Score: 0

Stealthy LLM-Driven Data Poisoning Attacks Against Embedding-Based Retrieval-Augmented Recommender Systems

Published: May 8, 2025 | arXiv ID: 2505.05196v1

By: Fatemeh Nazary , Yashar Deldjoo , Tommaso Di Noia and more

Potential Business Impact:

Makes fake reviews trick recommendation systems.

Business Areas:
Semantic Search Internet Services

We present a systematic study of provider-side data poisoning in retrieval-augmented recommender systems (RAG-based). By modifying only a small fraction of tokens within item descriptions -- for instance, adding emotional keywords or borrowing phrases from semantically related items -- an attacker can significantly promote or demote targeted items. We formalize these attacks under token-edit and semantic-similarity constraints, and we examine their effectiveness in both promotion (long-tail items) and demotion (short-head items) scenarios. Our experiments on MovieLens, using two large language model (LLM) retrieval modules, show that even subtle attacks shift final rankings and item exposures while eluding naive detection. The results underscore the vulnerability of RAG-based pipelines to small-scale metadata rewrites and emphasize the need for robust textual consistency checks and provenance tracking to thwart stealthy provider-side poisoning.

Country of Origin
🇮🇹 Italy

Page Count
5 pages

Category
Computer Science:
Information Retrieval