{"id":"https://openalex.org/W4417259758","doi":"https://doi.org/10.1186/s42400-025-00512-z","title":"Double landmines: invisible textual backdoor attacks based on dual-trigger","display_name":"Double landmines: invisible textual backdoor attacks based on dual-trigger","publication_year":2025,"publication_date":"2025-12-12","ids":{"openalex":"https://openalex.org/W4417259758","doi":"https://doi.org/10.1186/s42400-025-00512-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00512-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00512-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00512-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00512-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115597004","display_name":"Yang Hou","orcid":"https://orcid.org/0000-0001-9795-8503"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Hou","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081297670","display_name":"Qiuling Yue","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuling Yue","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115638302","display_name":"Lujia Chai","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lujia Chai","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Guozhao Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhao Liao","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102193245","display_name":"Wenbao Han","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbao Han","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102705091","display_name":"Wei Ou","orcid":"https://orcid.org/0000-0002-1760-8528"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Ou","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58 Renmin Avenue,Meilan, HaiKou, Hainan Province, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5115597004"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20467062,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.37070000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.37070000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.10429999977350235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.053700000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9970999956130981},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4700999855995178},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.3409000039100647},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.33799999952316284},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.31700000166893005},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3149999976158142}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9970999956130981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6998999714851379},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6783000230789185},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4700999855995178},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3409000039100647},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.33799999952316284},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3149999976158142},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.29260000586509705},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.2915000021457672},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2896000146865845}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00512-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00512-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00512-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cda3f3acdc864d1bb91197656e17ffa2","is_oa":true,"landing_page_url":"https://doaj.org/article/cda3f3acdc864d1bb91197656e17ffa2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00512-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00512-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00512-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1858642095","display_name":null,"funder_award_id":"U23A20304","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6510479079","display_name":null,"funder_award_id":"U23A2030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6676365692","display_name":null,"funder_award_id":"U23A203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417259758.pdf","grobid_xml":"https://content.openalex.org/works/W4417259758.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2123442489","https://openalex.org/W2251939518","https://openalex.org/W2255466643","https://openalex.org/W2962977603","https://openalex.org/W2963126845","https://openalex.org/W2973217491","https://openalex.org/W2997049449","https://openalex.org/W3035367371","https://openalex.org/W3109409894","https://openalex.org/W3176270593","https://openalex.org/W3204619801","https://openalex.org/W3205696278","https://openalex.org/W3212213895","https://openalex.org/W3213508244","https://openalex.org/W4323655724","https://openalex.org/W4384561707","https://openalex.org/W4388154082","https://openalex.org/W4389524573","https://openalex.org/W4392904068","https://openalex.org/W4394994587","https://openalex.org/W4396240378","https://openalex.org/W4404820372","https://openalex.org/W4407163436","https://openalex.org/W4407755370","https://openalex.org/W4410910148"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Backdoor":[1],"attacks":[2,16,79],"pose":[3],"an":[4,139],"important":[5],"security":[6,23],"threat":[7],"to":[8,64,81,111,155,226],"textual":[9,14,38],"large":[10,187],"language":[11],"models.":[12],"Exploring":[13],"backdoor":[15,39,78,117,151],"not":[17,170],"only":[18,171],"helps":[19],"reveal":[20],"the":[21,60,69,76,90,104,173,181,198,219,229,235,239],"potential":[22],"risks":[24],"of":[25,33,71,106,175,189,238,246],"models,":[26],"but":[27,178],"also":[28,179,233],"promotes":[29],"innovation":[30],"and":[31,102,132,208,244],"development":[32],"defense":[34,92,184],"mechanisms.":[35],"Currently,":[36],"most":[37],"attack":[40,100,118,152,206,211,215,230],"methods":[41,200],"are":[42,86],"based":[43,201],"on":[44,202],"a":[45,56,66,115,156],"single":[46],"trigger.":[47,67],"For":[48],"example,":[49],"inserting":[50],"specific":[51],"content":[52],"into":[53],"text":[54,62],"as":[55,138,144],"trigger":[57,164,176],"or":[58,94],"changing":[59],"abstract":[61,203],"features":[63,204],"be":[65,250],"However,":[68],"adoption":[70],"this":[72,123,142,168,194,247],"single-trigger":[73],"mode":[74],"makes":[75,149],"existing":[77,91],"subject":[80],"certain":[82,97],"limitations:":[83],"either":[84],"they":[85,95],"easily":[87],"identified":[88],"by":[89],"strategies,":[93],"have":[96,161],"shortcomings":[98],"in":[99,103,122,141,205,224],"performance":[101,212],"construction":[105,236],"poisoned":[107,240],"datasets.":[108],"In":[109,222],"order":[110,225],"solve":[112],"these":[113],"issues,":[114],"dual-trigger":[116],"method":[119,153,169,195,237],"is":[120],"proposed":[121],"paper.":[124],"Specifically,":[125],"we":[126,232],"use":[127,135],"two":[128,145],"different":[129,146,163],"attributes,":[130],"syntax":[131],"mood":[133,137],"(we":[134],"subjunctive":[136],"example":[140],"article),":[143],"triggers.":[147],"It":[148],"our":[150],"similar":[154],"double":[157],"landmine":[158],"which":[159],"can":[160,249],"completely":[162],"conditions":[165],"simultaneously.":[166],"Therefore,":[167],"improves":[172],"flexibility":[174],"mode,":[177],"enhances":[180],"robustness":[182],"against":[183],"detection.":[185],"A":[186],"number":[188],"experimental":[190],"results":[191],"show":[192],"that":[193],"significantly":[196],"outperforms":[197],"previous":[199],"performance,":[207,231],"achieves":[209],"comparable":[210],"(almost":[213],"100%":[214],"success":[216],"rate)":[217],"with":[218],"insertion-based":[220],"method.":[221],"addition,":[223],"further":[227],"improve":[228],"give":[234],"dataset.":[241],"The":[242],"code":[243],"data":[245],"paper":[248],"obtained":[251],"at":[252],"https://github.com/HoyaAm/Double-Landmines.":[253]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-12-12T00:00:00"}
