[HTML][HTML] Blockchain-based recommender systems: Applications, challenges and future opportunities

Y Himeur, A Sayed, A Alsalemi, F Bensaali… - Computer Science …, 2022 - Elsevier
Recommender systems have been widely used in different application domains including
energy-preservation, e-commerce, healthcare, social media, etc. Such applications require …

Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives

Y Himeur, SS Sohail, F Bensaali, A Amira… - Computers & Security, 2022 - Elsevier
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …

Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses

M Goldblum, D Tsipras, C Xie, X Chen… - … on Pattern Analysis …, 2022 - ieeexplore.ieee.org
As machine learning systems grow in scale, so do their training data requirements, forcing
practitioners to automate and outsource the curation of training data in order to achieve state …

Witches' brew: Industrial scale data poisoning via gradient matching

J Geiping, L Fowl, WR Huang, W Czaja… - arXiv preprint arXiv …, 2020 - arxiv.org
Data Poisoning attacks modify training data to maliciously control a model trained on such
data. In this work, we focus on targeted poisoning attacks which cause a reclassification of …

Just how toxic is data poisoning? a unified benchmark for backdoor and data poisoning attacks

A Schwarzschild, M Goldblum… - International …, 2021 - proceedings.mlr.press
Data poisoning and backdoor attacks manipulate training data in order to cause models to
fail during inference. A recent survey of industry practitioners found that data poisoning is the …

Threats to training: A survey of poisoning attacks and defenses on machine learning systems

Z Wang, J Ma, X Wang, J Hu, Z Qin, K Ren - ACM Computing Surveys, 2022 - dl.acm.org
Machine learning (ML) has been universally adopted for automated decisions in a variety of
fields, including recognition and classification applications, recommendation systems …

Manipulating recommender systems: A survey of poisoning attacks and countermeasures

TT Nguyen, N Quoc Viet Hung, TT Nguyen… - ACM Computing …, 2024 - dl.acm.org
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …

Byzantine-robust federated learning with variance reduction and differential privacy

Z Zhang, R Hu - 2023 IEEE Conference on Communications …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is designed to preserve data privacy during model training, where
the data remains on the client side (ie, IoT devices), and only model updates of clients are …

Adversarial recommender systems: Attack, defense, and advances

VW Anelli, Y Deldjoo, T DiNoia, FA Merra - Recommender systems …, 2021 - Springer
Adversarial machine learning is the research field investigating vulnerabilities inherent to
machine learning systems' design and ways to defend against them. Recently …

Recent developments in recommender systems: A survey

Y Li, K Liu, R Satapathy, S Wang… - IEEE Computational …, 2024 - ieeexplore.ieee.org
In this technical survey, the latest advancements in the field of recommender systems are
comprehensively summarized. The objective of this study is to provide an overview of the …