Adversarial information retrieval (adversarial IR) is a topic in information retrieval related to strategies for working with a data source where some portion of it has been manipulated maliciously. Tasks can include gathering, indexing, filtering, retrieving and ranking information from such a data source. Adversarial IR includes the study of methods to detect, isolate, and defeat such manipulation.
On the Web, the predominant form of such manipulation is search engine spamming (also known as spamdexing), which involves employing various techniques to disrupt the activity of web search engines, usually for financial gain. Examples of spamdexing are link-bombing, comment or referrer spam, spam blogs (splogs), malicious tagging. Reverse engineering of ranking algorithms, click fraud,[1] and web content filtering may also be considered forms of adversarial data manipulation.[2]
^Jansen, B. J. (2007) Click fraud. IEEE Computer. 40(7), 85-86.
^B. Davison, M. Najork, and T. Converse (2006), SIGIR Worksheet Report: Adversarial Information Retrieval on the Web (AIRWeb 2006)
and 27 Related for: Adversarial information retrieval information
Legal informationretrieval Vertical search Methods/Techniques in which informationretrieval techniques are employed include: Adversarialinformation retrieval...
A generative adversarial network (GAN) is a class of machine learning frameworks and a prominent framework for approaching generative AI. The concept...
in the effective identification of pharma scam campaigns. Adversarialinformationretrieval Index (search engine) – overview of search engine indexing...
Bookmarking Systems (PDF). Fourth International Workshop on AdversarialInformationRetrieval on the Web. Archived from the original (PDF) on 2008-06-05...
Detection" (PDF), Proceedings of the 5th International Workshop on AdversarialInformationRetrieval on the Web (AIRWeb '09), ACM, pp. 41–48, doi:10.1145/1531914...
others trying to Google bomb every word in the dictionary. Adversarialinformationretrieval CAPTCHA Blog scraping Link farm Spam in blogs Spamdexing "Wired...
spam-associated domains which it uses in automatic filters. Adversarialinformationretrieval – Informationretrieval strategies in datasets Spam in blogs – Form of...
International Workshop on AdversarialInformationRetrieval on the Web - AIRWeb '09. 5th International Workshop on AdversarialInformationRetrieval on the Web (AIRWeb...
bomb in Wiktionary, the free dictionary. Internet portal Adversarialinformationretrieval Googlewhack Link building Political Google bombs in the 2004...
Spam with Language Model Disagreement, PDF. From the First International Workshop on AdversarialInformationRetrieval (AIRWeb'05) Chiba, Japan, 2005....
based on proportional view count. Internet portal Adware Adversarialinformationretrieval Criticism of advertising Content filter Commercial skipping...
improved via adversarial defenses such as the Madry defense. Content-based image retrieval Multimedia informationretrieval Image retrieval Triplet loss...
to the query vector. Following document retrieval, the LLM generates an output that incorporates information from both the query and the retrieved documents...
Google has reportedly resisted removing fraudulent listings. Adversarialinformationretrieval Criticism of Google Deregulation Hijacked journal Misinformation...
anonymous authors, or to reveal some information about the author short of a full identification. Authors may use adversarial stylometry to resist this identification...
search engines use search algorithms, they belong to the study of informationretrieval, not algorithmics. The appropriate search algorithm to use often...
to deep reinforcement learning or end-to-end reinforcement learning. Adversarial deep reinforcement learning is an active area of research in reinforcement...
Yoshua (2014). Generative Adversarial Networks (PDF). Proceedings of the International Conference on Neural Information Processing Systems (NIPS 2014)...
tries to battle jailbreaks: The researchers are using a technique called adversarial training to stop ChatGPT from letting users trick it into behaving badly...
logic in novel ways. Absurdle, created by British programmer qntm, is an adversarial version in which the target word changes after each guess, while remaining...
recognition, speech synthesis, machine translation, information extraction, informationretrieval and question answering. Early work, based on Noam Chomsky's...
detection has applications in many areas of computer vision, including image retrieval and video surveillance. It is widely used in computer vision tasks such...