Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3539618.3591751acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article
Open access

Poisoning Self-supervised Learning Based Sequential Recommendations

Published: 18 July 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Self-supervised learning (SSL) has been recently applied to sequential recommender systems to provide high-quality user representations. However, while facilitating the learning process recommender systems, SSL is not without security threats: carefully crafted inputs can poison the pre-trained models driven by SSL, thus reducing the effectiveness of the downstream recommendation model. This work shows that poisoning attacks against the pre-training stage threaten sequential recommender systems. Without any background knowledge of the model architecture and parameters, nor any API queries, our strategy proves the feasibility of poisoning attacks on mainstream SSL-based recommender schemes as well as on commonly used datasets. By injecting only a tiny amount of fake users, we get the target item recommended to real users more than thousands of times as before, demonstrating that recommender systems have a new attack surface due to SSL. We further show our attack is challenging for recommendation platforms to detect and defend. Our work highlights the weakness of self-supervised recommender systems and shows the necessity for researchers to be aware of this security threat. Our source code is available at https://github.com/CongGroup/Poisoning-SSL-based-RS.

    Supplemental Material

    MP4 File
    This is a presentation video on "Poisoning Self-supervised Learning Based Sequential Recommendations."In this video, we present that even though self-supervised learning brings many benefits to recommendation systems (such as alleviating data sparsity issues and improving recommendation performance), it introduces new attack vectors for attackers, which security threats should not be ignored. We show how our attack simultaneously achieves effectiveness, stealthiness, and low overhead. At the end of the slides, we provided a brief description of the experimental results and summarized some key take-home messages.

    References

    [1]
    Himan Abdollahpouri, Robin Burke, and Bamshad Mobasher. 2017. Controlling popularity bias in learning-to-rank recommendation. In Proc. of ACM RecSys.
    [2]
    Robin Burke, Bamshad Mobasher, Chad Williams, and Runa Bhaumik. 2006. Classification features for attack detection in collaborative recommender systems. In Proc. of ACM SIGKDD.
    [3]
    Nicholas Carlini and Andreas Terzis. 2022. Poisoning and backdooring contrastive learning. In Proc. of ICLR.
    [4]
    Jingfan Chen, Wenqi Fan, Guanghui Zhu, Xiangyu Zhao, Chunfeng Yuan, Qing Li, and Yihua Huang. 2022. Knowledge-enhanced black-box attacks for recommendations. In Proc. of ACM SIGKDD.
    [5]
    Konstantina Christakopoulou and Arindam Banerjee. 2019. Adversarial attacks on an oblivious recommender. In Proc. of ACM Conference on Recommender Systems.
    [6]
    Marissa Connor and Vincent Emanuele. 2022. Rethinking backdoor data poisoning attacks in the context of semi-supervised learning. arXiv:2212.02582, http://arxiv.org/abs/2212.02582 (2022).
    [7]
    Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805, http://arxiv.org/abs/1810.04805 (2018).
    [8]
    Minghong Fang, Neil Zhenqiang Gong, and Jia Liu. 2020. Influence function based data poisoning attacks to top-n recommender systems. In Proc. of WWW.
    [9]
    Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, and Jia Liu. 2018. Poisoning attacks to graph-based recommender systems. In Proc. of ACSAC.
    [10]
    Carlos A Gomez-Uribe and Neil Hunt. 2015. The netflix recommender system: algorithms, business value, and innovation. ACM Transactions on Management Information Systems (TMIS), Vol. 6, 4 (2015), 1--19.
    [11]
    Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal. 2014. Sybilbelief: a semi-supervised learning approach for structure-based sybil detection. IEEE Transactions on Information Forensics and Security, Vol. 9, 6 (2014), 976--987.
    [12]
    Ihsan Gunes, Cihan Kaleli, Alper Bilge, and Huseyin Polat. 2014. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, Vol. 42, 4 (2014), 767--799.
    [13]
    Kaiming He, Haoqi Fan, Yuxin Wu, Saining Xie, and Ross Girshick. 2020. Momentum contrast for unsupervised visual representation learning. In Proc. of IEEE/CVF CVPR.
    [14]
    Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, and Mingwei Xu. 2021. Data poisoning attacks to deep learning based recommender systems. In Proc. of NDSS.
    [15]
    Ashish Jaiswal, Ashwin Ramesh Babu, Mohammad Zaki Zadeh, Debapriya Banerjee, and Fillia Makedon. 2020. A survey on contrastive self-supervised learning. Technologies, Vol. 9, 1 (2020), 2.
    [16]
    Jinyuan Jia, Yupei Liu, and Neil Zhenqiang Gong. 2022. Badencoder: backdoor attacks to pre-trained encoders in self-supervised learning. In Proc. of S&P.
    [17]
    Jinyuan Jia, Binghui Wang, and Neil Zhenqiang Gong. 2017. Random walk based fake account detection in online social networks. In Proc. of IEEE/IFIP DSN.
    [18]
    Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In Proc. of NeurIPS.
    [19]
    Hongbin Liu, Jinyuan Jia, and Neil Zhenqiang Gong. 2022. PoisonedEncoder: poisoning the unlabeled pre-training data in contrastive learning. In Proc. of USENIX Security Symposium.
    [20]
    Xiao Liu, Fanjin Zhang, Zhenyu Hou, Li Mian, Zhaoyu Wang, Jing Zhang, and Jie Tang. 2021c. Self-supervised learning: generative or contrastive. IEEE Transactions on Knowledge and Data Engineering (2021).
    [21]
    Zhiwei Liu, Yongjun Chen, Jia Li, Philip S Yu, Julian McAuley, and Caiming Xiong. 2021a. Contrastive self-supervised sequential recommendation with robust augmentation. arXiv:2108.06479, http://arxiv.org/abs/2108.06479 (2021).
    [22]
    Zhiwei Liu, Ziwei Fan, Yu Wang, and Philip S Yu. 2021b. Augmenting sequential recommendation with pseudo-prior items via reversely pre-training transformer. In Proc. of ACM SIGIR.
    [23]
    Jianxin Ma, Chang Zhou, Hongxia Yang, Peng Cui, Xin Wang, and Wenwu Zhu. 2020. Disentangled self-supervision in sequential recommenders. In Proc. of ACM SIGKDD.
    [24]
    Bamshad Mobasher, Robin Burke, Runa Bhaumik, and Jeff J Sandvig. 2007. Attacks and remedies in collaborative recommendation. IEEE Intelligent Systems, Vol. 22, 3 (2007), 56--63.
    [25]
    Michael P O'Mahony, Neil J Hurley, and Guénolé CM Silvestre. 2005. Recommender systems: attack types and strategies. In Proc. of AAAI.
    [26]
    Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv:1807.03748, http://arxiv.org/abs/1807.03748 (2018).
    [27]
    Jiezhong Qiu, Qibin Chen, Yuxiao Dong, Jing Zhang, Hongxia Yang, Ming Ding, Kuansan Wang, and Jie Tang. 2020. Gcc: graph contrastive coding for graph neural network pre-training. In Proc. of ACM SIGKDD.
    [28]
    Dazhong Rong, Qinming He, and Jianhai Chen. 2022a. Poisoning deep learning based recommender model in federated learning scenarios. In Proc. of IJCAI.
    [29]
    Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, and Qinming He. 2022b. FedRecAttack: model poisoning attack to federated recommendation. In Proc. of IEEE ICDE.
    [30]
    Aniruddha Saha, Ajinkya Tejankar, Soroush Abbasi Koohpayegani, and Hamed Pirsiavash. 2022. Backdoor attacks on self-supervised learning. In Proc. of IEEE/CVF CVPR. 13337--13346.
    [31]
    Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, and Yang Zhang. 2022. Can't steal? Cont-steal! Contrastive stealing attacks against image encoders. arXiv:2201.07513, http://arxiv.org/abs/2201.07513 (2022).
    [32]
    Virat Shejwalkar, Lingjuan Lyu, and Amir Houmansadr. 2022. The perils of learning from unlabeled data: backdoor attacks on semi-supervised learning. arXiv:2211.00453, http://arxiv.org/abs/2211.00453 (2022).
    [33]
    Mingdan Si and Qingshan Li. 2020. Shilling attacks against collaborative recommender systems: a review. Artificial Intelligence Review, Vol. 53, 1 (2020), 291--319.
    [34]
    Brent Smith and Greg Linden. 2017. Two decades of recommender systems at Amazon.com. Ieee internet computing, Vol. 21, 3 (2017), 12--18.
    [35]
    Junshuai Song, Zhao Li, Zehong Hu, Yucheng Wu, Zhenpeng Li, Jian Li, and Jun Gao. 2020. Poisonrec: an adaptive data poisoning framework for attacking black-box recommender systems. In Proc. of IEEE ICDE.
    [36]
    Weiping Song, Chence Shi, Zhiping Xiao, Zhijian Duan, Yewen Xu, Ming Zhang, and Jian Tang. 2019. Autoint: automatic feature interaction learning via self-attentive neural networks. In Proc. of ACM CIKM.
    [37]
    Dusan Stevanovic, Aijun An, and Natalija Vlajic. 2012. Feature evaluation for web crawler detection with data mining techniques. Expert Systems with Applications, Vol. 39, 10 (2012), 8707--8717.
    [38]
    Fei Sun, Jun Liu, Jian Wu, Changhua Pei, Xiao Lin, Wenwu Ou, and Peng Jiang. 2019. BERT4Rec: sequential recommendation with bidirectional encoder representations from transformer. In Proc. of ACM CIKM.
    [39]
    Jiaxi Tang, Hongyi Wen, and Ke Wang. 2020. Revisiting adversarially learned injection attacks against recommender systems. In Proc. of ACM conference on recommender systems.
    [40]
    Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, 11 (2008).
    [41]
    Bimal Viswanath, M Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In In Proc. of USENIX Security.
    [42]
    Chenwang Wu, Defu Lian, Yong Ge, Zhihao Zhu, and Enhong Chen. 2021. Triple adversarial learning for influence based poisoning attack in recommender systems. In Proc. of ACM SIGKDD.
    [43]
    Chaojun Xiao, Ruobing Xie, Yuan Yao, Zhiyuan Liu, Maosong Sun, Xu Zhang, and Leyu Lin. [n.d.]. UPRec: user-aware pre-training for recommender systems. arXiv:2102.10989, http://arxiv.org/abs/2102.10989 ( [n.,d.]).
    [44]
    Xu Xie, Fei Sun, Zhaoyang Liu, Shiwen Wu, Jinyang Gao, Jiandong Zhang, Bolin Ding, and Bin Cui. 2022. Contrastive learning for sequential recommendation. In Proc. of IEEE ICDE.
    [45]
    Guolei Yang, Neil Zhenqiang Gong, and Ying Cai. 2017. Fake co-visitation injection attacks to recommender systems. In Proc. of NDSS.
    [46]
    Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, and Yang Zhang. 2022. Data poisoning attacks against multimodal encoders. arXiv:2209.15266, http://arxiv.org/abs/2209.15266 (2022).
    [47]
    Tiansheng Yao, Xinyang Yi, Derek Zhiyuan Cheng, Felix Yu, Ting Chen, Aditya Menon, Lichan Hong, Ed H Chi, Steve Tjoa, Jieqi Kang, et al. 2021. Self-supervised learning for large-scale item recommendations. In Proc. of ACM CIKM.
    [48]
    Junliang Yu, Hongzhi Yin, Xin Xia, Tong Chen, Jundong Li, and Zi Huang. 2022. Self-supervised learning for recommender systems: a survey. arXiv:2203.15876, http://arxiv.org/abs/2203.15876 (2022).
    [49]
    Lantao Yu, Weinan Zhang, Jun Wang, and Yong Yu. 2017. Seqgan: sequence generative adversarial nets with policy gradient. In Proc. of AAAI.
    [50]
    Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. 2019. Detecting fake accounts in online social networks at the time of registrations. In Proc. of ACM CCS.
    [51]
    Fajie Yuan, Xiangnan He, Haochuan Jiang, Guibing Guo, Jian Xiong, Zhezhao Xu, and Yilin Xiong. 2020a. Future data helps training: modeling future contexts for session-based recommendation. In Proc. of WWW.
    [52]
    Fajie Yuan, Xiangnan He, Alexandros Karatzoglou, and Liguang Zhang. 2020b. Parameter-efficient transfer from sequential behaviors for user modeling and recommendation. In Proc. of ACM SIGIR.
    [53]
    Zhenrui Yue, Zhankui He, Huimin Zeng, and Julian McAuley. 2021. Black-box attacks on sequential recommenders via data-free model extraction. In Proc. of ACM Conference on Recommender Systems.
    [54]
    Zhenrui Yue, Huimin Zeng, Ziyi Kou, Lanyu Shang, and Dong Wang. 2022. Defending substitution-based profile pollution attacks on sequential recommenders. In Proc. of ACM RecSys.
    [55]
    Hengtong Zhang, Yaliang Li, Bolin Ding, and Jing Gao. 2020. Practical data poisoning attack against next-item recommendation. In Proc. of WWW. 2458--2464.
    [56]
    Hengtong Zhang, Changxin Tian, Yaliang Li, Lu Su, Nan Yang, Wayne Xin Zhao, and Jing Gao. 2021b. Data poisoning attack against recommender system using incomplete and perturbed data. In Proc. of ACM SIGKDD. 2154--2164.
    [57]
    Shijie Zhang, Hongzhi Yin, Tong Chen, Zi Huang, Quoc Viet Hung Nguyen, and Lizhen Cui. 2022. Pipattack: poisoning federated recommender systems for manipulating item promotion. In Proc. of ACM WSDM.
    [58]
    Yang Zhang, Fuli Feng, Xiangnan He, Tianxin Wei, Chonggang Song, Guohui Ling, and Yongdong Zhang. 2021a. Causal intervention for leveraging popularity bias in recommendation. In Proc. of ACM SIGIR.
    [59]
    Chang Zhou, Jianxin Ma, Jianwei Zhang, Jingren Zhou, and Hongxia Yang. 2021. Contrastive learning for debiased candidate generation in large-scale recommender systems. In Proc. of ACM SIGKDD.
    [60]
    Kun Zhou, Hui Wang, Wayne Xin Zhao, Yutao Zhu, Sirui Wang, Fuzheng Zhang, Zhongyuan Wang, and Ji-Rong Wen. 2020. S3-rec: self-supervised learning for sequential recommendation with mutual information maximization. In Proc. of ACM CIKM.
    [61]
    Ziwei Zhu, Yun He, Xing Zhao, Yin Zhang, Jianling Wang, and James Caverlee. 2021. Popularity-opportunity bias in collaborative filtering. In Proc. of ACM WSDM.

    Cited By

    View all
    • (2024)Meta-optimized Structural and Semantic Contrastive Learning for Graph Collaborative Filtering2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00058(679-691)Online publication date: 13-May-2024
    • (2024)Multi-level sequence denoising with cross-signal contrastive learning for sequential recommendationNeural Networks10.1016/j.neunet.2024.106480179(106480)Online publication date: Nov-2024
    • (2024)Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised LearningKnowledge Science, Engineering and Management10.1007/978-981-97-5498-4_10(122-134)Online publication date: 27-Jul-2024

    Index Terms

    1. Poisoning Self-supervised Learning Based Sequential Recommendations

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGIR '23: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval
      July 2023
      3567 pages
      ISBN:9781450394086
      DOI:10.1145/3539618
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 July 2023

      Check for updates

      Author Tags

      1. poisoning attack
      2. self-supervised learning
      3. sequential recommendation

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      SIGIR '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 792 of 3,983 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)886
      • Downloads (Last 6 weeks)58
      Reflects downloads up to 09 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Meta-optimized Structural and Semantic Contrastive Learning for Graph Collaborative Filtering2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00058(679-691)Online publication date: 13-May-2024
      • (2024)Multi-level sequence denoising with cross-signal contrastive learning for sequential recommendationNeural Networks10.1016/j.neunet.2024.106480179(106480)Online publication date: Nov-2024
      • (2024)Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised LearningKnowledge Science, Engineering and Management10.1007/978-981-97-5498-4_10(122-134)Online publication date: 27-Jul-2024

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media