{"id":"https://openalex.org/W4401508153","doi":"https://doi.org/10.1109/tifs.2024.3442617","title":"PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models","display_name":"PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4401508153","doi":"https://doi.org/10.1109/tifs.2024.3442617"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3442617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3442617","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101398203","display_name":"Shiqi Gao","orcid":"https://orcid.org/0000-0002-8464-1627"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shiqi Gao","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086419494","display_name":"Haoyi Zhou","orcid":"https://orcid.org/0000-0002-2393-3634"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyi Zhou","raw_affiliation_strings":["Zhongguancun Laboratory, School of Software, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, School of Software, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103039761","display_name":"Tianyu Chen","orcid":"https://orcid.org/0009-0002-0649-5799"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyu Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101357259","display_name":"Mingrui He","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingrui He","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101785871","display_name":"Runhua Xu","orcid":"https://orcid.org/0000-0003-4541-9764"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Runhua Xu","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100380463","display_name":"Jianxin Li","orcid":"https://orcid.org/0000-0001-5152-0055"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxin Li","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101398203"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.5198,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61713264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"19","issue":null,"first_page":"9359","last_page":"9373"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9397000074386597,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9397000074386597,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9205999970436096,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9203000068664551,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7790688276290894},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5562041997909546},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5424273014068604},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.47387099266052246},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4025951027870178},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1991404891014099},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.14741763472557068},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09014067053794861},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.08979746699333191}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7790688276290894},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5562041997909546},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5424273014068604},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47387099266052246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4025951027870178},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1991404891014099},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.14741763472557068},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09014067053794861},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.08979746699333191}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3442617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3442617","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.4399999976158142,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1870188661","display_name":null,"funder_award_id":"2022ZD0117800","funder_id":"https://openalex.org/F4320329860","funder_display_name":"National Science and Technology Major Project"},{"id":"https://openalex.org/G4557900513","display_name":null,"funder_award_id":"62302022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4966747191","display_name":null,"funder_award_id":"62202029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8128231151","display_name":null,"funder_award_id":"62225202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329860","display_name":"National Science and Technology Major Project","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W12634471","https://openalex.org/W1924770834","https://openalex.org/W2064675550","https://openalex.org/W2089468765","https://openalex.org/W2101105183","https://openalex.org/W2117539524","https://openalex.org/W2150355110","https://openalex.org/W2282821441","https://openalex.org/W2408141691","https://openalex.org/W2498094064","https://openalex.org/W2896457183","https://openalex.org/W2898435086","https://openalex.org/W2923014074","https://openalex.org/W2947469743","https://openalex.org/W2963178695","https://openalex.org/W2963744840","https://openalex.org/W2963857521","https://openalex.org/W2963925437","https://openalex.org/W2968867107","https://openalex.org/W2985884876","https://openalex.org/W3013520104","https://openalex.org/W3017123256","https://openalex.org/W3035204084","https://openalex.org/W3102094970","https://openalex.org/W3103836116","https://openalex.org/W3118608800","https://openalex.org/W3143373604","https://openalex.org/W3158360872","https://openalex.org/W3170863103","https://openalex.org/W3177318507","https://openalex.org/W3191453585","https://openalex.org/W3196621661","https://openalex.org/W3215147048","https://openalex.org/W4220653872","https://openalex.org/W4250640407","https://openalex.org/W4287094549","https://openalex.org/W4292779060","https://openalex.org/W4293846201","https://openalex.org/W4300672471","https://openalex.org/W4311165836","https://openalex.org/W4312957757","https://openalex.org/W4313398126","https://openalex.org/W4321790328","https://openalex.org/W4378195097","https://openalex.org/W4381734648","https://openalex.org/W4382119126","https://openalex.org/W4383989006","https://openalex.org/W4384027078","https://openalex.org/W4385245566","https://openalex.org/W4385573607","https://openalex.org/W4388979610"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2081900870","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0],"Transformer":[1,29,88,155],"model":[2,89,93,171,229],"has":[3,99],"gained":[4],"significant":[5,224],"recognition":[6],"for":[7,46,55,226],"its":[8,32,47,158],"remarkable":[9],"computational":[10],"capabilities":[11],"and":[12,34,61,121,157,205,217],"versatility,":[13],"positioning":[14],"itself":[15],"as":[16,112,222],"a":[17,82,138,164,193,223],"fundamental":[18],"component":[19,84],"in":[20,153,184,239],"numerous":[21],"practical":[22,48],"applications.":[23],"However,":[24],"the":[25,28,56,76,87,154,170,210,240],"robustness":[26],"of":[27,39,43,58,78,97,140,212],"model,":[30],"specifically":[31],"stability":[33],"reliability":[35],"under":[36],"various":[37],"types":[38],"adversarial":[40,70,166],"attacks,":[41],"is":[42],"utmost":[44],"importance":[45],"applicability.":[49],"Furthermore,":[50],"it":[51,174],"offers":[52],"valuable":[53],"insights":[54],"design":[57],"more":[59],"efficient":[60],"secure":[62],"models.":[63],"In":[64,160],"contrast":[65,185],"with":[66,175],"conventional":[67],"investigations":[68],"into":[69,130],"robustness,":[71],"our":[72,196],"study":[73],"focuses":[74],"on":[75],"analysis":[77,96],"Positional":[79],"Embeddings":[80],"(PEs),":[81],"crucial":[83],"that":[85,144,168,189,209],"sets":[86],"apart":[90],"from":[91],"previous":[92,104,187],"architectures.":[94],"Theoretical":[95],"PEs":[98,213],"been":[100],"limited":[101,191],"due":[102],"to":[103,149,186,192,233],"predominantly":[105],"empirical":[106],"design,":[107,230],"which":[108],"includes":[109],"features":[110],"such":[111],"sinusoidal":[113],"or":[114,118,123],"linear":[115],"patterns,":[116],"learned":[117],"fixed":[119],"characteristics,":[120],"absolute":[122],"relative":[124],"measurements.":[125],"Our":[126],"investigation":[127],"delves":[128],"deep":[129],"potential":[131,235],"vulnerabilities":[132,151],"within":[133],"PEs.":[134],"Initially,":[135],"we":[136,162],"develop":[137],"set":[139],"input":[141],"infection":[142],"techniques":[143],"can":[145],"be":[146,215],"universally":[147],"applied":[148],"exploit":[150],"present":[152],"architecture":[156],"variants.":[159],"addition,":[161],"propose":[163],"novel":[165],"attack":[167],"manipulates":[169],"by":[172],"providing":[173],"incorrect":[176],"positional":[177],"information,":[178],"enabling":[179],"an":[180],"evasion":[181],"attack.":[182],"Significantly,":[183],"attacks":[188],"were":[190],"single":[194],"task,":[195],"conducted":[197],"experiments":[198],"involving":[199],"time-series":[200],"analysis,":[201],"natural":[202],"language":[203],"processing,":[204],"computer":[206],"vision":[207],"indicate":[208],"susceptibility":[211],"could":[214],"universal":[216],"transferable.":[218],"This":[219],"finding":[220],"serves":[221],"warning":[225],"future":[227],"Transformer-based":[228],"urging":[231],"researchers":[232],"consider":[234],"security":[236],"risks":[237],"inherent":[238],"model\u2019s":[241],"structure.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
