Data Skeptic

Shilling Attacks on Recommender Systems

30 snips
Nov 5, 2025
In this discussion, Aditya Chichani, a senior machine learning engineer at Walmart with a master's in data science from UC Berkeley, dives into the intriguing world of shilling attacks on recommender systems. He explains how malicious actors manipulate these systems using fake profiles to either promote items or sabotage competitors. Aditya details various attack strategies, like segmented and bandwagon attacks, revealing the alarming prevalence of fake reviews and the vulnerabilities in collaborative filtering. The conversation also highlights detection methods and the ongoing cat-and-mouse dynamics between attackers and system defenders.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Shilling Attacks Manipulate Recommendations

  • A shilling attack uses many fake profiles to manipulate recommender outputs by promoting or downvoting items.
  • Attackers scale influence by puppeteering accounts to amplify signals across the system.
INSIGHT

Collaborative Filtering Basics

  • Collaborative filtering predicts preferences from a user-item ratings matrix using user-user or item-item similarity.
  • Item-item focuses on item co-occurrence while user-user finds similar users to recommend unseen items.
INSIGHT

User-User Filtering Is Fragile

  • User-user collaborative filtering is vulnerable because user signals are sparse relative to catalog size.
  • Fake profiles can cheaply join small user neighborhoods and distort recommendations.
Get the Snipd Podcast app to discover more snips from this episode
Get the app