Tutorial on robustness of recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011
Tutorial on Robustness of Recommender Systems Tutorial on Robustness of Recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011 RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? Profile Injection Attacks Relevance of robustnes Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy
Tutorial on Robustness of Recommender Systems What is Robustness? Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
Outline 1 What is Robustness? a Profile Injection Attacks rObUstnESs Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy
Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness
jection Attacks Defining the Problem a Recommender Systems use personal information about end-users to make useful personalised recommendations a When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct owever One can have, some claim, as many electronic per sonas as one has time and energy to create a How does the system perform if multiple identities are used to try to deliberately bias the recommender output
Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Defining the Problem Recommender Systems use personal information about end-users to make useful personalised recommendations. When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct. However . . . “One can have, some claim, as many electronic personas as one has time and energy to create” –Judith Donath (1998) as quoted in Douceur (2002) How does the system perform if multiple identities are used to try to deliberately bias the recommender output? RecSys 2011: Tutorial on Recommender Robustness