Adversarial Item Promotion in visually-aware recommenders
☆16Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for AIP
Users that are interested in AIP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- Code for "Personalized Fashion Recommendation with Visual Explanations based on Multi-model Attention Network"☆16Feb 6, 2019Updated 7 years ago
- A curated collection of adversarial attack and defense on recommender systems.☆136Apr 29, 2022Updated 3 years ago
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- [ACL 2024] PyTorch implementation for "Stealthy Attack on Large Language Model based Recommendation"☆19Jun 19, 2024Updated last year
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆23Feb 26, 2025Updated last year
- [WWW 2021]Task-adaptive Neural Process for User Cold-Start Recommendation☆33Mar 16, 2021Updated 5 years ago
- CIKM'20, Generate Neural Template Explanations for Recommendation☆23Jan 24, 2025Updated last year
- ☆20Jun 6, 2021Updated 4 years ago
- A basic tiktok scraper to download videos and comments☆13Jul 3, 2022Updated 3 years ago
- ☆10Aug 16, 2022Updated 3 years ago
- ☆42Nov 24, 2023Updated 2 years ago
- ☆16Sep 17, 2024Updated last year
- The source code used for paper "Effective Seed-Guided Topic Discovery by Integrating Multiple Types of Contexts", in WSDM 2023.☆15May 27, 2023Updated 2 years ago
- A novel dynamic recommendation model that focuses on users who have interactions in the past but turn relatively inactive recently☆14Sep 16, 2022Updated 3 years ago
- ☆10Sep 10, 2023Updated 2 years ago
- ☆49Oct 14, 2023Updated 2 years ago
- This is the our implementation for the paper: Exploring Mixed Information Flow for Cross-domain Sequential Recommendations☆12Aug 17, 2020Updated 5 years ago
- ☆14Sep 22, 2020Updated 5 years ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆22Nov 14, 2020Updated 5 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- Meta-learning-based Cold-Start Sequential Recommendation☆16May 25, 2021Updated 4 years ago
- ☆10Sep 14, 2023Updated 2 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- [IEEE TKDE] A LLM-based Recommender System with user&item Tokenizers and a generative retrieval paradigm.☆25Mar 11, 2026Updated last week
- ☆14Jun 4, 2025Updated 9 months ago
- Explore, Establish, Exploit: Red Teaming Language Models from Scratch☆13Jun 21, 2023Updated 2 years ago
- A web app that learns to repair your command line mistakes.☆15Jan 13, 2017Updated 9 years ago
- Replication of the paper "Text Is All You Need: Learning Language Representations for Sequential Recommendation" on KDD'23.☆129Apr 23, 2024Updated last year
- ☆22Oct 25, 2024Updated last year
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- Implementation of "Adversarial Text Generation without Reinforcement Learning"☆12Mar 13, 2019Updated 7 years ago
- Training Sequential Recommenders as Discriminators (SIGIR'22)☆15Jul 25, 2022Updated 3 years ago
- [WSDM 2025] Source code for "Teach Me How to Denoise: A Universal Framework for Denoising Multi-modal Recommender Systems via Guided Cali…☆14Oct 14, 2025Updated 5 months ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆124Updated this week
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- ☆17Jan 19, 2022Updated 4 years ago
- Implement of Implicit Knowledge Extraction Attack.☆20May 28, 2025Updated 9 months ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year