SC-DAG: Semantic-Constrained Diffusion Attacks for Stealthy Exposure Manipulation in Visually-Aware Recommender Systems

  • Ze Lin
  • , Yuqiu Qian
  • , Xiaodong Li
  • , Ziyu Lyu
  • , Hui Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Visually-aware recommender system (VARS) has become increasingly prevalent in various online services by integrating visual features of items to enhance recommendation quality. However, VARS introduces new security vulnerabilities and malicious attackers can perform visual shilling attacks to manipulate recommendation lists via uploading generated images with visually imperceptible perturbations. While prior research has explored such threats to help service providers enhance their systems, existing visual shilling attack methods still suffer from uncontrolled pixel-space perturbation, energy dispersion dilemma and semantic misalignment in reference selection. In this work, we present Semantic-Constrained Diffusion Adversarial Generation (SC-DAG) for visual shilling attacks. SC-DAG overcomes key limitations of previous methods by focusing perturbations on semantically meaningful image regions through contour-aware segmentation, guiding adversarial generation in latent space using a conditional diffusion process, and performing a hybrid reference image selection strategy that balances popularity and semantic similarity. Extensive experiments on performing visual shilling attacks against multiple VARS models show that SC-DAG achieves state-of-the-art attack performance in elevating target items' ranking, while maintaining strong perceptual indistinguishability and minimal impact on overall recommendation performance of the system. Our work offers insights into leveraging structured semantic priors for more sophisticated adversarial manipulations against VARS and also highlights the necessity for developing more robust VARS models resilient to visual shilling attacks. We provide our implementation at https://github.com/KDEGroup/SC-DAG.

Original languageEnglish
Title of host publicationCIKM 2025 - Proceedings of the 34th ACM International Conference on Information and Knowledge Management
PublisherAssociation for Computing Machinery, Inc
Pages1829-1838
Number of pages10
ISBN (Electronic)9798400720406
DOIs
Publication statusPublished - 10 Nov 2025
Event34th ACM International Conference on Information and Knowledge Management, CIKM 2025 - Seoul, Korea, Republic of
Duration: 10 Nov 202514 Nov 2025

Publication series

NameCIKM 2025 - Proceedings of the 34th ACM International Conference on Information and Knowledge Management

Conference

Conference34th ACM International Conference on Information and Knowledge Management, CIKM 2025
Country/TerritoryKorea, Republic of
CitySeoul
Period10/11/2514/11/25

Keywords

  • adversarial attacks
  • visually-aware recommender system

Fingerprint

Dive into the research topics of 'SC-DAG: Semantic-Constrained Diffusion Attacks for Stealthy Exposure Manipulation in Visually-Aware Recommender Systems'. Together they form a unique fingerprint.

Cite this