This repository contains our implementations for Shilling Attacks against Recommender Systems.
☆24Jun 25, 2022Updated 3 years ago
Alternatives and similar repositories for ShillingAttack
Users that are interested in ShillingAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- ☆35Dec 3, 2020Updated 5 years ago
- A unified framework for recommender system attacking☆34Mar 29, 2024Updated 2 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 8 years ago
- A PyTorch implementation for the Recsys 2020 paper: Revisiting Adversarially Learned Injection Attacks Against Recommender Systems☆24Sep 6, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Survey of Poisoning Attacks and Defenses in Recommender Systems☆41Feb 28, 2026Updated 2 months ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- Official implementation of the paper: ANF: Crafting transferable adversarial point clouds via adversarial noise factorization☆31Oct 6, 2025Updated 6 months ago
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆22Feb 26, 2025Updated last year
- Official implementation of the paper: Enhancing the Transferability of Adversarial Point Clouds by Initializing Transferable Adversarial …☆29Apr 1, 2025Updated last year
- Material supporting the tutorial "Pursuing Privacy in Recommender Systems: The View of Users and Researchers from Regulations to Applicat…☆18Jul 12, 2023Updated 2 years ago
- [SIGIR'22] Official PyTorch implementation for "Learning to Denoise Unreliable Interactions for Graph Collaborative Filtering".☆18Oct 24, 2022Updated 3 years ago
- Deconfounded Recommendation for Alleviating Bias Amplification☆46Jun 12, 2021Updated 4 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆39Oct 7, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- SeBot: Structural Entropy Guided Multi-View Contrastive learning for Social Bot Detection. KDD 2024☆17Feb 20, 2025Updated last year
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆165Mar 3, 2021Updated 5 years ago
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- Experimental codes for the paper 'How to Learn Item Representation for Cold-Start Multimedia Recommendation?'☆18Jan 12, 2024Updated 2 years ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- Diffusion Recommender Model☆250Jul 4, 2024Updated last year
- Multi-scale Information Diffusion Prediction with Sequential Hypergraphs☆13Apr 13, 2024Updated 2 years ago
- Code for analyzing and evaluating stellarator plasma boundaries☆59Apr 9, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆18Nov 13, 2021Updated 4 years ago
- 利用图神经网络进行CTR预估☆15Nov 22, 2019Updated 6 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 7 months ago
- Adversarial Item Promotion in visually-aware recommenders☆17Sep 3, 2021Updated 4 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated 2 years ago
- Code for "Score-based Generative Modeling Secretly Minimizes the Wasserstein Distance", NeurIPS 2022☆17Feb 11, 2023Updated 3 years ago
- FairGAN: GANs-based Fairness-aware Learning for Recommendations with Implicit Feedback☆15Oct 8, 2022Updated 3 years ago
- ☆12Apr 27, 2023Updated 3 years ago
- This is the repository for our paper "GAN-based Matrix Factorization for Recommender Systems" accepted at ACM/SIGAPP Symposium on Applied…☆18Aug 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Jun 18, 2019Updated 6 years ago
- Source code of FedAttack.☆10Feb 9, 2022Updated 4 years ago
- User-controllable Recommendation Against Filter Bubbles☆18May 4, 2022Updated 3 years ago
- [CVPR 2023] Understanding the Robustness of 3D Object Detection With Bird's-Eye-View Representations in Autonomous Driving☆32Apr 3, 2024Updated 2 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- Sequential Matching Network implemented by MXNET☆18Mar 11, 2019Updated 7 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year