[RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction
☆40Sep 6, 2021Updated 4 years ago
Alternatives and similar repositories for RecSys-Extraction-Attack
Users that are interested in RecSys-Extraction-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Introducing Bundle Recommendation in Conversational Recommendation Scenarios on RecSys 2022☆22Dec 9, 2022Updated 3 years ago
- This is the repository for our paper "GAN-based Matrix Factorization for Recommender Systems" accepted at ACM/SIGAPP Symposium on Applied…☆18Aug 22, 2022Updated 3 years ago
- Model Poisoning Attack to Federated Recommendation☆32Apr 23, 2022Updated 3 years ago
- ☆35Dec 3, 2020Updated 5 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆124Mar 18, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- [EMNLP 2021] PyTorch Implementation of Contrastive Domain Adaptation for Question Answering using Limited Text Corpora☆14Jul 4, 2023Updated 2 years ago
- PyTorch impelementation for "Federated Recommendation via Hybrid Retrieval Augmented Generation".☆23Mar 8, 2024Updated 2 years ago
- A unified framework for recommender system attacking☆34Mar 29, 2024Updated 2 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆23Feb 26, 2025Updated last year
- [ NeurIPS '22 ] Data distillation for recommender systems. Shows equivalent performance with 2-3 orders less data.☆23Jun 8, 2023Updated 2 years ago
- ☆11Nov 16, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains our implementations for Shilling Attacks against Recommender Systems.☆23Jun 25, 2022Updated 3 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- News classification & recommendation in Keras☆13Jun 15, 2020Updated 5 years ago
- This is the official PyTorch implementation for the paper: "Directed Acyclic Graph Factorization Machines for CTR Prediction via Knowledg…☆14Mar 5, 2023Updated 3 years ago
- A Survey of Poisoning Attacks and Defenses in Recommender Systems☆41Feb 28, 2026Updated last month
- Implementation of SVD and SVD++ for recommendation☆32Jan 13, 2017Updated 9 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- The python implementation of our "UA-FedRec: Untargeted Attack on Federated News Recommendation" in KDD 2023.☆20Aug 2, 2022Updated 3 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., a…☆164Mar 3, 2021Updated 5 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- This repository contains the code for the publication "Harnessing the Power of Multi-Task Pretraining for Ground-Truth Level Natural Lang…☆10Oct 26, 2023Updated 2 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- ☆22Sep 17, 2024Updated last year
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- This repository contains the official code for the paper: "Prompt Injection: Parameterization of Fixed Inputs"☆32Sep 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆84Aug 3, 2021Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- Cross-modal Reinforced Prompting for Graph and Language Tasks, KDD 2024.☆11Sep 29, 2024Updated last year
- Implementation for the PHM paper at ICLR'21☆13Mar 1, 2023Updated 3 years ago
- 利用图神经网络进行CTR预估☆15Nov 22, 2019Updated 6 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago