{"id":"https://openalex.org/W4413318930","doi":"https://doi.org/10.1109/tbdata.2025.3600034","title":"Sentences Based Adversarial Attack on AI-Generated Text Detectors","display_name":"Sentences Based Adversarial Attack on AI-Generated Text Detectors","publication_year":2025,"publication_date":"2025-08-19","ids":{"openalex":"https://openalex.org/W4413318930","doi":"https://doi.org/10.1109/tbdata.2025.3600034"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2025.3600034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2025.3600034","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035138193","display_name":"Rongxin Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rongxin Tu","raw_affiliation_strings":["Guangdong Key Lab of Information Security, School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key Lab of Information Security, School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079559561","display_name":"Chee Wei Tan","orcid":"https://orcid.org/0000-0002-6624-9752"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chee Wei Tan","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093293797","display_name":"Chi-Hung Chi","orcid":"https://orcid.org/0009-0004-4336-3407"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chi-Hung Chi","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101720092","display_name":"Kwok\u2010Yan Lam","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kwok-Yan Lam","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035138193"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10742944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"1","first_page":"80","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8298486471176147},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8207347393035889},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5474359393119812},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4955984354019165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8298486471176147},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8207347393035889},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5474359393119812},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4955984354019165},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tbdata.2025.3600034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2025.3600034","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6665157100","display_name":null,"funder_award_id":"2514050000889","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2799194071","https://openalex.org/W2891828758","https://openalex.org/W2949128310","https://openalex.org/W2952984539","https://openalex.org/W2962818281","https://openalex.org/W2963083752","https://openalex.org/W2963100531","https://openalex.org/W2963341956","https://openalex.org/W2963834268","https://openalex.org/W2964232431","https://openalex.org/W2996851481","https://openalex.org/W3016399951","https://openalex.org/W3017133364","https://openalex.org/W3034205626","https://openalex.org/W3084992427","https://openalex.org/W3104423855","https://openalex.org/W3174191188","https://openalex.org/W3205696278","https://openalex.org/W4253028564","https://openalex.org/W4285294723","https://openalex.org/W4286567539","https://openalex.org/W4313032622","https://openalex.org/W4321021417","https://openalex.org/W4384916898","https://openalex.org/W4385187297","https://openalex.org/W4386159914","https://openalex.org/W4386756958","https://openalex.org/W4386790871","https://openalex.org/W4392560653","https://openalex.org/W4394789421","https://openalex.org/W4400002903","https://openalex.org/W4403792158","https://openalex.org/W4405114800","https://openalex.org/W4406236959","https://openalex.org/W4406794278","https://openalex.org/W4406858731","https://openalex.org/W4409335156","https://openalex.org/W4410086438","https://openalex.org/W4411337828","https://openalex.org/W4412944756"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"The":[0],"widespread":[1],"use":[2],"of":[3,35,40,51,64,75,82],"AI-generated":[4,84,173],"text":[5,52,174],"has":[6],"introduced":[7],"significant":[8],"security":[9],"concerns,":[10],"driving":[11],"the":[12,33,49,62,71,76,80,128,141,148,155],"need":[13],"for":[14],"reliable":[15],"detection":[16],"systems.":[17],"However,":[18],"recent":[19],"studies":[20],"reveal":[21],"that":[22,93,162],"neural":[23],"network-based":[24],"detectors":[25,115],"are":[26],"vulnerable":[27],"to":[28],"adversarial":[29,41,57,91,121,163],"examples.":[30],"To":[31,131],"improve":[32],"robustness":[34],"such":[36],"classifiers,":[37],"a":[38,103],"number":[39],"attack":[42,58,111],"strategies":[43],"have":[44],"been":[45],"developed,":[46],"particularly":[47],"in":[48,79,90,147],"context":[50],"sentiment":[53],"classification.":[54],"Most":[55],"existing":[56],"methods":[59],"focus":[60],"on":[61,112,145],"semantics":[63,74],"individual":[65],"words":[66],"or":[67],"sentences,":[68],"often":[69],"neglecting":[70],"broader":[72],"contextual":[73,133],"entire":[77],"text-particularly":[78],"case":[81],"long":[83],"text.":[85,130],"This":[86],"limitation":[87],"frequently":[88],"results":[89,160],"examples":[92,122,164],"lack":[94],"fluency":[95],"and":[96],"coherence.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101,136],"propose":[102],"novel":[104],"method":[105],"called":[106],"<italic":[107,167],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[108,168],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Sentence-based":[109],"Adversarial":[110],"AI-Generated":[113],"Text":[114],"(SAGT)</i>,":[116],"which":[117],"generates":[118],"linguistically":[119],"fluent":[120],"by":[123,166],"inserting":[124],"model-generated":[125],"sentences":[126],"into":[127,154],"original":[129,142],"ensure":[132],"semantic":[134],"consistency,":[135],"extract":[137],"important":[138],"keywords":[139],"from":[140],"text-selected":[143],"based":[144],"changes":[146],"detector's":[149],"confidence":[150],"score-and":[151],"incorporate":[152],"them":[153],"generated":[156],"sentences.":[157],"Extensive":[158],"experimental":[159],"demonstrate":[161],"crafted":[165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SAGT</i>":[169],"can":[170],"effectively":[171],"evade":[172],"detectors.":[175]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
