{"id":"https://openalex.org/W4392254202","doi":"https://doi.org/10.1145/3639479.3639493","title":"A Novel Ranking Method for Textual Adversarial Attack","display_name":"A Novel Ranking Method for Textual Adversarial Attack","publication_year":2023,"publication_date":"2023-12-27","ids":{"openalex":"https://openalex.org/W4392254202","doi":"https://doi.org/10.1145/3639479.3639493"},"language":"en","primary_location":{"id":"doi:10.1145/3639479.3639493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3639479.3639493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Machine Learning and Natural Language Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100363590","display_name":"Huijun Liu","orcid":"https://orcid.org/0000-0003-0252-6973"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huijun Liu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075560272","display_name":"Jie Yu","orcid":"https://orcid.org/0000-0001-5655-6014"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101997874","display_name":"Jun Ma","orcid":"https://orcid.org/0000-0003-2258-0854"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Ma","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023621058","display_name":"Shasha Li","orcid":"https://orcid.org/0000-0002-7581-1612"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shasha Li","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100363590"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20696046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perplexity","display_name":"Perplexity","score":0.8602744340896606},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.849776029586792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7703553438186646},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7286546230316162},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.6431668996810913},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6391885876655579},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5575058460235596},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5320689678192139},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.49460074305534363},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4349738359451294},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4177478551864624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1443130373954773}],"concepts":[{"id":"https://openalex.org/C100279451","wikidata":"https://www.wikidata.org/wiki/Q372193","display_name":"Perplexity","level":3,"score":0.8602744340896606},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.849776029586792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7703553438186646},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7286546230316162},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.6431668996810913},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6391885876655579},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5575058460235596},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5320689678192139},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.49460074305534363},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4349738359451294},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4177478551864624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1443130373954773},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3639479.3639493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3639479.3639493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 6th International Conference on Machine Learning and Natural Language Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1967925153","https://openalex.org/W2081580037","https://openalex.org/W2609368435","https://openalex.org/W2891177506","https://openalex.org/W2949128310","https://openalex.org/W2962718684","https://openalex.org/W2963846996","https://openalex.org/W2982756474","https://openalex.org/W2988194011","https://openalex.org/W2996851481","https://openalex.org/W3035736465","https://openalex.org/W3101449015","https://openalex.org/W3104423855","https://openalex.org/W3104570147","https://openalex.org/W3118032223","https://openalex.org/W3200913691","https://openalex.org/W3217604114","https://openalex.org/W4367146629","https://openalex.org/W4387790143"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2169518243","https://openalex.org/W2252095989","https://openalex.org/W4322096525","https://openalex.org/W2551914602","https://openalex.org/W4281893144","https://openalex.org/W4287323699","https://openalex.org/W4239582170","https://openalex.org/W2105076537","https://openalex.org/W2084531783"],"abstract_inverted_index":{"Adversarial":[0],"examples":[1,31],"highlight":[2],"the":[3,15,47,77,93],"potential":[4],"weaknesses":[5],"in":[6,46,97],"text":[7],"classifiers,":[8],"and":[9,53,75,104],"can":[10],"be":[11,43],"used":[12],"to":[13,27,38,42,71],"improve":[14],"robustness":[16],"of":[17,49,80,99],"classifiers.":[18],"Previous":[19],"attack":[20,55,64,100],"models":[21,26],"which":[22,66],"use":[23],"pre-trained":[24],"language":[25],"generate":[28,76],"context-aware":[29],"adversarial":[30,63],"typically":[32],"solely":[33],"adopt":[34],"gold":[35],"label":[36,69],"probability":[37],"find":[39,72],"vulnerable":[40,73,81],"words":[41,79,82],"perturbed,":[44],"resulting":[45],"waste":[48],"other":[50],"labels":[51],"probabilities":[52,70],"inefficient":[54],"methods.":[56],"This":[57],"paper":[58],"proposes":[59],"a":[60],"novel":[61],"textual":[62,102],"model,":[65],"leverage":[67],"all":[68],"words,":[74],"substitute":[78],"by":[83],"utilizing":[84],"Roberta.":[85],"Extensive":[86],"experiments":[87],"demonstrate":[88],"that":[89],"our":[90],"model":[91,96],"outperforms":[92],"previous":[94],"best":[95],"terms":[98],"success,":[101],"similarity":[103],"perplexity.":[105]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
