{"id":"https://openalex.org/W7105670777","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227196","title":"A Hidden Backdoor Attack via Formal Text Style Transfer in Language Models","display_name":"A Hidden Backdoor Attack via Formal Text Style Transfer in Language Models","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W7105670777","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227196"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227196","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zihan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zihan Wang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hongwei Li","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wenbo Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Jiang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiaming He","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaming He","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hanxiao Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanxiao Chen","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":null,"display_name":"Guowen Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guowen Xu","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76988069,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.3073999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.3073999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.16930000483989716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.12060000002384186,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9988999962806702},{"id":"https://openalex.org/keywords/perplexity","display_name":"Perplexity","score":0.7789000272750854},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4643999934196472},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.42170000076293945},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4171000123023987},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.35690000653266907}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9988999962806702},{"id":"https://openalex.org/C100279451","wikidata":"https://www.wikidata.org/wiki/Q372193","display_name":"Perplexity","level":3,"score":0.7789000272750854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7389000058174133},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5561000108718872},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.550599992275238},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4643999934196472},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.42170000076293945},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35690000653266907},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30869999527931213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26980000734329224},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C2776608160","wikidata":"https://www.wikidata.org/wiki/Q4785462","display_name":"Natural (archaeology)","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C2983448237","wikidata":"https://www.wikidata.org/wiki/Q1078276","display_name":"Language understanding","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227196","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5571321249008179}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2251939518","https://openalex.org/W2963416784","https://openalex.org/W2973217491","https://openalex.org/W3034999214","https://openalex.org/W3035367371","https://openalex.org/W3109409894","https://openalex.org/W3176270593","https://openalex.org/W3204619801","https://openalex.org/W3205696278","https://openalex.org/W3212213895","https://openalex.org/W3215670835","https://openalex.org/W4328028903","https://openalex.org/W4386083011","https://openalex.org/W4401043416","https://openalex.org/W4405741930"],"related_works":[],"abstract_inverted_index":{"Natural":[0],"language":[1,135],"processing":[2],"(NLP)":[3],"systems":[4],"have":[5],"been":[6,170],"demonstrated":[7,171],"to":[8,11,82,100,160,172],"be":[9,173],"vulnerable":[10],"backdoor":[12,18,38,64,97,184],"attacks.":[13],"Specifically,":[14,73],"attackers":[15],"embed":[16],"the":[17,20,27,31,86,96,147,153,156],"into":[19,90],"model":[21,81],"by":[22,52],"poisoning":[23],"training":[24,88],"data,":[25],"producing":[26],"desired":[28,148],"results":[29,141],"when":[30],"input":[32],"contains":[33],"pre-defined":[34],"triggers.":[35],"Typical":[36],"textual":[37,102],"attacks":[39],"adopt":[40,75],"static":[41,101],"triggers":[42,105,163],"such":[43],"as":[44,95],"words":[45],"or":[46],"phrases,":[47],"which":[48,93],"make":[49],"them":[50],"detectable":[51],"existing":[53],"defense":[54,185],"methods.":[55,186],"To":[56],"enhance":[57],"stealthiness,":[58],"this":[59],"paper":[60],"introduces":[61],"a":[62,76],"hidden":[63],"attack":[65,149],"method":[66],"utilizing":[67,131],"formal":[68,77,91],"text":[69,78],"style":[70,79],"transfer":[71,80],"(FTST).":[72],"we":[74],"convert":[83],"part":[84],"of":[85,155],"benign":[87],"samples":[89],"samples,":[92],"serve":[94],"samples.":[98],"Compared":[99],"triggers,":[103,166],"FTST-based":[104],"can":[106],"maintain":[107],"original":[108],"semantics":[109],"while":[110,151],"evading":[111],"common":[112,161],"defenses":[113],"and":[114,127,137,164,180],"human":[115],"detections.":[116],"We":[117],"conduct":[118],"extensive":[119],"experiments":[120],"on":[121],"typical":[122],"NLP":[123],"tasks,":[124],"including":[125],"topic":[126],"sentiment":[128],"classification":[129],"tasks":[130],"three":[132],"prominent":[133],"pre-trained":[134],"models":[136],"four":[138],"datasets.":[139],"The":[140],"show":[142],"that":[143],"our":[144,167],"approach":[145,168],"achieves":[146],"performance":[150],"preserving":[152],"normal-functionality":[154],"model.":[157],"Furthermore,":[158],"compared":[159],"word-level":[162],"sentence-level":[165],"has":[169],"more":[174,181],"stealthy":[175],"under":[176,183],"GPT-2-based":[177],"perplexity":[178],"detection":[179],"robust":[182]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
