Top Banner
September 18th, 2019 Konstantina Christakopoulou Arindam Banerjee Adversarial Aacks on an oblivious recommender
28

on an oblivious recommender - RecSys

Feb 19, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: on an oblivious recommender - RecSys

September 18th, 2019

Konstantina ChristakopoulouArindam Banerjee

Adversarial Attackson an oblivious recommender

Page 2: on an oblivious recommender - RecSys

Why care for adversarial attacks in recommender systems?

Page 3: on an oblivious recommender - RecSys

How vulnerable are recommendation models to machine learned adversarial attacks?

The question

Page 4: on an oblivious recommender - RecSys

Form of Adversarial Attacks in

recommendation systems

Items

Real

Use

rs

Page 5: on an oblivious recommender - RecSys

Form of Adversarial Attacks in

recommendation systems

Items

Real

Use

rsFa

ke U

sers

Page 6: on an oblivious recommender - RecSys

Two Lines of Prior Work

Hand-Engineered fake user profiles in Recommendation Systems

1

“Shilling Attacks” in Recommender Systems

Page 7: on an oblivious recommender - RecSys

Two Lines of Prior Work

Hand-Engineered fake user profiles in Recommendation Systems

1

“Shilling Attacks” in Recommender Systems

Learned Adversarial Attacks in other domains

2

Adversarial Examples

Page 8: on an oblivious recommender - RecSys

This Work

Combine both approaches:revisit adversarial attacks on recommendersfrom a machine learned optimization perspective

Page 9: on an oblivious recommender - RecSys

Challenges specific to the recommendation setting

Collaborative Filteringcascading effects?

a

Page 10: on an oblivious recommender - RecSys

Challenges specific to the recommendation setting

Un-noticeability of attacks

b

Page 11: on an oblivious recommender - RecSys

Challenges specific to the recommendation setting

c

Need to learn model iteratively

Poisoning attacks

Page 12: on an oblivious recommender - RecSys

Challenges specific to the recommendation setting

d

No access to gradient

Page 13: on an oblivious recommender - RecSys

Formulating the problem

Recommender

System

Adversary

Two-player general-sum

min-max game:

Page 14: on an oblivious recommender - RecSys

Assumptions

Recommender

System

Adversary

Oblivious to the existence of the adversary

Page 15: on an oblivious recommender - RecSys

Assumptions

Recommender

System

Adversary

Can evaluate how incorporating the fake users would change the recommender’s scores

- Knows R’s loss function- Knows R’s parametric representation- Cannot evaluate R’s gradient

Page 16: on an oblivious recommender - RecSys

Recommender

System

Adversary

Fit my model on

data.

Page 17: on an oblivious recommender - RecSys

Recommender

System

Adversary

Create fake user matrix Z.

Page 18: on an oblivious recommender - RecSys

Recommender

System

Adversary

Fit my model on

data.

Page 19: on an oblivious recommender - RecSys

Recommender

System

Adversary

Create fake user matrix

Z until I achieve my

goal

Page 20: on an oblivious recommender - RecSys

Adversary’s Goals

Goal 1: Create fake users so that they are indistinguishable from real users

Goal 2: Create fake users so that they achieve an adversarial intent

Page 21: on an oblivious recommender - RecSys

Adversary’s Goals The idea

Distribution-preserving adversarial users

Minimize Jensen-Shannon divergence among real-fake distributions

Generative Adversarial Networks are a great fit.

First stage of attacker strategy

Page 22: on an oblivious recommender - RecSys

Adversary’s Goals

Projected gradient descent:

Page 23: on an oblivious recommender - RecSys

How to obtain the gradient?

Challenges:

● Learn recommender iteratively after injecting fake user profiles

● Bandit feedback, no access to gradient

Adversary’s Goals

Page 24: on an oblivious recommender - RecSys

How to obtain the gradient?

Idea: Query Recommender on K directions to construct gradient approximation

Adversary’s Goals

Page 25: on an oblivious recommender - RecSys

Targeting a User-Item Pair

The adversary removes the target item from the target user’s top-10 list.

Rank LossMetrics

Page 26: on an oblivious recommender - RecSys

Targeting Item’s Mean Predicted Score

This is a hard task for the adversary.

Each user’s

Page 27: on an oblivious recommender - RecSys

Targeting the top User of an Item

Targeting the top user also targets all top-K users for the target item.

Page 28: on an oblivious recommender - RecSys

Takeaways

Proposed general approach for ML adversarial attacks to recommender systems

Considered new types of attacks

Novel algorithm using 0th order optimization, as no access to the gradient & iterative procedure

Effective attacks show the need for adversary-aware recommenders

Thank you!