{"id":"https://openalex.org/W3008121295","doi":"https://doi.org/10.1109/imcom48794.2020.9001767","title":"No \"Love\" Lost: Defending Hate Speech Detection Models Against Adversaries","display_name":"No \"Love\" Lost: Defending Hate Speech Detection Models Against Adversaries","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3008121295","doi":"https://doi.org/10.1109/imcom48794.2020.9001767","mag":"3008121295"},"language":"en","primary_location":{"id":"doi:10.1109/imcom48794.2020.9001767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom48794.2020.9001767","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021884742","display_name":"Melody Moh","orcid":"https://orcid.org/0000-0002-8313-6645"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Melody Moh","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019298277","display_name":"Teng-Sheng Moh","orcid":"https://orcid.org/0000-0002-2726-102X"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Teng-Sheng Moh","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019516277","display_name":"Brian Tuan Khieu","orcid":null},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Khieu","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021884742"],"corresponding_institution_ids":["https://openalex.org/I51504820"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77523863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.953499972820282,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7454952001571655},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7387629151344299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7329944372177124},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7004045248031616},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5913640260696411},{"id":"https://openalex.org/keywords/readability","display_name":"Readability","score":0.5126916170120239},{"id":"https://openalex.org/keywords/voice-activity-detection","display_name":"Voice activity detection","score":0.44960737228393555},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.44214388728141785},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.371359258890152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35134953260421753},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3322173058986664},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.32680433988571167},{"id":"https://openalex.org/keywords/speech-processing","display_name":"Speech processing","score":0.1863180696964264}],"concepts":[{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7454952001571655},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7387629151344299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7329944372177124},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7004045248031616},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5913640260696411},{"id":"https://openalex.org/C2778143727","wikidata":"https://www.wikidata.org/wiki/Q1820650","display_name":"Readability","level":2,"score":0.5126916170120239},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.44960737228393555},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.44214388728141785},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.371359258890152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35134953260421753},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3322173058986664},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.32680433988571167},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.1863180696964264},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom48794.2020.9001767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom48794.2020.9001767","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W78136081","https://openalex.org/W1527758775","https://openalex.org/W2540646130","https://openalex.org/W2595653137","https://openalex.org/W2613977835","https://openalex.org/W2792441346","https://openalex.org/W2799165947","https://openalex.org/W2806872289","https://openalex.org/W2910392363","https://openalex.org/W3103061166","https://openalex.org/W4301166652","https://openalex.org/W6603174692","https://openalex.org/W6631705537","https://openalex.org/W6750787382"],"related_works":["https://openalex.org/W1964661231","https://openalex.org/W4254960163","https://openalex.org/W3110264473","https://openalex.org/W2370831213","https://openalex.org/W2972807713","https://openalex.org/W4285478380","https://openalex.org/W4315704968","https://openalex.org/W2100255360","https://openalex.org/W2140061545","https://openalex.org/W2032810564"],"abstract_inverted_index":{"Although":[0],"current":[1],"state-of-the-art":[2],"hate":[3,38,169],"speech":[4,39,170],"detection":[5,40,171],"models":[6,11,52,172],"achieve":[7],"praiseworthy":[8],"results,":[9],"these":[10,93],"have":[12],"shown":[13],"themselves":[14],"to":[15,18,67,73,132,136],"be":[16,117,174],"vulnerable":[17],"attacks.":[19],"Easy-to-execute":[20],"lexical":[21,111],"evasion":[22,58,114,147,204],"schemes":[23,59,64,94,205],"such":[24],"as":[25,53,55,163],"removal":[26],"of":[27,49,103,129],"whitespace":[28],"from":[29,60],"a":[30,133,145,157,164,200,207],"given":[31],"text":[32],"creates":[33],"significant":[34,57,184],"issues":[35],"for":[36,87,183,194],"word-based":[37],"models.":[41],"In":[42],"this":[43,85],"paper,":[44],"we":[45,107,166],"reproduce":[46],"the":[47,75,101,127,130,181,192],"results":[48,102,162],"five":[50],"cutting-edge":[51],"well":[54],"four":[56],"prior":[61],"work.":[62],"These":[63],"are":[65],"required":[66],"maintain":[68],"readability":[69],"which":[70],"enables":[71],"us":[72],"recreate":[74],"original":[76],"data.":[77],"We":[78,142],"present":[79],"several":[80],"new":[81,121,146],"defenses":[82],"that":[83,109,149,168,189],"leverage":[84],"need":[86,182],"maintained":[88],"meaning":[89],"and":[90,92],"readability,":[91],"perform":[95],"on":[96],"par":[97],"with":[98,119,124,156,206],"or":[99,113],"exceed":[100],"adversarial":[104],"retraining.":[105,185],"Furthermore,":[106],"demonstrate":[108],"each":[110],"attack":[112],"scheme":[115,131,148],"can":[116,173,198],"overcome":[118],"our":[120,161],"defense":[122,202],"mechanisms":[123],"some":[125],"reducing":[126],"effectiveness":[128],"mere":[134],".1":[135],".01":[137],"drop":[138],"in":[139,152],"F-1":[140],"score.":[141],"also":[143],"propose":[144],"outperforms":[150],"those":[151],"previous":[153],"work":[154,187],"along":[155],"corresponding":[158],"defense.":[159],"Using":[160],"foundation,":[165],"contend":[167],"defended":[175],"against":[176,203],"lexically":[177],"morphed":[178],"data":[179],"without":[180],"Our":[186],"suggests":[188],"by":[190],"utilizing":[191],"requirement":[193],"preserved":[195],"meaning,":[196],"one":[197],"create":[199],"suitable":[201],"high":[208],"reversal":[209],"rate.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
