{"id":"https://openalex.org/W7138317614","doi":"https://doi.org/10.48550/arxiv.2603.14843","title":"ContiGuard: A Framework for Continual Toxicity Detection Against Evolving Evasive Perturbations","display_name":"ContiGuard: A Framework for Continual Toxicity Detection Against Evolving Evasive Perturbations","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7138317614","doi":"https://doi.org/10.48550/arxiv.2603.14843"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.14843","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.14843","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.14843","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129731628","display_name":"Hankun Kang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kang, Hankun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129696248","display_name":"Xin Miao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Miao, Xin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129687984","display_name":"Jianhao Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Jianhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009044920","display_name":"Jintao Wen","orcid":"https://orcid.org/0000-0001-6355-3014"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wen, Jintao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129739684","display_name":"Mayi Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu, Mayi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129646034","display_name":"Weiyu Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Weiyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129664668","display_name":"Wenpeng Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lu, Wenpeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129730309","display_name":"Tieyun Qian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qian, Tieyun","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5129731628"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.8471999764442444,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.8471999764442444,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.04039999842643738,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5403000116348267},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5238999724388123},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.46540001034736633},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4117000102996826},{"id":"https://openalex.org/keywords/comprehension","display_name":"Comprehension","score":0.3750999867916107},{"id":"https://openalex.org/keywords/online-learning","display_name":"Online learning","score":0.3720000088214874},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.35920000076293945},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.35740000009536743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6491000056266785},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5403000116348267},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5238999724388123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4828000068664551},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.46540001034736633},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4138999879360199},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4117000102996826},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4002000093460083},{"id":"https://openalex.org/C511192102","wikidata":"https://www.wikidata.org/wiki/Q5156948","display_name":"Comprehension","level":2,"score":0.3750999867916107},{"id":"https://openalex.org/C2986087404","wikidata":"https://www.wikidata.org/wiki/Q15946010","display_name":"Online learning","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3707999885082245},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.35920000076293945},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.35740000009536743},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C49261128","wikidata":"https://www.wikidata.org/wiki/Q1132455","display_name":"Hazard","level":2,"score":0.3292999863624573},{"id":"https://openalex.org/C79416737","wikidata":"https://www.wikidata.org/wiki/Q2305519","display_name":"Social learning","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3138999938964844},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.29280000925064087},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C3018790387","wikidata":"https://www.wikidata.org/wiki/Q869010","display_name":"Hybrid learning","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.14843","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.14843","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.14843","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.14843","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7911794781684875,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Toxicity":[0],"detection":[1,67,101],"mitigates":[2],"the":[3,77,107,121,129,141,157,179,184,208],"dissemination":[4],"of":[5,109,128],"toxic":[6,34],"content":[7,35],"(e.g.,":[8],"hateful":[9],"comments,":[10],"posts,":[11],"and":[12,36,47,93,147,172,190],"messages":[13],"within":[14],"online":[15,22],"social":[16,23],"actions)":[17],"to":[18,32,64,90,99,103,139,143,155,182,211],"safeguard":[19],"a":[20,61,196,213],"healthy":[21],"environment.":[24],"However,":[25],"malicious":[26],"users":[27],"persistently":[28],"develop":[29],"evasive":[30],"perturbations":[31,75],"disguise":[33],"evade":[37],"detectors.":[38],"Traditional":[39],"detectors":[40],"or":[41],"methods":[42],"are":[43,48],"static":[44],"over":[45],"time":[46],"inadequate":[49],"in":[50],"addressing":[51],"these":[52],"evolving":[53,70,113,152],"evasion":[54],"tactics.":[55],"Thus,":[56],"continual":[57,79,110,126,136],"learning":[58,80,98,111,127,199],"emerges":[59],"as":[60],"logical":[62],"approach":[63],"dynamically":[65,168],"update":[66,145],"ability":[68],"against":[69,112,151],"perturbations.":[71,104,114,153],"Nevertheless,":[72],"disparities":[73],"across":[74],"hinder":[76],"detector's":[78],"on":[81,131],"perturbed":[82,133,180],"text.":[83],"More":[84],"importantly,":[85],"perturbation-induced":[86],"noises":[87],"distort":[88],"semantics":[89],"degrade":[91],"comprehension":[92],"also":[94],"impair":[95],"critical":[96,192],"feature":[97,198],"render":[100],"sensitive":[102],"These":[105],"amplify":[106,191],"challenge":[108],"In":[115],"this":[116],"work,":[117],"we":[118,159,167,194,202],"present":[119,160],"ContiGuard,":[120],"first":[122],"framework":[123],"tailored":[124],"for":[125,217],"detector":[130,142],"time-evolving":[132],"text":[134,181],"(termed":[135],"toxicity":[137],"detection)":[138],"enable":[140],"continually":[144],"capability":[146],"maintain":[148],"sustained":[149],"resilience":[150],"Specifically,":[154],"boost":[156],"comprehension,":[158],"an":[161],"LLM-powered":[162],"semantic":[163],"enriching":[164],"strategy,":[165,200],"where":[166,201],"incorporate":[169],"possible":[170],"meaning":[171],"toxicity-related":[173],"clues":[174],"excavated":[175],"by":[176],"LLM":[177],"into":[178],"improve":[183],"comprehension.":[185],"To":[186],"mitigate":[187],"non-critical":[188],"features":[189,205],"ones,":[193],"propose":[195],"discriminability-driven":[197],"strengthen":[203],"discriminative":[204],"while":[206],"suppressing":[207],"less-discriminative":[209],"ones":[210],"shape":[212],"robust":[214],"classification":[215],"boundary":[216],"detection...":[218]},"counts_by_year":[],"updated_date":"2026-03-18T06:31:55.123368","created_date":"2026-03-18T00:00:00"}
