This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"
☆17Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for RecommPoison
Users that are interested in RecommPoison are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated collection of adversarial attack and defense on recommender systems.☆137Apr 29, 2022Updated 4 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 8 years ago
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- Adversarial Item Promotion in visually-aware recommenders☆17Sep 3, 2021Updated 4 years ago
- This repository contains our implementations for Shilling Attacks against Recommender Systems.☆24Jun 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- ☆11Nov 16, 2021Updated 4 years ago
- A unified framework for recommender system attacking☆34Mar 29, 2024Updated 2 years ago
- This is our official implementation for the paper: “INMO: A Model-Agnostic and Scalable Module for Inductive Collaborative Filtering”.☆11Aug 10, 2022Updated 3 years ago
- ☆16May 17, 2025Updated 11 months ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆165Mar 3, 2021Updated 5 years ago
- [ICML2025] Official code for "Reinforced Lifelong Editing for Language Models"☆21Feb 23, 2025Updated last year
- Code and data repository for "The Mirage of Model Editing: Revisiting Evaluation in the Wild"☆18Aug 27, 2025Updated 8 months ago
- Dynamic time series clustering via volatility change-points☆16Jun 27, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AMT-CDR: A Deep Adversarial Multi-channel Transfer Network for Cross-domain Recommendation☆11Nov 2, 2023Updated 2 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- Skipping Recurrent Neural Networks☆13Aug 3, 2018Updated 7 years ago
- ☆25Jan 20, 2025Updated last year
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- The implementation for the work "CoLLM: Integrating Collaborative Embeddings into Large Language Models for Recommendation".☆151Sep 12, 2025Updated 7 months ago
- [ SIGIR '20 ] How Useful are Reviews for Recommendation? A Critical Review and Potential Improvements☆56May 23, 2022Updated 3 years ago
- ☆22Oct 25, 2024Updated last year
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Replication of the paper "Text Is All You Need: Learning Language Representations for Sequential Recommendation" on KDD'23.☆130Apr 23, 2024Updated 2 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- [TOIS'24] "RecRanker: Instruction Tuning Large Language Model as Ranker for Top-k Recommendation"☆16Dec 1, 2024Updated last year
- Explore, Establish, Exploit: Red Teaming Language Models from Scratch☆15Jun 21, 2023Updated 2 years ago
- Code for "Personalized Fashion Recommendation with Visual Explanations based on Multi-model Attention Network"☆16Feb 6, 2019Updated 7 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- a py3 lib for NLP & image-caption metrics : BLEU METEOR CIDEr ROUGE SPICE WMD☆14Sep 13, 2022Updated 3 years ago
- A Python library used to collect shilling detection methods and generate simulated attackers. (for academic use)☆59Sep 17, 2022Updated 3 years ago
- EMCDR implemented using pytorch☆14Oct 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Image Captioning using LSTM and Deep Learning on Flickr8K dataset.☆15Feb 1, 2022Updated 4 years ago
- code for GaVaMoE: Gaussian-Variational Gated Mixture of Experts for Explainable Recommendation☆18Dec 7, 2024Updated last year
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆126Mar 18, 2026Updated last month
- ☆20May 14, 2025Updated 11 months ago
- [ACL 2024] PyTorch implementation for "Stealthy Attack on Large Language Model based Recommendation"☆20Jun 19, 2024Updated last year
- REALM: A Real-to-Sim Validated Benchmark for Generalization in Robotic Manipulation☆50Apr 25, 2026Updated last week
- THAN: Multi-Modal Transportation Recommendation with Heterogeneous Graph Attention Networks☆14Dec 4, 2024Updated last year