1 code implementation • 8 Sep 2020 • Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng
Currently, most works on attacking GNNs are mainly using gradient information to guide the attack and achieve outstanding performance.
no code implementations • 1 Dec 2019 • Liang Chen, Yangjun Xu, Fenfang Xie, Min Huang, Zibin Zheng
2) the fake users can be transferred to attack the state-of-the-art collaborative filtering recommender systems such as Neural Collaborative Filtering and Bayesian Personalized Ranking Matrix Factorization.