Perturbing and Backtracking Based Textual Adversarial Attack

被引:0
|
作者
Qiao, Yuanxin [1 ]
Xie, Ruilin [1 ]
Xie, Songcheng [1 ]
Cui, Zhanqi [1 ]
机构
[1] School of Computer Science, Beijing Information Science and Technology University, Beijing,100101, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Budget control - Computer aided language translation - Generative adversarial networks - Natural language processing systems - Query languages - Semantics - Structured Query Language
引用
收藏
页码:142 / 147
相关论文
共 50 条
  • [31] LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
    Zhang, Jiebao
    Qian, Wenhua
    Cao, Jinde
    Xu, Dan
    COMPUTERS & SECURITY, 2024, 140
  • [32] Similarity attack: An adversarial attack game for image classification based on deep learning
    Tian, Xuejun
    Tian, Xinyuan
    Pan, Bingqin
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1467 - 1478
  • [33] Graph Structural Attack by Perturbing Spectral Distance
    Lin, Lu
    Blaser, Ethan
    Wang, Hongning
    PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 989 - 998
  • [34] Detecting Free-Riding Attack in Federated Learning Based on Gradient Backtracking
    Hong, Zhen
    Feng, Wanglei
    Wen, Zhenyu
    Wu, Di
    Li, Taotao
    Wu, Yiming
    Wang, Cong
    Ji, Shouling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (09): : 2185 - 2198
  • [35] A Robust Adversarial Example Attack Based on Video Augmentation
    Yin, Mingyong
    Xu, Yixiao
    Hu, Teng
    Liu, Xiaolei
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [36] Adversarial Attack on Microarchitectural Events based Malware Detectors
    Dinakarrao, Sai Manoj Pudukotai
    Amberkar, Sairaj
    Bhat, Sahil
    Dhavlle, Abhijitt
    Sayadi, Hossein
    Sasan, Avesta
    Homayoun, Houman
    Rafatirad, Setareh
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [37] Trust Region Based Adversarial Attack on Neural Networks
    Yao, Zhewei
    Gholami, Amir
    Xu, Peng
    Keutzer, Kurt
    Mahoney, Michael W.
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 11342 - 11351
  • [38] Decision-Based Adversarial Attack With Frequency Mixup
    Li, Xiu-Chuan
    Zhang, Xu-Yao
    Yin, Fei
    Liu, Cheng-Lin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1038 - 1052
  • [39] Adversarial Attack Based on Runge-Kutta Method
    Wan C.
    Huang F.-J.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (05): : 2543 - 2565
  • [40] Decision-Based Adversarial Attack with Frequency Mixup
    Li, Xiu-Chuan
    Zhang, Xu-Yao
    Yin, Fei
    Liu, Cheng-Lin
    IEEE Transactions on Information Forensics and Security, 2022, 17 : 1038 - 1052