This repository contains our implementations for Shilling Attacks against Recommender Systems.
☆23Jun 25, 2022Updated 3 years ago
Alternatives and similar repositories for ShillingAttack
Users that are interested in ShillingAttack are comparing it to the libraries listed below
Sorting:
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- Tensorflow implementation of TrialAttack (Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems. KDD 20…☆12Sep 2, 2021Updated 4 years ago
- A unified framework for recommender system attacking☆33Mar 29, 2024Updated last year
- A curated collection of adversarial attack and defense on recommender systems.☆136Apr 29, 2022Updated 3 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 7 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆124Updated this week
- A Survey of Poisoning Attacks and Defenses in Recommender Systems☆41Feb 28, 2026Updated 3 weeks ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆23Feb 26, 2025Updated last year
- Material supporting the tutorial "Pursuing Privacy in Recommender Systems: The View of Users and Researchers from Regulations to Applicat…☆18Jul 12, 2023Updated 2 years ago
- [SIGIR'22] Official PyTorch implementation for "Learning to Denoise Unreliable Interactions for Graph Collaborative Filtering".☆18Oct 24, 2022Updated 3 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆39Oct 7, 2025Updated 5 months ago
- Deconfounded Recommendation for Alleviating Bias Amplification☆46Jun 12, 2021Updated 4 years ago
- Adaptive Denoising Training (ADT) for Recommendation.☆75Mar 8, 2022Updated 4 years ago
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- SeBot: Structural Entropy Guided Multi-View Contrastive learning for Social Bot Detection. KDD 2024☆16Feb 20, 2025Updated last year
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆164Mar 3, 2021Updated 5 years ago
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- Experimental codes for the paper 'How to Learn Item Representation for Cold-Start Multimedia Recommendation?'☆18Jan 12, 2024Updated 2 years ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- Diffusion Recommender Model☆246Jul 4, 2024Updated last year
- Multi-scale Information Diffusion Prediction with Sequential Hypergraphs☆13Apr 13, 2024Updated last year
- ☆12Jan 29, 2022Updated 4 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- 利用图神经网络进行CTR预估☆15Nov 22, 2019Updated 6 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Adversarial Item Promotion in visually-aware recommenders☆16Sep 3, 2021Updated 4 years ago
- FairGAN: GANs-based Fairness-aware Learning for Recommendations with Implicit Feedback☆15Oct 8, 2022Updated 3 years ago
- ☆12Apr 27, 2023Updated 2 years ago
- This is the repository for our paper "GAN-based Matrix Factorization for Recommender Systems" accepted at ACM/SIGAPP Symposium on Applied…☆18Aug 22, 2022Updated 3 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- ☆13Jun 18, 2019Updated 6 years ago
- Code for "Personalized Fashion Recommendation with Visual Explanations based on Multi-model Attention Network"☆16Feb 6, 2019Updated 7 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- User-controllable Recommendation Against Filter Bubbles☆18May 4, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- A toolbox for benchmarking Multimodal LLM Agents trustworthiness across truthfulness, controllability, safety and privacy dimensions thro…☆64Jan 9, 2026Updated 2 months ago