no code implementations • 1 Dec 2019 • Liang Chen, Yangjun Xu, Fenfang Xie, Min Huang, Zibin Zheng
2) the fake users can be transferred to attack the state-of-the-art collaborative filtering recommender systems such as Neural Collaborative Filtering and Bayesian Personalized Ranking Matrix Factorization.