Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems
Abstract
Graph recommendation systems have been widely studied due to their ability to effectively capture the complex interactions between users and items. However, these systems also exhibit certain vulnerabilities when faced with attacks. The prevailing shilling attack methods typically manipulate recommendation results by injecting a large number of fake nodes and edges. However, such attack strategies face two primary challenges: low stealth and high destructiveness. To address these challenges, this paper proposes a novel graph backdoor attack method that aims to enhance the exposure of target items to the target user in a covert manner, without affecting other unrelated nodes. Specifically, we design a single-node trigger generator, which can effectively expose multiple target items to the target user by inserting only one fake user node. Additionally, we introduce constraint conditions between the target nodes and irrelevant nodes to mitigate the impact of fake nodes on the recommendation system's performance. Experimental results show that the exposure of the target items reaches no less than 50% in 99% of the target users, while the impact on the recommendation system's performance is controlled within approximately 5%.
Cite
Text
Li et al. "Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems." International Joint Conference on Artificial Intelligence, 2025. doi:10.24963/IJCAI.2025/342Markdown
[Li et al. "Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems." International Joint Conference on Artificial Intelligence, 2025.](https://mlanthology.org/ijcai/2025/li2025ijcai-single/) doi:10.24963/IJCAI.2025/342BibTeX
@inproceedings{li2025ijcai-single,
title = {{Single-Node Trigger Backdoor Attacks in Graph-Based Recommendation Systems}},
author = {Li, Runze and Jin, Di and Wang, Xiaobao and He, Dongxiao and Feng, Bingdao and Wang, Zhen},
booktitle = {International Joint Conference on Artificial Intelligence},
year = {2025},
pages = {3072-3080},
doi = {10.24963/IJCAI.2025/342},
url = {https://mlanthology.org/ijcai/2025/li2025ijcai-single/}
}