{"id":"https://openalex.org/W4415968395","doi":"https://doi.org/10.1109/tifs.2025.3629604","title":"SCALA: Toward Imperceptible and Efficient Black-Box Textual Adversarial Perturbations","display_name":"SCALA: Toward Imperceptible and Efficient Black-Box Textual Adversarial Perturbations","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415968395","doi":"https://doi.org/10.1109/tifs.2025.3629604"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3629604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3629604","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102815325","display_name":"Siqi Sun","orcid":"https://orcid.org/0000-0002-9592-3670"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Siqi Sun","raw_affiliation_strings":["School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","School of Computer Science and Informatics, University of Liverpool, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016746101","display_name":"Achim D. Brucker","orcid":"https://orcid.org/0000-0002-6355-1200"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Achim D. Brucker","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K","Department of Computer Science, University of Exeter, Exeter, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]},{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, UK","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002896600","display_name":"Jia Hu","orcid":"https://orcid.org/0000-0001-5406-8420"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jia Hu","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K","Department of Computer Science, University of Exeter, Exeter, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]},{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, UK","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020085889","display_name":"Xiaowei Huang","orcid":"https://orcid.org/0000-0001-6267-0366"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaowei Huang","raw_affiliation_strings":["School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","School of Computer Science and Informatics, University of Liverpool, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074225885","display_name":"Wenjie Ruan","orcid":"https://orcid.org/0000-0002-8311-8738"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Wenjie Ruan","raw_affiliation_strings":["School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","School of Computer Science and Informatics, University of Liverpool, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, U.K","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Informatics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102815325"],"corresponding_institution_ids":["https://openalex.org/I146655781"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18135199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"12640","last_page":"12651"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.03189999982714653,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.00860000029206276,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8867999911308289},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7336000204086304},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.49070000648498535},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.4406000077724457},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4129999876022339},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3894999921321869},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.38659998774528503}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8867999911308289},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8654999732971191},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7336000204086304},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.49070000648498535},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4406000077724457},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43779999017715454},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42170000076293945},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4129999876022339},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3894999921321869},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.38659998774528503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3718999922275543},{"id":"https://openalex.org/C2780575108","wikidata":"https://www.wikidata.org/wiki/Q7316652","display_name":"Retargeting","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34299999475479126},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3059999942779541},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.26330000162124634}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3629604","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3629604","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W1840435438","https://openalex.org/W2163455955","https://openalex.org/W2609368435","https://openalex.org/W2799194071","https://openalex.org/W2883364792","https://openalex.org/W2893051557","https://openalex.org/W2905526464","https://openalex.org/W2919115771","https://openalex.org/W2947415936","https://openalex.org/W2949128310","https://openalex.org/W2955566917","https://openalex.org/W2962718684","https://openalex.org/W2963846996","https://openalex.org/W2963918774","https://openalex.org/W2964232431","https://openalex.org/W2974122258","https://openalex.org/W2988194011","https://openalex.org/W2996851481","https://openalex.org/W2997653844","https://openalex.org/W3036286896","https://openalex.org/W3101449015","https://openalex.org/W3104423855","https://openalex.org/W3105604018","https://openalex.org/W3116387889","https://openalex.org/W3117433489","https://openalex.org/W3127569499","https://openalex.org/W4318811771","https://openalex.org/W4318812114","https://openalex.org/W4385571712","https://openalex.org/W4391724817","https://openalex.org/W4399750638","https://openalex.org/W4400315206","https://openalex.org/W4401043399","https://openalex.org/W4404781676","https://openalex.org/W4405181600","https://openalex.org/W4406302454","https://openalex.org/W4415271252"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning":[1],"models":[2,23,142,166],"are":[3],"intrinsically":[4],"susceptible":[5],"to":[6,163],"textual":[7],"adversarial":[8,55,184],"attacks":[9,138],"on":[10,50,61,96,139,181],"social":[11],"media,":[12],"where":[13],"the":[14,51,67,97,123,159,182],"perturbed":[15],"text":[16],"can":[17],"trigger":[18],"aberrant":[19],"behaviours":[20],"of":[21,54,75,145],"victim":[22],"and":[24,27,70,170],"threaten":[25],"security":[26],"privacy.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32],"present":[33],"a":[34,40,58,89],"novel":[35],"word-level":[36],"attack":[37,177],"called":[38],"SCALA:":[39],"Synonym-based":[41],"desCending":[42],"And":[43],"repLace-back":[44],"Ascending":[45],"mechanism.":[46],"Our":[47],"focus":[48],"is":[49],"efficient":[52,116],"production":[53],"examples,":[56],"with":[57,127],"particular":[59],"emphasis":[60],"minimizing":[62],"human":[63,111],"perceptibility":[64],"while":[65],"ensuring":[66],"visual":[68],"resemblance":[69],"semantic":[71],"correctness.":[72],"The":[73],"merits":[74],"our":[76,118,176,188],"attacking":[77,124],"solution":[78],"lie":[79],"in":[80,143],"being:":[81],"<italic":[82,113,129,149,171,190],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[83,100,102,114,130,150,172,191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(i)</i>":[84],"imperceptible":[85],"\u2013":[86,117,133,153,175],"it":[87,134],"keeps":[88],"very":[90],"low":[91],"word":[92],"perturbation":[93],"rate":[94],"based":[95],"Hamming":[98],"(<italic":[99],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">L</i><sub":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">0</sub>-norm)":[103],"distance,":[104],"thus":[105],"achieving":[106],"heightened":[107],"deceptiveness":[108],"validated":[109],"through":[110],"evaluations;":[112],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(ii)</i>":[115],"tensor-based":[119],"parallelization":[120],"strategy":[121],"ensures":[122,157],"efficiency":[125],"compared":[126],"baselines;":[128],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(iii)</i>":[131],"effective":[132],"surpasses":[135],"seven":[136],"state-of-the-art":[137],"five":[140],"target":[141,165],"terms":[144],"reducing":[146],"after-attack":[147],"accuracy;":[148],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(iv)</i>":[151],"practical":[152],"black-box":[154],"score-based":[155],"setting":[156],"that":[158],"adversary":[160],"only":[161],"needs":[162],"query":[164],"for":[167],"confidence":[168],"scores;":[169],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(v)</i>":[173],"transferable":[174],"shows":[178],"competitive":[179],"transferability":[180],"generated":[183],"examples.":[185],"We":[186],"release":[187],"code":[189],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SCALA</i>":[192],"via":[193],"https://github.com/TrustAI/SCALA.":[194]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-06T00:00:00"}
