{"id":"https://openalex.org/W4379512492","doi":"https://doi.org/10.1145/3591227","title":"Discrete Adversarial Attack to Models of Code","display_name":"Discrete Adversarial Attack to Models of Code","publication_year":2023,"publication_date":"2023-06-06","ids":{"openalex":"https://openalex.org/W4379512492","doi":"https://doi.org/10.1145/3591227"},"language":"en","primary_location":{"id":"doi:10.1145/3591227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3591227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3591227","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3591227","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101597608","display_name":"Fengjuan Gao","orcid":"https://orcid.org/0000-0001-8185-0573"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengjuan Gao","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0000-0001-8185-0573","affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100701610","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0002-7216-6929"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Wang","raw_affiliation_strings":["Nanjing University, China"],"raw_orcid":"https://orcid.org/0000-0002-7216-6929","affiliations":[{"raw_affiliation_string":"Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001578135","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0003-0844-5023"},"institutions":[{"id":"https://openalex.org/I4210148469","display_name":"Visa (United States)","ror":"https://ror.org/05t1y0b59","country_code":"US","type":"company","lineage":["https://openalex.org/I4210148469"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ke Wang","raw_affiliation_strings":["Visa Research, USA"],"raw_orcid":"https://orcid.org/0000-0003-0844-5023","affiliations":[{"raw_affiliation_string":"Visa Research, USA","institution_ids":["https://openalex.org/I4210148469"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101597608"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":3.5786,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94182626,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"7","issue":"PLDI","first_page":"172","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9470999836921692,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9423080682754517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7303739786148071},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6671351790428162},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5683978199958801},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5402036309242249},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4564526081085205},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40970462560653687},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3903364837169647},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14053088426589966}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9423080682754517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7303739786148071},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6671351790428162},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5683978199958801},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5402036309242249},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4564526081085205},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40970462560653687},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3903364837169647},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14053088426589966},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3591227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3591227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3591227","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3591227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3591227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3591227","source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1494926123","display_name":null,"funder_award_id":"62202220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6061973920","display_name":null,"funder_award_id":"62232001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6786717514","display_name":null,"funder_award_id":"62032010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4379512492.pdf","grobid_xml":"https://content.openalex.org/works/W4379512492.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W569478347","https://openalex.org/W1498436455","https://openalex.org/W2110889728","https://openalex.org/W2156981320","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2774510177","https://openalex.org/W2885070483","https://openalex.org/W2887364112","https://openalex.org/W2891434004","https://openalex.org/W2907705732","https://openalex.org/W2931858311","https://openalex.org/W2962718684","https://openalex.org/W2963341956","https://openalex.org/W2963857521","https://openalex.org/W2964150020","https://openalex.org/W2979679630","https://openalex.org/W3033775865","https://openalex.org/W3098605233","https://openalex.org/W3107418514","https://openalex.org/W3109966548","https://openalex.org/W3190338376","https://openalex.org/W4206742934","https://openalex.org/W4210499321","https://openalex.org/W4210772589","https://openalex.org/W4220722393","https://openalex.org/W4226004737","https://openalex.org/W4238124605","https://openalex.org/W4285487359"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"The":[0],"pervasive":[1],"brittleness":[2],"of":[3,21,44,66,85,102,133,141,188,194],"deep":[4],"neural":[5,34],"networks":[6],"has":[7],"attracted":[8],"significant":[9],"attention":[10],"in":[11,32,80,147,176,181],"recent":[12],"years.":[13],"A":[14],"particularly":[15],"interesting":[16],"finding":[17],"is":[18,77,95,164],"the":[19,64,89,100,106,125,139,192,199],"existence":[20],"adversarial":[22,45,53,103,121,134,145,189,204],"examples,":[23],"imperceptibly":[24],"perturbed":[25],"natural":[26],"inputs":[27],"that":[28,62,76,136,160],"induce":[29],"erroneous":[30],"predictions":[31],"state-of-the-art":[33,169,203],"models.":[35,87],"In":[36,184],"this":[37],"paper,":[38],"we":[39,70,128],"study":[40],"a":[41,72,82,96,130],"different":[42],"type":[43],"examples":[46,54],"specific":[47],"to":[48,115,178],"code":[49,86,117,142],"models,":[50],"called":[51],"discrete":[52,120,162],",":[55],"which":[56],"are":[57,175],"created":[58],"through":[59],"program":[60],"transformations":[61],"preserve":[63],"semantics":[65],"original":[67],"inputs.In":[68],"particular,":[69],"propose":[71],"novel,":[73],"general":[74],"method":[75],"highly":[78],"effective":[79,167],"attacking":[81],"broad":[83],"range":[84],"From":[88],"defense":[90,156,173],"perspective,":[91],"our":[92,153,161,186,209],"primary":[93],"contribution":[94],"theoretical":[97,126],"foundation":[98],"for":[99,110],"application":[101],"training":[104,111,135,190],"\u2014":[105,114],"most":[107],"successful":[108],"algorithm":[109],"robust":[112],"classifiers":[113],"defending":[116],"models":[118,143,180,197],"against":[119,144,202],"attack.":[122],"Motivated":[123],"by":[124,198],"results,":[127],"present":[129],"simple":[131],"realization":[132,187],"substantially":[137],"improves":[138,191],"robustness":[140,193],"attacks":[146,205],"practice.":[148],"We":[149],"extensively":[150],"evaluate":[151],"both":[152],"attack":[154,163],"and":[155],"methods.":[157],"Results":[158],"show":[159],"significantly":[165],"more":[166],"than":[168],"whether":[170],"or":[171],"not":[172],"mechanisms":[174],"place":[177],"aid":[179],"resisting":[182],"attacks.":[183],"addition,":[185],"all":[195],"evaluated":[196],"widest":[200],"margin":[201],"as":[206,208],"well":[207],"own.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
