{"id":"https://openalex.org/W7117238635","doi":"https://doi.org/10.1186/s42400-025-00500-3","title":"Towards optimal adversarial texts: character, word, and sentence","display_name":"Towards optimal adversarial texts: character, word, and sentence","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7117238635","doi":"https://doi.org/10.1186/s42400-025-00500-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00500-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00500-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00500-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00500-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080854999","display_name":"Pengchuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengchuan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiao Ling Wei, Nanjing, 210094, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiao Ling Wei, Nanjing, 210094, Jiangsu, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121288955","display_name":"Deqiang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqiang Li","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, No.9, Wenyuan Road, Nanjing, 210023, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, No.9, Wenyuan Road, Nanjing, 210023, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121294907","display_name":"Qianmu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianmu Li","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiao Ling Wei, Nanjing, 210094, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiao Ling Wei, Nanjing, 210094, Jiangsu, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080854999"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80879709,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.3043999969959259,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.3043999969959259,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.25940001010894775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08739999681711197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8302000164985657},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.6136000156402588},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5497999787330627},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.5346999764442444},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.49720001220703125},{"id":"https://openalex.org/keywords/sentence","display_name":"Sentence","score":0.49390000104904175}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8302000164985657},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7440000176429749},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.6136000156402588},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5497999787330627},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.5346999764442444},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.527899980545044},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.49720001220703125},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.49390000104904175},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4523000121116638},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.43630000948905945},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.42669999599456787},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39410001039505005},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.39100000262260437},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.3264999985694885},{"id":"https://openalex.org/C151913843","wikidata":"https://www.wikidata.org/wiki/Q3454555","display_name":"Dominance (genetics)","level":3,"score":0.31459999084472656}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00500-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00500-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00500-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b1147681eff549fab99a8283ab19be04","is_oa":true,"landing_page_url":"https://doaj.org/article/b1147681eff549fab99a8283ab19be04","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-20 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00500-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00500-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00500-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5333701372146606}],"awards":[{"id":"https://openalex.org/G1923972615","display_name":null,"funder_award_id":"BF2024071","funder_id":"https://openalex.org/F4320327600","funder_display_name":"Jiangsu Agricultural Science and Technology Independent Innovation Fund"},{"id":"https://openalex.org/G2030376154","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G3910829908","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G7622452733","display_name":null,"funder_award_id":"BF2024071","funder_id":"https://openalex.org/F4320321605","funder_display_name":"Government of Jiangsu Province"},{"id":"https://openalex.org/G7804090598","display_name":null,"funder_award_id":"BK20230350","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327600","display_name":"Jiangsu Agricultural Science and Technology Independent Innovation Fund","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117238635.pdf","grobid_xml":"https://content.openalex.org/works/W7117238635.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W1840435438","https://openalex.org/W2243397390","https://openalex.org/W2609368435","https://openalex.org/W2798665661","https://openalex.org/W2799194071","https://openalex.org/W2888137286","https://openalex.org/W2905526464","https://openalex.org/W2926587947","https://openalex.org/W2947415936","https://openalex.org/W2950733407","https://openalex.org/W2962718684","https://openalex.org/W2962818281","https://openalex.org/W2963001247","https://openalex.org/W2963748441","https://openalex.org/W2963783970","https://openalex.org/W2963969878","https://openalex.org/W2982054702","https://openalex.org/W2988194011","https://openalex.org/W2996851481","https://openalex.org/W3034397670","https://openalex.org/W3035183289","https://openalex.org/W3035422387","https://openalex.org/W3045308957","https://openalex.org/W3092347010","https://openalex.org/W3103491646","https://openalex.org/W3104254968","https://openalex.org/W3104423855","https://openalex.org/W3127569499","https://openalex.org/W3185346377","https://openalex.org/W4211154164","https://openalex.org/W4224215750","https://openalex.org/W4225858632","https://openalex.org/W4280591051","https://openalex.org/W4280653710","https://openalex.org/W4283811884","https://openalex.org/W4290944423","https://openalex.org/W4312000417","https://openalex.org/W4312816015","https://openalex.org/W4384284067","https://openalex.org/W4385753875","https://openalex.org/W4385805112","https://openalex.org/W4391421501","https://openalex.org/W4393148199","https://openalex.org/W4394725593","https://openalex.org/W4403081508","https://openalex.org/W4404555905","https://openalex.org/W4409100492"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Natural":[1],"language":[2,27],"processing":[3],"models":[4],"are":[5,37,105],"widely":[6],"acknowledged":[7],"for":[8,107],"their":[9],"strong":[10],"data":[11],"fitting":[12],"capabilities,":[13],"diverse":[14],"application":[15],"scenarios,":[16],"and":[17,69,96,102,110,137,151],"adaptable":[18],"learning":[19],"methodologies.":[20],"However,":[21],"these":[22],"models,":[23,28],"including":[24],"the":[25,41,46,50,57,64],"large":[26],"exhibit":[29],"sensitivity":[30],"to":[31],"adversarial":[32,84],"example":[33],"attacks.":[34],"These":[35],"examples":[36],"slightly":[38],"perturbed":[39,72],"from":[40],"pristine":[42],"text":[43,85],"but":[44],"mislead":[45],"model":[47],"classification.":[48],"Nevertheless,":[49],"existing":[51],"attack":[52,58,92,134,149],"methods":[53],"primarily":[54],"focus":[55],"on":[56],"effectiveness":[59,68,146],"without":[60],"semantics-preservation":[61],"considered.":[62],"Moreover,":[63],"trade-off":[65],"between":[66],"evasion":[67],"concealment":[70],"of":[71],"texts":[73],"is":[74,114],"less":[75],"investigated.":[76],"In":[77],"this":[78],"study,":[79],"we":[80],"propose":[81],"a":[82,129],"multi-objective":[83],"generation":[86],"framework":[87],"(MOATG)":[88],"that":[89,126],"simultaneously":[90],"optimizes":[91],"success":[93,135],"rate,":[94],"imperceptibility,":[95],"semantic":[97],"similarity.":[98],"Tailored":[99],"objective":[100],"functions":[101],"dominance":[103],"relations":[104],"designed":[106],"character-,":[108],"word-,":[109],"sentence-level":[111],"perturbations.":[112],"MOATG":[113,127],"evaluated":[115],"against":[116],"five":[117,120],"baselines":[118],"across":[119],"benchmark":[121],"datasets.":[122],"Experimental":[123],"results":[124],"show":[125],"achieves":[128],"5.38%":[130],"average":[131],"improvement":[132],"in":[133,147],"rate":[136,141],"reduces":[138],"word":[139],"error":[140],"by":[142],"1.48%,":[143],"demonstrating":[144],"its":[145],"balancing":[148],"strength":[150],"stealth.":[152]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-12-25T00:00:00"}
