A curated collection of adversarial attack and defense on recommender systems.
☆136Apr 29, 2022Updated 3 years ago
Alternatives and similar repositories for RS-Adversarial-Learning
Users that are interested in RS-Adversarial-Learning are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation for the Recsys 2020 paper: Revisiting Adversarially Learned Injection Attacks Against Recommender Systems☆24Sep 6, 2021Updated 4 years ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆164Mar 3, 2021Updated 5 years ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- Tensorflow implementation of TrialAttack (Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems. KDD 20…☆12Sep 2, 2021Updated 4 years ago
- This repository contains our implementations for Shilling Attacks against Recommender Systems.☆23Jun 25, 2022Updated 3 years ago
- Adversarial Item Promotion in visually-aware recommenders☆16Sep 3, 2021Updated 4 years ago
- A Python library used to collect shilling detection methods and generate simulated attackers. (for academic use)☆59Sep 17, 2022Updated 3 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 7 years ago
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆121Apr 8, 2025Updated 10 months ago
- ☆35Dec 3, 2020Updated 5 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆18Apr 27, 2022Updated 3 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommende…☆25Apr 12, 2021Updated 4 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 2 years ago
- ☆42Nov 24, 2023Updated 2 years ago
- This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversar…☆34Nov 27, 2018Updated 7 years ago
- Official code of "Invariant Collaborative Filtering to Popularity Distribution Shift" (2023 WWW)☆21Jul 27, 2023Updated 2 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆29Jan 11, 2022Updated 4 years ago
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆861Dec 15, 2023Updated 2 years ago
- [AAAI 2023] Official PyTorch implementation for "Untargeted Attack against Federated Recommendation Systems via Poisonous Item Embeddings…☆26Jan 18, 2023Updated 3 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- ☆63Nov 15, 2023Updated 2 years ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- A curated list of academic events on AI Security & Privacy☆168Aug 22, 2024Updated last year
- Code for our WSDM 2022 paper titled "The Datasets Dilemma: How Much Do We Really Know About Recommendation Datasets?"☆24Feb 25, 2022Updated 4 years ago
- Adaptive Denoising Training (ADT) for Recommendation.☆75Mar 8, 2022Updated 3 years ago
- [KDD 2025] The implementation of "Fine-tuning Multimodal Large Language Models for Product Bundling", KDD'25☆15Sep 20, 2025Updated 5 months ago
- Code for ICML2019 Paper "Compositional Invariance Constraints for Graph Embeddings"☆50Jun 7, 2020Updated 5 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- Diffusion Models for Generative Outfit Recommendation☆37Sep 11, 2024Updated last year
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆33Dec 2, 2023Updated 2 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆391Feb 22, 2024Updated 2 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago