Recommender System Attacks
Quiz by anees
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is a common attack method on recommender systems where an attacker manipulates users' ratings or profile information to influence recommendations?Cold-start attackSybil attackPopularity bias attackData poisoning attack30s
- Q2Which type of attack involves introducing a large number of new or unpopular items into a system to create biases in the recommendations?Shilling attackAdversarial attackFilter bubble attackBotnet attack30s
- Q3What type of attack on recommender systems involves manipulating the user's input data to create a biased or inaccurate representation of their preferences?Data spoofing attackProfile injection attackCollaborative filtering attackRank manipulation attack30s
- Q4What kind of attack on recommender systems involves exploiting vulnerabilities in the recommendation algorithm itself to manipulate the output recommendations?Ranking fraud attackInjection attackReputation attackModel inversion attack30s
- Q5What is a technique used in recommender systems to present users with a set of diverse recommendations, rather than focusing on popular or similar items?Content-based filteringPersonalizationPopularity biasSerendipity30s
- Q6What type of attack on recommender systems involves creating fake positive feedback to boost the ratings of certain items and influence recommendations?Shilling attackFilter bubble attackSybil attackRank manipulation attack30s
- Q7What is a common method used in recommender system attacks to evade detection by providing subtle and gradual changes in manipulation?Buffer overflow attackDDoS attackSlow drip attackPharming attack30s
- Q8What type of attack on recommender systems involves providing misleading information or omitting key details to influence recommendations?Deception attackDistributed denial-of-service attackSQL injection attackZero-day attack30s
- Q9What type of attack on recommender systems involves exploiting the user's behavior, preferences, or historical data to manipulate recommendations?Man-in-the-middle attackPhishing attackBuffer overflow attackUser profiling attack30s
- Q10What is a form of attack on recommender systems that involves an attacker intercepting and modifying communication between users and the system?Distributed denial-of-service attacksSQL injection attacksMan-in-the-middle attacksPhishing attacks30s