Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks

With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on information systems 2023-02, Vol.41 (3), p.1-24, Article 58
Hauptverfasser: Nguyen Thanh, Toan, Quach, Nguyen Duc Khang, Nguyen, Thanh Tam, Huynh, Thanh Trung, Vu, Viet Hung, Nguyen, Phi Le, Jo, Jun, Nguyen, Quoc Viet Hung
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 24
container_issue 3
container_start_page 1
container_title ACM transactions on information systems
container_volume 41
creator Nguyen Thanh, Toan
Quach, Nguyen Duc Khang
Nguyen, Thanh Tam
Huynh, Thanh Trung
Vu, Viet Hung
Nguyen, Phi Le
Jo, Jun
Nguyen, Quoc Viet Hung
description With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate recommendation results as they desire. This might be due to the fact that existing poison attacks (and countermeasures) are either model-agnostic or specifically designed for traditional recommender algorithms (e.g., neighborhood-based, matrix-factorization-based, or deep-learning-based RSs) that are not gRS. As gRSs are widely adopted in the industry, the problem of how to design poison attacks for gRSs has become a need for robust user experience. Herein, we focus on the use of poison attacks to manipulate item promotion in gRSs. Compared to standard GNNs, attacking gRSs is more challenging due to the heterogeneity of network structure and the entanglement between users and items. To overcome such challenges, we propose GSPAttack—a generative surrogate-based poison attack framework for gRSs. GSPAttack tailors a learning process to surrogate a recommendation model as well as generate fake users and user-item interactions while preserving the data correlation between users and items for recommendation accuracy. Although maintaining high accuracy for other items rather than the target item seems counterintuitive, it is equally crucial to the success of a poison attack. Extensive evaluations on four real-world datasets revealed that GSPAttack outperforms all baselines with competent recommendation performance and is resistant to various countermeasures.
doi_str_mv 10.1145/3567420
format Article
fullrecord <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3567420</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3567420</sourcerecordid><originalsourceid>FETCH-LOGICAL-a244t-5efa4305f9c7c97fb4450a09d903ea9d45abc246b64812207ed96b7a5debe2d13</originalsourceid><addsrcrecordid>eNo9kDFPwzAQRi0EEqUgdqZsTAbbsR17rCoISFWLKMzRxb6UAEmQbUD99wS1MN13-t7d8Ag55-yKc6muc6ULKdgBmXClDBVGm8MxM6mp4cYck5MYXxkbd80mZPUwtHHo236TlcslrSGizx7RDV2HvceQrbcxYRez7za9ZCX2GCC1X5itP0MYNpBwfzNLCdxbPCVHDbxHPNvPKXm-vXma39HFqryfzxYUhJSJKmxA5kw11hXOFk0tpWLArLcsR7BeKqidkLrW0nAhWIHe6roA5bFG4Xk-JZe7vy4MMQZsqo_QdhC2FWfVr4dq72EkL3YkuO4f-it_APkcWDg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks</title><source>ACM Digital Library Complete</source><creator>Nguyen Thanh, Toan ; Quach, Nguyen Duc Khang ; Nguyen, Thanh Tam ; Huynh, Thanh Trung ; Vu, Viet Hung ; Nguyen, Phi Le ; Jo, Jun ; Nguyen, Quoc Viet Hung</creator><creatorcontrib>Nguyen Thanh, Toan ; Quach, Nguyen Duc Khang ; Nguyen, Thanh Tam ; Huynh, Thanh Trung ; Vu, Viet Hung ; Nguyen, Phi Le ; Jo, Jun ; Nguyen, Quoc Viet Hung</creatorcontrib><description>With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate recommendation results as they desire. This might be due to the fact that existing poison attacks (and countermeasures) are either model-agnostic or specifically designed for traditional recommender algorithms (e.g., neighborhood-based, matrix-factorization-based, or deep-learning-based RSs) that are not gRS. As gRSs are widely adopted in the industry, the problem of how to design poison attacks for gRSs has become a need for robust user experience. Herein, we focus on the use of poison attacks to manipulate item promotion in gRSs. Compared to standard GNNs, attacking gRSs is more challenging due to the heterogeneity of network structure and the entanglement between users and items. To overcome such challenges, we propose GSPAttack—a generative surrogate-based poison attack framework for gRSs. GSPAttack tailors a learning process to surrogate a recommendation model as well as generate fake users and user-item interactions while preserving the data correlation between users and items for recommendation accuracy. Although maintaining high accuracy for other items rather than the target item seems counterintuitive, it is equally crucial to the success of a poison attack. Extensive evaluations on four real-world datasets revealed that GSPAttack outperforms all baselines with competent recommendation performance and is resistant to various countermeasures.</description><identifier>ISSN: 1046-8188</identifier><identifier>EISSN: 1558-2868</identifier><identifier>DOI: 10.1145/3567420</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Computing methodologies ; Information retrieval ; Information systems ; Information systems applications ; Neural networks ; Recommender systems ; Security and privacy ; Social engineering attacks ; Social networks</subject><ispartof>ACM transactions on information systems, 2023-02, Vol.41 (3), p.1-24, Article 58</ispartof><rights>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a244t-5efa4305f9c7c97fb4450a09d903ea9d45abc246b64812207ed96b7a5debe2d13</citedby><cites>FETCH-LOGICAL-a244t-5efa4305f9c7c97fb4450a09d903ea9d45abc246b64812207ed96b7a5debe2d13</cites><orcidid>0000-0002-3099-2712 ; 0000-0002-6050-0774 ; 0000-0002-9687-1315 ; 0000-0001-6547-7641 ; 0000-0003-2027-5362 ; 0000-0002-4940-0422 ; 0000-0002-4605-6275 ; 0000-0002-2586-7757</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3567420$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,780,784,2282,27924,27925,40196,76228</link.rule.ids></links><search><creatorcontrib>Nguyen Thanh, Toan</creatorcontrib><creatorcontrib>Quach, Nguyen Duc Khang</creatorcontrib><creatorcontrib>Nguyen, Thanh Tam</creatorcontrib><creatorcontrib>Huynh, Thanh Trung</creatorcontrib><creatorcontrib>Vu, Viet Hung</creatorcontrib><creatorcontrib>Nguyen, Phi Le</creatorcontrib><creatorcontrib>Jo, Jun</creatorcontrib><creatorcontrib>Nguyen, Quoc Viet Hung</creatorcontrib><title>Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks</title><title>ACM transactions on information systems</title><addtitle>ACM TOIS</addtitle><description>With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate recommendation results as they desire. This might be due to the fact that existing poison attacks (and countermeasures) are either model-agnostic or specifically designed for traditional recommender algorithms (e.g., neighborhood-based, matrix-factorization-based, or deep-learning-based RSs) that are not gRS. As gRSs are widely adopted in the industry, the problem of how to design poison attacks for gRSs has become a need for robust user experience. Herein, we focus on the use of poison attacks to manipulate item promotion in gRSs. Compared to standard GNNs, attacking gRSs is more challenging due to the heterogeneity of network structure and the entanglement between users and items. To overcome such challenges, we propose GSPAttack—a generative surrogate-based poison attack framework for gRSs. GSPAttack tailors a learning process to surrogate a recommendation model as well as generate fake users and user-item interactions while preserving the data correlation between users and items for recommendation accuracy. Although maintaining high accuracy for other items rather than the target item seems counterintuitive, it is equally crucial to the success of a poison attack. Extensive evaluations on four real-world datasets revealed that GSPAttack outperforms all baselines with competent recommendation performance and is resistant to various countermeasures.</description><subject>Computing methodologies</subject><subject>Information retrieval</subject><subject>Information systems</subject><subject>Information systems applications</subject><subject>Neural networks</subject><subject>Recommender systems</subject><subject>Security and privacy</subject><subject>Social engineering attacks</subject><subject>Social networks</subject><issn>1046-8188</issn><issn>1558-2868</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kDFPwzAQRi0EEqUgdqZsTAbbsR17rCoISFWLKMzRxb6UAEmQbUD99wS1MN13-t7d8Ag55-yKc6muc6ULKdgBmXClDBVGm8MxM6mp4cYck5MYXxkbd80mZPUwtHHo236TlcslrSGizx7RDV2HvceQrbcxYRez7za9ZCX2GCC1X5itP0MYNpBwfzNLCdxbPCVHDbxHPNvPKXm-vXma39HFqryfzxYUhJSJKmxA5kw11hXOFk0tpWLArLcsR7BeKqidkLrW0nAhWIHe6roA5bFG4Xk-JZe7vy4MMQZsqo_QdhC2FWfVr4dq72EkL3YkuO4f-it_APkcWDg</recordid><startdate>20230207</startdate><enddate>20230207</enddate><creator>Nguyen Thanh, Toan</creator><creator>Quach, Nguyen Duc Khang</creator><creator>Nguyen, Thanh Tam</creator><creator>Huynh, Thanh Trung</creator><creator>Vu, Viet Hung</creator><creator>Nguyen, Phi Le</creator><creator>Jo, Jun</creator><creator>Nguyen, Quoc Viet Hung</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3099-2712</orcidid><orcidid>https://orcid.org/0000-0002-6050-0774</orcidid><orcidid>https://orcid.org/0000-0002-9687-1315</orcidid><orcidid>https://orcid.org/0000-0001-6547-7641</orcidid><orcidid>https://orcid.org/0000-0003-2027-5362</orcidid><orcidid>https://orcid.org/0000-0002-4940-0422</orcidid><orcidid>https://orcid.org/0000-0002-4605-6275</orcidid><orcidid>https://orcid.org/0000-0002-2586-7757</orcidid></search><sort><creationdate>20230207</creationdate><title>Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks</title><author>Nguyen Thanh, Toan ; Quach, Nguyen Duc Khang ; Nguyen, Thanh Tam ; Huynh, Thanh Trung ; Vu, Viet Hung ; Nguyen, Phi Le ; Jo, Jun ; Nguyen, Quoc Viet Hung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a244t-5efa4305f9c7c97fb4450a09d903ea9d45abc246b64812207ed96b7a5debe2d13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computing methodologies</topic><topic>Information retrieval</topic><topic>Information systems</topic><topic>Information systems applications</topic><topic>Neural networks</topic><topic>Recommender systems</topic><topic>Security and privacy</topic><topic>Social engineering attacks</topic><topic>Social networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nguyen Thanh, Toan</creatorcontrib><creatorcontrib>Quach, Nguyen Duc Khang</creatorcontrib><creatorcontrib>Nguyen, Thanh Tam</creatorcontrib><creatorcontrib>Huynh, Thanh Trung</creatorcontrib><creatorcontrib>Vu, Viet Hung</creatorcontrib><creatorcontrib>Nguyen, Phi Le</creatorcontrib><creatorcontrib>Jo, Jun</creatorcontrib><creatorcontrib>Nguyen, Quoc Viet Hung</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nguyen Thanh, Toan</au><au>Quach, Nguyen Duc Khang</au><au>Nguyen, Thanh Tam</au><au>Huynh, Thanh Trung</au><au>Vu, Viet Hung</au><au>Nguyen, Phi Le</au><au>Jo, Jun</au><au>Nguyen, Quoc Viet Hung</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks</atitle><jtitle>ACM transactions on information systems</jtitle><stitle>ACM TOIS</stitle><date>2023-02-07</date><risdate>2023</risdate><volume>41</volume><issue>3</issue><spage>1</spage><epage>24</epage><pages>1-24</pages><artnum>58</artnum><issn>1046-8188</issn><eissn>1558-2868</eissn><abstract>With recent advancements in graph neural networks (GNN), GNN-based recommender systems (gRS) have achieved remarkable success in the past few years. Despite this success, existing research reveals that gRSs are still vulnerable to poison attacks, in which the attackers inject fake data to manipulate recommendation results as they desire. This might be due to the fact that existing poison attacks (and countermeasures) are either model-agnostic or specifically designed for traditional recommender algorithms (e.g., neighborhood-based, matrix-factorization-based, or deep-learning-based RSs) that are not gRS. As gRSs are widely adopted in the industry, the problem of how to design poison attacks for gRSs has become a need for robust user experience. Herein, we focus on the use of poison attacks to manipulate item promotion in gRSs. Compared to standard GNNs, attacking gRSs is more challenging due to the heterogeneity of network structure and the entanglement between users and items. To overcome such challenges, we propose GSPAttack—a generative surrogate-based poison attack framework for gRSs. GSPAttack tailors a learning process to surrogate a recommendation model as well as generate fake users and user-item interactions while preserving the data correlation between users and items for recommendation accuracy. Although maintaining high accuracy for other items rather than the target item seems counterintuitive, it is equally crucial to the success of a poison attack. Extensive evaluations on four real-world datasets revealed that GSPAttack outperforms all baselines with competent recommendation performance and is resistant to various countermeasures.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3567420</doi><tpages>24</tpages><orcidid>https://orcid.org/0000-0002-3099-2712</orcidid><orcidid>https://orcid.org/0000-0002-6050-0774</orcidid><orcidid>https://orcid.org/0000-0002-9687-1315</orcidid><orcidid>https://orcid.org/0000-0001-6547-7641</orcidid><orcidid>https://orcid.org/0000-0003-2027-5362</orcidid><orcidid>https://orcid.org/0000-0002-4940-0422</orcidid><orcidid>https://orcid.org/0000-0002-4605-6275</orcidid><orcidid>https://orcid.org/0000-0002-2586-7757</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1046-8188
ispartof ACM transactions on information systems, 2023-02, Vol.41 (3), p.1-24, Article 58
issn 1046-8188
1558-2868
language eng
recordid cdi_crossref_primary_10_1145_3567420
source ACM Digital Library Complete
subjects Computing methodologies
Information retrieval
Information systems
Information systems applications
Neural networks
Recommender systems
Security and privacy
Social engineering attacks
Social networks
title Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T12%3A18%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Poisoning%20GNN-based%20Recommender%20Systems%20with%20Generative%20Surrogate-based%20Attacks&rft.jtitle=ACM%20transactions%20on%20information%20systems&rft.au=Nguyen%20Thanh,%20Toan&rft.date=2023-02-07&rft.volume=41&rft.issue=3&rft.spage=1&rft.epage=24&rft.pages=1-24&rft.artnum=58&rft.issn=1046-8188&rft.eissn=1558-2868&rft_id=info:doi/10.1145/3567420&rft_dat=%3Cacm_cross%3E3567420%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true