Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
distributed_ml [2017/12/14 15:17]
damaskin
distributed_ml [2018/04/05 19:01]
damaskin
Line 46: Line 46:
 [3] __[[http://​pages.cs.wisc.edu/​~paris/​papers/​data_pricing.pdf|Query-Based Data Pricing]]__\\ [3] __[[http://​pages.cs.wisc.edu/​~paris/​papers/​data_pricing.pdf|Query-Based Data Pricing]]__\\
  
-**Contact:** __[[http://people.epfl.ch/rhicheek.patra|Rhicheek Patra]]__ + 
- or  ​__[[http://​people.epfl.ch/​georgios.damaskinos|Georgios Damaskinos]]__+===Black-Box Attacks against Recommender Systems=== 
 +A recommender system can be viewed as a black-box that users query with feedback (e.g., ratings, clicks) before getting the output list of recommendations. 
 +The goal is to infer properties of the recommendation algorithm by observing the output from different queries. 
 + 
 +Related papers:\\ 
 +[1] __[[https://www.usenix.org/system/​files/​conference/​usenixsecurity16/​sec16_paper_tramer.pdf|Stealing Machine Learning Models via Prediction APIs]]__\\ 
 +[2] __[[https://​arxiv.org/​pdf/​1602.02697v3.pdf|Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples]]__\\ 
 + 
 + 
 +**Contact:​** ​__[[http://​people.epfl.ch/​georgios.damaskinos|Georgios Damaskinos]]__