A Cognitive Distribution and Behavior-Consistent Framework for Black-Box Attacks on Recommender Systems

πŸ“… 2026-02-11
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Black-box recommender systems are vulnerable to model extraction and adversarial attacks; however, existing approaches often overlook the importance of ranking positions and generate adversarial sequences that lack semantic consistency with user behavior, making them easily detectable. To address these limitations, this work proposes a dual-enhancement attack framework. First, a cognitive distribution alignment mechanism is introduced to map discrete rankings into continuous distributions with position-based decay, thereby improving model extraction fidelity. Second, collaborative filtering signals are integrated with gradient information to craft noise perturbations that are both behaviorally coherent and statistically stealthy, effectively boosting the target item’s rank while preserving semantic plausibility. Extensive experiments across multiple datasets demonstrate that the proposed method significantly outperforms state-of-the-art techniques, achieving markedly higher attack success rates and evasion capabilities.

Technology Category

Application Category

πŸ“ Abstract
With the growing deployment of sequential recommender systems in e-commerce and other fields, their black-box interfaces raise security concerns: models are vulnerable to extraction and subsequent adversarial manipulation. Existing black-box extraction attacks primarily rely on hard labels or pairwise learning, often ignoring the importance of ranking positions, which results in incomplete knowledge transfer. Moreover, adversarial sequences generated via pure gradient methods lack semantic consistency with real user behavior, making them easily detectable. To overcome these limitations, this paper proposes a dual-enhanced attack framework. First, drawing on primacy effects and position bias, we introduce a cognitive distribution-driven extraction mechanism that maps discrete rankings into continuous value distributions with position-aware decay, thereby advancing from order alignment to cognitive distribution alignment. Second, we design a behavior-aware noisy item generation strategy that jointly optimizes collaborative signals and gradient signals. This ensures both semantic coherence and statistical stealth while effectively promoting target item rankings. Extensive experiments on multiple datasets demonstrate that our approach significantly outperforms existing methods in both attack success rate and evasion rate, validating the value of integrating cognitive modeling and behavioral consistency for secure recommender systems.
Problem

Research questions and friction points this paper is trying to address.

black-box attacks
recommender systems
adversarial manipulation
behavior consistency
cognitive distribution
Innovation

Methods, ideas, or system contributions that make the work stand out.

cognitive distribution
behavior-consistent attack
black-box extraction
position-aware decay
adversarial recommender systems
πŸ”Ž Similar Papers
No similar papers found.
H
Hongyue Zhang
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
Mingming Li
Mingming Li
Zhejiang University
FabricationHuman-Computer Interaction
D
Dongqin Liu
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
H
Hui Wang
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
Yaning Zhang
Yaning Zhang
Qilu University of Technology (Shandong Academy of Sciences)
X
Xi Zhou
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
H
Honglei Lv
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
J
Jiao Dai
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China
J
Jizhong Han
Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China