{"id":"https://openalex.org/W4411113104","doi":"https://doi.org/10.18653/v1/2025.findings-naacl.196","title":"SynGhost: Invisible and Universal Task-agnostic Backdoor Attack via Syntactic Transfer","display_name":"SynGhost: Invisible and Universal Task-agnostic Backdoor Attack via Syntactic Transfer","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411113104","doi":"https://doi.org/10.18653/v1/2025.findings-naacl.196"},"language":"en","primary_location":{"id":"doi:10.18653/v1/2025.findings-naacl.196","is_oa":true,"landing_page_url":"https://doi.org/10.18653/v1/2025.findings-naacl.196","pdf_url":"https://aclanthology.org/2025.findings-naacl.196.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Findings of the Association for Computational Linguistics: NAACL 2025","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://aclanthology.org/2025.findings-naacl.196.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009313267","display_name":"Pengzhou Cheng","orcid":"https://orcid.org/0000-0003-0945-8790"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pengzhou Cheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101537245","display_name":"Wei Du","orcid":"https://orcid.org/0000-0002-7959-6227"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Du","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100585973","display_name":"Zongru Wu","orcid":"https://orcid.org/0000-0002-5387-7821"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zongru Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101886601","display_name":"Fengwei Zhang","orcid":"https://orcid.org/0000-0003-3365-2526"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fengwei Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100621391","display_name":"Libo Chen","orcid":"https://orcid.org/0000-0001-5787-580X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Libo Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056812241","display_name":"Zhuosheng Zhang","orcid":"https://orcid.org/0000-0002-2710-5115"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhuosheng Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5085695760","display_name":"Gongshen Liu","orcid":"https://orcid.org/0000-0001-5194-1570"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gongshen Liu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5009313267"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8843,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91262023,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3530","last_page":"3546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10429","display_name":"EEG and Brain-Computer Interfaces","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9779500961303711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765306234359741},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6447394490242004},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.47967028617858887},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4674715995788574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4072549045085907},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.35143041610717773},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0653313398361206},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06451934576034546}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9779500961303711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765306234359741},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6447394490242004},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.47967028617858887},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4674715995788574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4072549045085907},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.35143041610717773},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0653313398361206},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06451934576034546},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18653/v1/2025.findings-naacl.196","is_oa":true,"landing_page_url":"https://doi.org/10.18653/v1/2025.findings-naacl.196","pdf_url":"https://aclanthology.org/2025.findings-naacl.196.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Findings of the Association for Computational Linguistics: NAACL 2025","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18653/v1/2025.findings-naacl.196","is_oa":true,"landing_page_url":"https://doi.org/10.18653/v1/2025.findings-naacl.196","pdf_url":"https://aclanthology.org/2025.findings-naacl.196.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Findings of the Association for Computational Linguistics: NAACL 2025","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411113104.pdf","grobid_xml":"https://content.openalex.org/works/W4411113104.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
