Attacks and Detections in Recommender Systems: A Comprehensive Analysis for Models, Progresses, and Trends

  • Yan Feng
  • , Zhihai Yang
  • , Kexin Li
  • , Jianxin Li
  • , Pinghui Wang
  • , Zhiquan Liu

Research output: Contribution to journalArticlepeer-review

Abstract

Recommender systems (RSs), as crucial components of online services, can help users efficiently obtain information they may like. In reality, RSs face long-term threats. Attackers manipulate recommendation results by injecting malicious data in order to obtain benefits. At present, research on the security of RSs lacks a comprehensive understanding of attack capabilities. Moreover, existing defense strategies have not yet been systematically associated with attack characteristics. More importantly, existing defense methods rarely focus on real unlabeled data in practical application scenarios for anomaly detection and forensics. Therefore, this survey systematically analyzes the security of RSs and provides new insights. Specifically, we first categorize attack models from an attack perspective into: attack strategies based on targets, attack strategies against security and privacy, attack strategies based on prior knowledge, and attack strategies against other RSs. From a perspective of defense, existing detection models, second, can be divided into: behavioral representation based on statistics, detection based on hidden features, detection against privacy attacks, anomaly discovery based on association mining, and abnormality forensics for real-world data. Finally, we propose several potential research directions aimed at providing guidance for the security research of RSs.

Original languageEnglish
Pages (from-to)889-910
Number of pages22
JournalIEEE Transactions on Knowledge and Data Engineering
Volume38
Issue number2
DOIs
StatePublished - 2026

Keywords

  • Abnormality forensics
  • Attack detection
  • Behavior representation
  • Injection attack

Fingerprint

Dive into the research topics of 'Attacks and Detections in Recommender Systems: A Comprehensive Analysis for Models, Progresses, and Trends'. Together they form a unique fingerprint.

Cite this