Crafting Imperceptible User Profiles to Manipulate Recommendation Systems: A Target-oriented Diffusion Attacker Approach
Diffusion models can be effectively harnessed to generate imperceptible user profiles that manipulate recommendation systems towards targeted items.