This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"
☆17Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for RecommPoison
Users that are interested in RecommPoison are comparing it to the libraries listed below
Sorting:
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- A curated collection of adversarial attack and defense on recommender systems.☆136Apr 29, 2022Updated 3 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 7 years ago
- Adversarial Item Promotion in visually-aware recommenders☆16Sep 3, 2021Updated 4 years ago
- A unified framework for recommender system attacking☆33Mar 29, 2024Updated last year
- SVO extraction using NLTK☆37Mar 16, 2019Updated 6 years ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆164Mar 3, 2021Updated 5 years ago
- ☆19May 14, 2025Updated 9 months ago
- ☆11Dec 19, 2023Updated 2 years ago
- Code and Results for the paper: A Revisiting Study of Appropriate Offline Evaluation for Top-𝑁 Recommendation Algorithms.☆11Mar 10, 2022Updated 3 years ago
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- VLA model interpretability tools☆30Feb 24, 2026Updated last week
- ☆13Jan 14, 2026Updated last month
- ☆11Mar 8, 2024Updated last year
- This is the official PyTorch implementation for the paper: "Directed Acyclic Graph Factorization Machines for CTR Prediction via Knowledg…☆14Mar 5, 2023Updated 2 years ago
- ☆13Jan 23, 2026Updated last month
- A Python library used to collect shilling detection methods and generate simulated attackers. (for academic use)☆59Sep 17, 2022Updated 3 years ago
- Offical code repository for PromptMix: A Class Boundary Augmentation Method for Large Language Model Distillation, EMNLP 2023☆12Dec 13, 2023Updated 2 years ago
- 基于RISC_V32I指令集架构的五级流水CPU☆15Sep 30, 2019Updated 6 years ago
- [EACL'23] COVID-VTS: Fact Extraction and Verification on Short Video Platforms☆11Sep 26, 2023Updated 2 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆121Apr 8, 2025Updated 10 months ago
- ☆13May 17, 2025Updated 9 months ago
- The implementation for the work "CoLLM: Integrating Collaborative Embeddings into Large Language Models for Recommendation".☆145Sep 12, 2025Updated 5 months ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- EMCDR implemented using pytorch☆14Oct 11, 2020Updated 5 years ago
- Image Captioning using LSTM and Deep Learning on Flickr8K dataset.☆15Feb 1, 2022Updated 4 years ago
- Toy codes to kick-start deep learning for NLP !☆12Aug 22, 2016Updated 9 years ago
- Python + TensorFlow implementation of the DropoutNet model☆13Feb 4, 2018Updated 8 years ago
- ☆20Jun 17, 2024Updated last year
- Skipping Recurrent Neural Networks☆13Aug 3, 2018Updated 7 years ago
- code for "Generative News Recommendation"☆15May 31, 2024Updated last year
- Leveraging LLMs for Post-OCR Correction of Historical Newspapers☆15Jun 20, 2024Updated last year
- Dynamic time series clustering via volatility change-points☆16Jun 27, 2019Updated 6 years ago
- Replication of the paper "Text Is All You Need: Learning Language Representations for Sequential Recommendation" on KDD'23.☆129Apr 23, 2024Updated last year
- [ SIGIR '20 ] How Useful are Reviews for Recommendation? A Critical Review and Potential Improvements☆56May 23, 2022Updated 3 years ago
- ☆21Oct 25, 2024Updated last year
- 清华大学宿舍洗衣机空闲提醒小程序☆14Feb 4, 2021Updated 5 years ago