Defending Substitution-Based Profile Pollution Attacks on Sequential Recommenders.
Zhenrui YueHuimin ZengZiyi KouLanyu ShangDong WangPublished in: CoRR (2022)
Keyphrases
- user profiles
- injection attacks
- ddos attacks
- recommender systems
- collaborative filtering
- malicious attacks
- countermeasures
- monitoring system
- neural network
- hidden markov models
- data publishing
- traffic analysis
- dos attacks
- watermarking algorithm
- terrorist attacks
- security threats
- image watermarking
- digital watermarking
- computer security
- recommendation systems
- cooperative
- multiscale
- data mining