Adversarial Text Rewriting for Text-aware Recommender Systems

August 01, 2024 ยท Entered Twilight ยท ๐Ÿ› International Conference on Information and Knowledge Management

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: ATR-2FT.sh, ATR-ICL.sh, README.md, requirements.txt, result, src

Authors Sejoon Oh, Gaurav Verma, Srijan Kumar arXiv ID 2408.00312 Category cs.IR: Information Retrieval Cross-listed cs.CR, cs.LG, cs.SI Citations 2 Venue International Conference on Information and Knowledge Management Repository https://github.com/sejoonoh/ATR โญ 12 Last Checked 2 months ago
Abstract
Text-aware recommender systems incorporate rich textual features, such as titles and descriptions, to generate item recommendations for users. The use of textual features helps mitigate cold-start problems, and thus, such recommender systems have attracted increased attention. However, we argue that the dependency on item descriptions makes the recommender system vulnerable to manipulation by adversarial sellers on e-commerce platforms. In this paper, we explore the possibility of such manipulation by proposing a new text rewriting framework to attack text-aware recommender systems. We show that the rewriting attack can be exploited by sellers to unfairly uprank their products, even though the adversarially rewritten descriptions are perceived as realistic by human evaluators. Methodologically, we investigate two different variations to carry out text rewriting attacks: (1) two-phase fine-tuning for greater attack performance, and (2) in-context learning for higher text rewriting quality. Experiments spanning 3 different datasets and 4 existing approaches demonstrate that recommender systems exhibit vulnerability against the proposed text rewriting attack. Our work adds to the existing literature around the robustness of recommender systems, while highlighting a new dimension of vulnerability in the age of large-scale automated text generation.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Information Retrieval