A curated collection of adversarial attack and defense on recommender systems.
☆136Apr 29, 2022Updated 3 years ago
Alternatives and similar repositories for RS-Adversarial-Learning
Users that are interested in RS-Adversarial-Learning are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation for the Recsys 2020 paper: Revisiting Adversarially Learned Injection Attacks Against Recommender Systems☆24Sep 6, 2021Updated 4 years ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆164Mar 3, 2021Updated 5 years ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- Adversarial Item Promotion in visually-aware recommenders☆16Sep 3, 2021Updated 4 years ago
- A Python library used to collect shilling detection methods and generate simulated attackers. (for academic use)☆59Sep 17, 2022Updated 3 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 7 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆121Apr 8, 2025Updated 10 months ago
- Model Poisoning Attack to Federated Recommendation☆32Apr 23, 2022Updated 3 years ago
- ☆35Dec 3, 2020Updated 5 years ago
- This repo contains only source code for computer science course.☆21Nov 1, 2020Updated 5 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆18Apr 27, 2022Updated 3 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommende…☆25Apr 12, 2021Updated 4 years ago
- This is our official implementation for the paper: “INMO: A Model-Agnostic and Scalable Module for Inductive Collaborative Filtering”.☆11Aug 10, 2022Updated 3 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 2 years ago
- ☆42Nov 24, 2023Updated 2 years ago
- A curated collection of adversarial attack and defense on graph data.☆580Nov 7, 2023Updated 2 years ago
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆23Feb 26, 2025Updated last year
- This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversar…☆34Nov 27, 2018Updated 7 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆29Jan 11, 2022Updated 4 years ago
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆861Dec 15, 2023Updated 2 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- ☆63Nov 15, 2023Updated 2 years ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- This repository contains my research work on building the state of the art next basket recommendations using techniques such as Autoencod…☆11Mar 10, 2021Updated 4 years ago
- Code for our WSDM 2022 paper titled "The Datasets Dilemma: How Much Do We Really Know About Recommendation Datasets?"☆24Feb 25, 2022Updated 4 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- Code for ICML2019 Paper "Compositional Invariance Constraints for Graph Embeddings"☆50Jun 7, 2020Updated 5 years ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- Diffusion Models for Generative Outfit Recommendation☆37Sep 11, 2024Updated last year
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆33Dec 2, 2023Updated 2 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆391Feb 22, 2024Updated 2 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- KwaiRec: A Fully-observed Dataset for Recommender Systems.☆193Jan 6, 2026Updated last month
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 4 months ago
- Diffusion Recommender Model☆242Jul 4, 2024Updated last year