A curated collection of adversarial attack and defense on recommender systems.
☆137Apr 29, 2022Updated 4 years ago
Alternatives and similar repositories for RS-Adversarial-Learning
Users that are interested in RS-Adversarial-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch implementation for the Recsys 2020 paper: Revisiting Adversarially Learned Injection Attacks Against Recommender Systems☆24Sep 6, 2021Updated 4 years ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆165Mar 3, 2021Updated 5 years ago
- Tensorflow implementation of TrialAttack (Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems. KDD 20…☆12Sep 2, 2021Updated 4 years ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- This repository contains our implementations for Shilling Attacks against Recommender Systems.☆24Jun 25, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A unified framework for recommender system attacking☆34Mar 29, 2024Updated 2 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 8 years ago
- A Python library used to collect shilling detection methods and generate simulated attackers. (for academic use)☆59Sep 17, 2022Updated 3 years ago
- Adversarial Item Promotion in visually-aware recommenders☆17Sep 3, 2021Updated 4 years ago
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆126Mar 18, 2026Updated last month
- A Survey of Poisoning Attacks and Defenses in Recommender Systems☆41Feb 28, 2026Updated 2 months ago
- ☆35Dec 3, 2020Updated 5 years ago
- Source code of FedAttack.☆10Feb 9, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommende…☆25Apr 12, 2021Updated 5 years ago
- This is our official implementation for the paper: “INMO: A Model-Agnostic and Scalable Module for Inductive Collaborative Filtering”.☆11Aug 10, 2022Updated 3 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆19Apr 27, 2022Updated 4 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆30Jan 11, 2022Updated 4 years ago
- A curated collection of adversarial attack and defense on graph data.☆585Nov 7, 2023Updated 2 years ago
- [AAAI 2023] Official PyTorch implementation for "Untargeted Attack against Federated Recommendation Systems via Poisonous Item Embeddings…☆27Jan 18, 2023Updated 3 years ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆22Feb 26, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆42Nov 24, 2023Updated 2 years ago
- This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversar…☆34Nov 27, 2018Updated 7 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆863Dec 15, 2023Updated 2 years ago
- The code of paper "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks" (ICDM 2020)☆18Mar 19, 2021Updated 5 years ago
- Adaptive Denoising Training (ADT) for Recommendation.☆75Mar 8, 2022Updated 4 years ago
- Official code of "Invariant Collaborative Filtering to Popularity Distribution Shift" (2023 WWW)☆21Jul 27, 2023Updated 2 years ago
- ☆63Nov 15, 2023Updated 2 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,081Jun 26, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- A curated list of academic events on AI Security & Privacy☆167Aug 22, 2024Updated last year
- FairGAN: GANs-based Fairness-aware Learning for Recommendations with Implicit Feedback☆15Oct 8, 2022Updated 3 years ago
- This repository is the official implementation of Generalized Data Weighting via Class-level Gradient Manipulation (NeurIPS 2021)(http://…☆22Oct 8, 2022Updated 3 years ago
- [KDD 2025] Fine-tuning Multimodal Large Language Models for Product Bundling☆15Sep 20, 2025Updated 7 months ago
- ☆25Nov 14, 2022Updated 3 years ago
- Code for our WSDM 2022 paper titled "The Datasets Dilemma: How Much Do We Really Know About Recommendation Datasets?"☆24Feb 25, 2022Updated 4 years ago