{"id":"https://openalex.org/W3208411454","doi":"https://doi.org/10.1145/3493700.3493705","title":"AdvCodeMix: Adversarial Attack on Code-Mixed Data","display_name":"AdvCodeMix: Adversarial Attack on Code-Mixed Data","publication_year":2022,"publication_date":"2022-01-07","ids":{"openalex":"https://openalex.org/W3208411454","doi":"https://doi.org/10.1145/3493700.3493705","mag":"3208411454"},"language":"en","primary_location":{"id":"doi:10.1145/3493700.3493705","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3493700.3493705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM IKDD CODS and 27th COMAD)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2111.00350","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013112157","display_name":"Sourya Dipta Das","orcid":"https://orcid.org/0000-0003-1488-7418"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sourya Dipta Das","raw_affiliation_strings":["Jadavpur University, IN"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026492842","display_name":"Ayan Basak","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayan Basak","raw_affiliation_strings":["Jadavpur University, IN"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029697503","display_name":"Soumil Mandal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Soumil Mandal","raw_affiliation_strings":["University of Texas at Dallas, US"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, US","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052810907","display_name":"Dipankar Das","orcid":"https://orcid.org/0000-0002-8110-9344"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dipankar Das","raw_affiliation_strings":["Jadavpur University, IN"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, IN","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013112157"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.276,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59938035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8653862476348877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7419531345367432},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5919775366783142},{"id":"https://openalex.org/keywords/sentence","display_name":"Sentence","score":0.574168860912323},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.47933849692344666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4531566798686981},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4461562931537628},{"id":"https://openalex.org/keywords/bengali","display_name":"Bengali","score":0.4258069097995758},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3647846281528473},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22376176714897156},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1261667013168335}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8653862476348877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7419531345367432},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5919775366783142},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.574168860912323},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.47933849692344666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4531566798686981},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4461562931537628},{"id":"https://openalex.org/C19235068","wikidata":"https://www.wikidata.org/wiki/Q9610","display_name":"Bengali","level":2,"score":0.4258069097995758},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3647846281528473},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22376176714897156},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1261667013168335},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3493700.3493705","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3493700.3493705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM IKDD CODS and 27th COMAD)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2111.00350","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2111.00350","pdf_url":"https://arxiv.org/pdf/2111.00350","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2111.00350","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2111.00350","pdf_url":"https://arxiv.org/pdf/2111.00350","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1975163393","https://openalex.org/W2085365725","https://openalex.org/W2170240176","https://openalex.org/W2462558730","https://openalex.org/W2618043096","https://openalex.org/W2640329709","https://openalex.org/W2790142169","https://openalex.org/W2791704856","https://openalex.org/W2793276877","https://openalex.org/W2948384082","https://openalex.org/W2949128310","https://openalex.org/W2949311987","https://openalex.org/W2952638691","https://openalex.org/W2962818281","https://openalex.org/W2963859254","https://openalex.org/W2996851481","https://openalex.org/W3018458867","https://openalex.org/W3034196716","https://openalex.org/W3037932902","https://openalex.org/W3048075355","https://openalex.org/W3084280029","https://openalex.org/W3101449015","https://openalex.org/W3106490111","https://openalex.org/W3115081393","https://openalex.org/W3115327988","https://openalex.org/W3116202362","https://openalex.org/W3138648335","https://openalex.org/W3168752284","https://openalex.org/W4293846201"],"related_works":["https://openalex.org/W2084490135","https://openalex.org/W4298170800","https://openalex.org/W2895890526","https://openalex.org/W617692174","https://openalex.org/W2794758919","https://openalex.org/W4232781930","https://openalex.org/W1913642778","https://openalex.org/W2630858571","https://openalex.org/W4300860228","https://openalex.org/W2329406070"],"abstract_inverted_index":{"Research":[0],"on":[1,28,43,57,104,110],"adversarial":[2,26],"attacks":[3,27,73],"are":[4,137],"becoming":[5],"widely":[6],"popular":[7],"in":[8,32,51,139],"the":[9,14,23,33,39,63,67,72,75,85],"recent":[10],"years.":[11],"One":[12],"of":[13,25,66,77,87,135],"unexplored":[15],"areas":[16],"where":[17,92],"prior":[18],"research":[19],"is":[20,22],"lacking":[21],"effect":[24],"code-mixed":[29,48,114],"data.":[30],"Therefore,":[31],"present":[34,82],"work,":[35],"we":[36],"have":[37],"explained":[38],"first":[40],"generalized":[41],"framework":[42],"text":[44],"perturbation":[45,59,98],"to":[46,90,93],"attack":[47,94],"classification":[49,107],"models":[50,108],"a":[52,78,88,132,140],"black-box":[53],"setting.":[54],"We":[55,100],"rely":[56],"various":[58,97,105],"techniques":[60],"that":[61],"preserve":[62],"semantic":[64],"structures":[65],"sentences":[68],"and":[69,112,116,123],"also":[70],"obscure":[71],"from":[74],"perception":[76],"human":[79],"user.":[80],"The":[81],"methodology":[83],"leverages":[84],"importance":[86],"token":[89],"decide":[91],"by":[95,120],"employing":[96],"strategies.":[99],"test":[101],"our":[102],"strategies":[103],"sentiment":[106],"trained":[109],"Bengali-English":[111],"Hindi-English":[113],"datasets,":[115],"reduce":[117],"their":[118],"F1-scores":[119],"nearly":[121],"51%":[122],"53%":[124],"respectively,":[125],"which":[126],"can":[127],"be":[128],"further":[129],"reduced":[130],"if":[131],"larger":[133],"number":[134],"tokens":[136],"perturbed":[138],"given":[141],"sentence.":[142]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
