommendation System Design
Mira Kim
Simon S. Woo
238
1
0
28 Sep 2022
A Comprehensive Survey on Trustworthy Recommender Systems
A Comprehensive Survey on Trustworthy Recommender Systems
Wenqi Fan
Xiangyu Zhao
Xiao Chen
Jingran Su
Jingtong Gao
...
Qidong Liu
Yiqi Wang
Hanfeng Xu
Lei Chen
Qing Li
FaML
255
66
0
21 Sep 2022
Knowledge-enhanced Black-box Attacks for Recommendations
Knowledge-enhanced Black-box Attacks for RecommendationsKnowledge Discovery and Data Mining (KDD), 2022
Jingfan Chen
Wenqi Fan
Guanghui Zhu
Xiangyu Zhao
Chun Yuan
Qing Li
Jiaming Ji
MLAUAAML
188
61
0
21 Jul 2022
Defending Substitution-Based Profile Pollution Attacks on Sequential
  Recommenders
Defending Substitution-Based Profile Pollution Attacks on Sequential RecommendersACM Conference on Recommender Systems (RecSys), 2022
Zhenrui Yue
Huimin Zeng
Ziyi Kou
Lanyu Shang
Dong Wang
AAML
209
32
0
19 Jul 2022
Detect Professional Malicious User with Metric Learning in Recommender
  Systems
Detect Professional Malicious User with Metric Learning in Recommender SystemsIEEE Transactions on Knowledge and Data Engineering (TKDE), 2022
Yuanbo Xu
Yongjian Yang
E. Wang
Fuzhen Zhuang
Hui Xiong
159
15
0
19 May 2022
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in
  Contrastive Learning
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive LearningUSENIX Security Symposium (USENIX Security), 2022
Hongbin Liu
Jinyuan Jia
Neil Zhenqiang Gong
305
42
0
13 May 2022
FedRecAttack: Model Poisoning Attack to Federated Recommendation
FedRecAttack: Model Poisoning Attack to Federated RecommendationIEEE International Conference on Data Engineering (ICDE), 2022
Dazhong Rong
Shuai Ye
Ruoyan Zhao
Hon Ning Yuen
Jianhai Chen
Qinming He
AAMLFedML
266
74
0
01 Apr 2022
Targeted Data Poisoning Attack on News Recommendation System by Content
  Perturbation
Targeted Data Poisoning Attack on News Recommendation System by Content Perturbation
Xudong Zhang
Zan Wang
Jingke Zhao
Lanjun Wang
AAML
198
13
0
04 Mar 2022
Rank List Sensitivity of Recommender Systems to Interaction
  Perturbations
Rank List Sensitivity of Recommender Systems to Interaction PerturbationsInternational Conference on Information and Knowledge Management (CIKM), 2022
Sejoon Oh
Berk Ustun
Julian McAuley
Srijan Kumar
234
37
0
29 Jan 2022
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value
  Data
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataUSENIX Security Symposium (USENIX Security), 2021
Yongji Wu
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAML
274
49
0
22 Nov 2021
10 Security and Privacy Problems in Large Foundation Models
10 Security and Privacy Problems in Large Foundation Models
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
374
11
0
28 Oct 2021
PipAttack: Poisoning Federated Recommender Systems forManipulating Item
  Promotion
PipAttack: Poisoning Federated Recommender Systems forManipulating Item PromotionWeb Search and Data Mining (WSDM), 2021
Shijie Zhang
Hongzhi Yin
Tong Chen
Zi Huang
Quoc Viet Hung Nguyen
Li-zhen Cui
FedMLAAML
184
125
0
21 Oct 2021
Ready for Emerging Threats to Recommender Systems? A Graph
  Convolution-based Generative Shilling Attack
Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling AttackInformation Sciences (Inf. Sci.), 2021
Fan Wu
Min Gao
Junliang Yu
Zongwei Wang
Kecheng Liu
Wange Xu
AAML
194
47
0
22 Jul 2021
Adversarial Examples Make Strong Poisons
Adversarial Examples Make Strong PoisonsNeural Information Processing Systems (NeurIPS), 2021
Liam H. Fowl
Micah Goldblum
Ping Yeh-Chiang
Jonas Geiping
Wojtek Czaja
Tom Goldstein
SILM
297
158
0
21 Jun 2021
Quantitative robustness of instance ranking problems
Quantitative robustness of instance ranking problemsAnnals of the Institute of Statistical Mathematics (AISM), 2021
Tino Werner
206
2
0
12 Mar 2021
Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Data Poisoning Attacks and Defenses to Crowdsourcing SystemsThe Web Conference (WWW), 2021
Minghong Fang
Minghao Sun
Qi Li
Neil Zhenqiang Gong
Jinhua Tian
Jia-Wei Liu
195
42
0
18 Feb 2021
Out-of-Distribution Generalization Analysis via Influence Function
Out-of-Distribution Generalization Analysis via Influence Function
Haotian Ye
Chuanlong Xie
Yue Liu
Zhenguo Li
OOD
186
13
0
21 Jan 2021
Towards a Robust and Trustworthy Machine Learning System Development: An
  Engineering Perspective
Towards a Robust and Trustworthy Machine Learning System Development: An Engineering PerspectiveJournal of Information Security and Applications (JISA), 2021
Pulei Xiong
Scott Buffett
Shahrear Iqbal
Philippe Lamontagne
M. Mamun
Heather Molyneaux
OOD
332
19
0
08 Jan 2021
Data Poisoning Attacks to Deep Learning Based Recommender Systems
Data Poisoning Attacks to Deep Learning Based Recommender SystemsNetwork and Distributed System Security Symposium (NDSS), 2021
Hai Huang
Jiaming Mu
Neil Zhenqiang Gong
Qi Li
Yinan Han
Mingwei Xu
AAML
235
151
0
07 Jan 2021
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
FLTrust: Byzantine-robust Federated Learning via Trust BootstrappingNetwork and Distributed System Security Symposium (NDSS), 2020
Xiaoyu Cao
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
FedML
648
925
0
27 Dec 2020
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
  and Defenses
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and DefensesIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2020
Micah Goldblum
Dimitris Tsipras
Chulin Xie
Xinyun Chen
Avi Schwarzschild
Basel Alomair
Aleksander Madry
Yue Liu
Tom Goldstein
SILM
544
363
0
18 Dec 2020
Certified Robustness of Nearest Neighbors against Data Poisoning and
  Backdoor Attacks
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks
Jinyuan Jia
Yupei Liu
Xiaoyu Cao
Neil Zhenqiang Gong
AAML
419
89
0
07 Dec 2020
On Detecting Data Pollution Attacks On Recommender Systems Using
  Sequential GANs
On Detecting Data Pollution Attacks On Recommender Systems Using Sequential GANs
Behzad Shahrasbi
Venugopal Mani
Apoorv Reddy Arrabothu
Deepthi Sharma
Kannan Achan
Sushant Kumar
AAML
108
6
0
04 Dec 2020
Robust and Verifiable Information Embedding Attacks to Deep Neural
  Networks via Error-Correcting Codes
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting CodesACM Asia Conference on Computer and Communications Security (AsiaCCS), 2020
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
AAML
172
5
0
26 Oct 2020
Local and Central Differential Privacy for Robustness and Privacy in
  Federated Learning
Local and Central Differential Privacy for Robustness and Privacy in Federated LearningNetwork and Distributed System Security Symposium (NDSS), 2020
Mohammad Naseri
Jamie Hayes
Emiliano De Cristofaro
FedML
348
204
0
08 Sep 2020
12
Next
Page 1 of 2