Ada: Adversarial learning based data augmentation for malicious users detection

被引:2
|
作者
Wang, Jia [1 ,2 ]
Gao, Min [1 ,2 ]
Wang, Zongwei [1 ,2 ]
Lin, Chenghua [3 ]
Zhou, Wei [1 ,2 ]
Wen, Junhao [1 ,2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 401331, Peoples R China
[3] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, S Yorkshire, England
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
Malicious users detection; Adversarial learning; Data augmentation; RECOMMENDER SYSTEMS;
D O I
10.1016/j.asoc.2022.108414
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious user detection in the recommender systems has attracted much attention in the last two decades because malicious users can seriously affect the recommendation results and user experience. The up-to-date detection models usually concentrate on distinguishing users according to their latent features represented in user embeddings. These models can improve detection performance; however, they are usually not fully up to expectations, especially in the scenarios with unbalanced use samples. From these models that concentrate on user embedding representations, we can summarize the following difficulties: (1) the cost of manual labeling malicious causes the lack of labeled malicious users in training data, which leads to imprecise representations of users; (2) current augmentation methods that aim at mitigating the lack of labeled malicious users are hard to simulate the distribution of malicious users. In this paper, we propose a detection model, using adversarial learning based data augmentation (a.k.a. Ada) to alleviate these problems. Concretely, to get precise representations of users, the model integrates potential user relations and structural similarities into user embeddings. After obtaining precise user representation, it presents a novel data augmentation based on the deep convolutional generative adversarial networks (DCGAN) to simulate the distribution of malicious user embeddings and generate additional fake user embeddings. Experiments on public datasets show our model outperforms state-of-the-art detection models with sparse labeled malicious users, and the ablation study confirms the importance and effectiveness of each component of the model.(C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] ADA: Adversarial Data Augmentation for Object Detection
    Behpour, Sima
    Kitani, Kris M.
    Ziebart, Brian D.
    [J]. 2019 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2019, : 1243 - 1252
  • [2] Deep learning hotspots detection with generative adversarial network-based data augmentation
    Cheng, Zeyuan
    Behdinan, Kamran
    [J]. JOURNAL OF MICRO-NANOPATTERNING MATERIALS AND METROLOGY-JM3, 2022, 21 (02):
  • [3] Data augmentation in hotspot detection based on generative adversarial network
    Wang, Shuhan
    Gai, Tianyang
    Qu, Tong
    Ma, Bojie
    Su, Xiaojing
    Dong, Lisong
    Zhang, Libin
    Xu, Peng
    Su, Yajuan
    Wei, Yayi
    [J]. JOURNAL OF MICRO-NANOPATTERNING MATERIALS AND METROLOGY-JM3, 2021, 20 (03):
  • [4] Adversarial Data Augmentation for HMM-Based Anomaly Detection
    Castellini, Alberto
    Masillo, Francesco
    Azzalini, Davide
    Amigoni, Francesco
    Farinelli, Alessandro
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (12) : 14131 - 14143
  • [5] Data Augmentation Based on Adversarial Autoencoder Handling Imbalance for Learning to Rank
    Yu, Qian
    Lam, Wai
    [J]. THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 411 - 418
  • [6] Implicit adversarial data augmentation and robustness with Noise-based Learning
    Panda, Priyadarshini
    Roy, Kaushik
    [J]. NEURAL NETWORKS, 2021, 141 : 120 - 132
  • [7] Adversarial Attacks on Featureless Deep Learning Malicious URLs Detection
    Rasheed, Bader
    Khan, Adil
    Kazmi, S. M. Ahsan
    Hussain, Rasheed
    Piran, Md Jalil
    Suh, Doug Young
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 921 - 939
  • [8] Malicious Repositories Detection with Adversarial Heterogeneous Graph Contrastive Learning
    Qian, Yiyue
    Zhang, Yiming
    Chawla, Nitesh
    Ye, Yanfang
    Zhang, Chuxu
    [J]. PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 1645 - 1654
  • [9] Adversarial Learning-Based Data Augmentation for Palm-Vein Identification
    Qin, Huafeng
    Xi, Haofei
    Li, Yantao
    El-Yacoubi, Mounim A.
    Wang, Jun
    Gao, Xinbo
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (06) : 4325 - 4341
  • [10] Towards a Robust WiFi-based Fall Detection with Adversarial Data Augmentation
    Nguyen, Tuan-Duy H.
    Nguyen, Huu-Nghia H.
    [J]. 2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 370 - 375