{"id":"https://openalex.org/W4379539573","doi":"https://doi.org/10.48550/arxiv.2306.02488","title":"Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy","display_name":"Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy","publication_year":2023,"publication_date":"2023-06-04","ids":{"openalex":"https://openalex.org/W4379539573","doi":"https://doi.org/10.48550/arxiv.2306.02488"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2306.02488","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.02488","pdf_url":"https://arxiv.org/pdf/2306.02488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2306.02488","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100621457","display_name":"Xiaoting Li","orcid":"https://orcid.org/0000-0002-1538-3644"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Xiaoting","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Lingwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Dinghao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100621457"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9343000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7920300364494324},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7283833622932434},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.629052996635437},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6102377772331238},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6051114797592163},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5894438028335571},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5805965662002563},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47852790355682373},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.43981173634529114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4335190951824188},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.422243595123291},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4114406108856201},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35242199897766113},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2760176658630371}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7920300364494324},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7283833622932434},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.629052996635437},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6102377772331238},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6051114797592163},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5894438028335571},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5805965662002563},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47852790355682373},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.43981173634529114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4335190951824188},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.422243595123291},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4114406108856201},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35242199897766113},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2760176658630371}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2306.02488","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.02488","pdf_url":"https://arxiv.org/pdf/2306.02488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2306.02488","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2306.02488","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2306.02488","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.02488","pdf_url":"https://arxiv.org/pdf/2306.02488","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4379539573.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2040808657","https://openalex.org/W4239582170","https://openalex.org/W2918664383","https://openalex.org/W106056076","https://openalex.org/W4320855730","https://openalex.org/W2135200719","https://openalex.org/W2260680879","https://openalex.org/W4229600140","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Social":[0,134],"media":[1,159,202,224],"has":[2,57],"drastically":[3],"reshaped":[4],"the":[5,25,35,117,143,157,184,193,216,234,249],"world":[6],"that":[7,183,228],"allows":[8],"billions":[9],"of":[10,46,120,145,176,251],"people":[11],"to":[12,18,73,79,93,123,162,208],"engage":[13],"in":[14,112,259],"such":[15,182],"interactive":[16],"environments":[17],"conveniently":[19],"create":[20],"and":[21,41,126,204,254],"share":[22],"content":[23],"with":[24,173,237],"public.":[26],"Among":[27],"them,":[28],"text":[29,99,160,213],"data":[30,54,161,214],"(e.g.,":[31,67],"tweets,":[32],"blogs)":[33],"maintains":[34],"basic":[36],"yet":[37],"important":[38],"social":[39,158,201,223],"activities":[40],"generates":[42],"a":[43,128,174],"rich":[44],"source":[45],"user-oriented":[47],"information.":[48],"While":[49],"those":[50],"explicit":[51],"sensitive":[52],"user":[53,260],"like":[55],"credentials":[56],"been":[58,90],"significantly":[59],"protected":[60],"by":[61,199],"all":[62],"means,":[63],"personal":[64,147],"private":[65],"attribute":[66,95,104,148,166,186,210,243,261],"age,":[68],"gender,":[69],"location)":[70],"disclosure":[71],"due":[72],"inference":[74,167,235,252],"attacks":[75,253],"is":[76],"somehow":[77],"challenging":[78],"avoid,":[80],"especially":[81],"when":[82],"powerful":[83],"natural":[84],"language":[85],"processing":[86],"(NLP)":[87],"techniques":[88],"have":[89,226],"effectively":[91,232],"deployed":[92],"automate":[94],"inferences":[96],"from":[97,192],"implicit":[98],"data.":[100],"This":[101],"puts":[102],"users'":[103],"privacy":[105,149,262],"at":[106],"risk.":[107],"To":[108],"address":[109],"this":[110,113],"challenge,":[111],"paper,":[114],"we":[115,141,196],"leverage":[116],"inherent":[118],"vulnerability":[119],"machine":[121],"learning":[122],"adversarial":[124,152],"attacks,":[125],"design":[127],"novel":[129],"text-space":[130],"Adversarial":[131],"attack":[132,153],"for":[133],"Good,":[135],"called":[136],"Adv4SG.":[137],"In":[138],"other":[139],"words,":[140],"cast":[142],"problem":[144,155],"protecting":[146],"as":[150],"an":[151],"formulation":[154],"over":[156,212,241],"defend":[163],"against":[164],"NLP-based":[165],"attacks.":[168],"More":[169],"specifically,":[170],"Adv4SG":[171,198],"proceeds":[172],"sequence":[175],"word":[177],"perturbations":[178],"under":[179,215],"given":[180],"constraints":[181],"probed":[185],"cannot":[187],"be":[188],"identified":[189],"correctly.":[190],"Different":[191],"prior":[194],"works,":[195],"advance":[197],"considering":[200],"property,":[203],"introducing":[205],"cost-effective":[206],"mechanisms":[207],"expedite":[209],"obfuscation":[211],"black-box":[217],"setting.":[218],"Extensive":[219],"experiments":[220],"on":[221],"real-world":[222],"datasets":[225],"demonstrated":[227],"our":[229],"method":[230],"can":[231],"degrade":[233],"accuracy":[236],"less":[238],"computational":[239],"cost":[240],"different":[242],"settings,":[244],"which":[245],"substantially":[246],"helps":[247],"mitigate":[248],"impacts":[250],"thus":[255],"achieve":[256],"high":[257],"performance":[258],"protection.":[263]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
