{"id":"https://openalex.org/W4404788131","doi":"https://doi.org/10.1109/jiot.2024.3506994","title":"A Novel Text Adversarial Sample Generation and Defense Method for SIoT Systems","display_name":"A Novel Text Adversarial Sample Generation and Defense Method for SIoT Systems","publication_year":2024,"publication_date":"2024-11-27","ids":{"openalex":"https://openalex.org/W4404788131","doi":"https://doi.org/10.1109/jiot.2024.3506994"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3506994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3506994","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021547618","display_name":"Hangxu Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hangxu Ji","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104092071","display_name":"Jiale Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiale Guo","raw_affiliation_strings":["Foshan Graduate School of Innovation, Northeastern University, Foshan, China","School of Computer Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Foshan Graduate School of Innovation, Northeastern University, Foshan, China","institution_ids":["https://openalex.org/I14894300","https://openalex.org/I9224756"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102801647","display_name":"Yongjiao Sun","orcid":"https://orcid.org/0000-0003-3373-0723"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjiao Sun","raw_affiliation_strings":["School of Computer Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014346487","display_name":"Ye Yuan","orcid":"https://orcid.org/0000-0002-0247-9866"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Yuan","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054991337","display_name":"Guoren Wang","orcid":"https://orcid.org/0000-0002-0181-8379"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoren Wang","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341261","display_name":"Qi Wang","orcid":"https://orcid.org/0000-0002-1328-8571"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Wang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021547618"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":0.3647,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62737381,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"17","first_page":"34931","last_page":"34943"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.8683000206947327,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.8683000206947327,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.8203999996185303,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8166999816894531,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7245909571647644},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7114757299423218},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.5709423422813416},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34059378504753113},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.32307660579681396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27795010805130005},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21140649914741516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7245909571647644},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7114757299423218},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.5709423422813416},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34059378504753113},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.32307660579681396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27795010805130005},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21140649914741516},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3506994","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3506994","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1274309526","display_name":null,"funder_award_id":"62072087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1417609030","display_name":null,"funder_award_id":"2023A1515110268","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G2663118808","display_name":null,"funder_award_id":"62302084","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4398457224","display_name":null,"funder_award_id":"62402096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8752854061","display_name":null,"funder_award_id":"2022YFB3304300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G98771200","display_name":null,"funder_award_id":"U23A20297","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2799194071","https://openalex.org/W2896457183","https://openalex.org/W2949128310","https://openalex.org/W2962818281","https://openalex.org/W2965373594","https://openalex.org/W2982054702","https://openalex.org/W2996851481","https://openalex.org/W3035441470","https://openalex.org/W3087885863","https://openalex.org/W3101449015","https://openalex.org/W3104423855","https://openalex.org/W3117925982","https://openalex.org/W3133451866","https://openalex.org/W3169948074","https://openalex.org/W3173261519","https://openalex.org/W3173646094","https://openalex.org/W4205758343","https://openalex.org/W4379382610","https://openalex.org/W4386576644","https://openalex.org/W4389319287","https://openalex.org/W4391827182"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"The":[0,141],"generation":[1,56],"and":[2,14,71,90,96,115,136,149,169,196],"defense":[3,82,219],"of":[4,16,19,26,41,48,67,99,131,157,194,199],"text":[5,42,60,112,124],"adversarial":[6,54,85,100,113,125,158,181,217,232],"samples":[7,70,114],"are":[8,87],"crucial":[9],"for":[10,110,121],"improving":[11],"the":[12,24,38,68,78,94,129,137,155,172,185,187,192,197,203,209,215,221],"robustness":[13],"security":[15],"social":[17],"Internet":[18],"Things":[20],"(SIoT)":[21],"systems,":[22],"as":[23],"exchange":[25],"information":[27,118,164],"between":[28],"devices":[29,132],"in":[30,51,64,133],"SIoT":[31,134],"relies":[32],"heavily":[33],"on":[34,59],"NLP":[35],"technology.":[36],"However,":[37],"discrete":[39],"nature":[40],"data":[43],"leads":[44],"to":[45,74,77,92,128,153,184,202,231],"a":[46,106,116,225],"lack":[47],"contextual":[49],"integration":[50],"current":[52],"mainstream":[53],"sample":[55,218],"methods":[57,83],"based":[58],"replacement.":[61],"This":[62,103],"results":[63],"poor":[65],"stealth":[66],"generated":[69],"inefficiencies":[72],"due":[73],"excessive":[75],"queries":[76],"target":[79],"model.":[80],"Meanwhile,":[81],"like":[84],"training":[86],"insufficiently":[88],"universal":[89],"generalizable":[91],"handle":[93],"diverse":[95],"complex":[97],"range":[98],"attack":[101,210],"strategies.":[102],"article":[104],"proposes":[105],"contrastive":[107],"learning-based":[108],"method":[109,120,143,189],"generating":[111],"mutual":[117,163],"regularization-based":[119],"defending":[122],"against":[123,180],"samples,":[126,205],"tailored":[127],"characteristics":[130],"systems":[135],"challenges":[138],"mentioned":[139],"above.":[140],"proposed":[142,188,216],"leverage":[144],"keyword":[145],"localization,":[146],"optimal":[147],"perturbation,":[148],"candidate":[150],"set":[151],"evaluation":[152],"enhance":[154],"effectiveness":[156],"samples.":[159,182],"Additionally,":[160],"by":[161],"combining":[162],"measures,":[165],"statistical":[166],"estimation":[167],"functions,":[168],"idempotent":[170],"constraints,":[171],"model":[173],"itself":[174],"is":[175],"equipped":[176],"with":[177],"effective":[178],"defenses":[179],"Compared":[183],"baseline,":[186],"significantly":[190],"reduce":[191],"magnitude":[193],"perturbations":[195],"number":[198],"access":[200],"attempts":[201],"original":[204],"while":[206],"greatly":[207],"increasing":[208],"success":[211],"rate.":[212],"When":[213],"applying":[214],"method,":[220],"model\u2019s":[222],"accuracy":[223],"showed":[224],"significant":[226],"improvement":[227],"after":[228],"being":[229],"subjected":[230],"attacks.":[233]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
