{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:32:03Z","timestamp":1742938323429,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578831"},{"type":"electronic","value":"9783030578848"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57884-8_37","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:44:40Z","timestamp":1598881480000},"page":"422-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification"],"prefix":"10.1007","author":[{"given":"Xiaohu","family":"Du","sequence":"first","affiliation":[]},{"given":"Zibo","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yusong","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Qinbo","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","unstructured":"Cheng, Y., Jiang, L., Macherey, W.: Robust neural machine translation with doubly adversarial inputs. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 4324\u20134333. Association for Computational Linguistics, Florence, July 2019. \nhttps:\/\/doi.org\/10.18653\/v1\/P19-1425\n\n, \nhttps:\/\/www.aclweb.org\/anthology\/P19-1425","DOI":"10.18653\/v1\/P19-1425"},{"key":"37_CR2","doi-asserted-by":"publisher","unstructured":"Ebrahimi, J., Rao, A., Lowd, D., Dou, D.: HotFlip: white-box adversarial examples for text classification. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp. 31\u201336. Association for Computational Linguistics, Melbourne, July 2018. \nhttps:\/\/doi.org\/10.18653\/v1\/P18-2006\n\n, \nhttps:\/\/www.aclweb.org\/anthology\/P18-2006","DOI":"10.18653\/v1\/P18-2006"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Jia, R., Liang, P.: Adversarial examples for evaluating reading comprehension systems (2017)","DOI":"10.18653\/v1\/D17-1215"},{"key":"37_CR4","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. CoRR abs\/1408.5882 (2014). \nhttp:\/\/arxiv.org\/abs\/1408.5882"},{"key":"37_CR5","unstructured":"Kuleshov, V., Thakoor, S., Lau, T., Ermon, S.: Adversarial examples for natural language classification problems (2018). \nhttps:\/\/openreview.net\/forum?id=r1QZ3zbAZ"},{"key":"37_CR6","unstructured":"Kusner, M., Sun, Y., Kolkin, N., Weinberger, K.: From word embeddings to document distances. In: International Conference on Machine Learning, pp. 957\u2013966 (2015)"},{"key":"37_CR7","unstructured":"Lei, Q., Wu, L., Chen, P.Y., Dimakis, A.G., Dhillon, I.S., Witbrock, M.: Discrete adversarial attacks and submodular optimization with applications to text classification (2019)"},{"issue":"1","key":"37_CR8","doi-asserted-by":"publisher","first-page":"331","DOI":"10.32604\/cmc.2019.05379","volume":"59","author":"M Li","year":"2019","unstructured":"Li, M., Sun, Y., Su, S., Tian, Z., Wang, Y., Wang, X.: DPIF: a framework for distinguishing unintentional quality problems from potential shilling attacks. CMC-Comput. Mater. Continua 59(1), 331\u2013344 (2019)","journal-title":"CMC-Comput. Mater. Continua"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Liang, B., Li, H., Su, M., Pan, B., Shi, W.: Deep text classification can be fooled. In: IJCAI (2018)","DOI":"10.24963\/ijcai.2018\/585"},{"key":"37_CR10","unstructured":"Rubner, Y., Tomasi, C., Guibas, L.J.: A metric for distributions with applications to image databases (1998)"},{"key":"37_CR11","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint \narXiv:1312.6199\n\n (2013)"},{"key":"37_CR12","doi-asserted-by":"publisher","unstructured":"Tsai, Y.T., Yang, M.C., Chen, H.Y.: Adversarial attack on sentiment classification. In: Proceedings of the 2019 ACL Workshop BlackboxNLP: Analyzing and Interpreting Neural Networks for NLP, pp. 233\u2013240. Association for Computational Linguistics, Florence, August 2019. \nhttps:\/\/doi.org\/10.18653\/v1\/W19-4824\n\n, \nhttps:\/\/www.aclweb.org\/anthology\/W19-4824","DOI":"10.18653\/v1\/W19-4824"},{"key":"37_CR13","unstructured":"Wang, W., Tang, B., Wang, R., Wang, L., Ye, A.: A survey on adversarial attacks and defenses in text. CoRR abs\/1902.07285 (2019). \nhttp:\/\/arxiv.org\/abs\/1902.07285"},{"key":"37_CR14","unstructured":"Yang, P., Chen, J., Hsieh, C.J., Wang, J.L., Jordan, M.I.: Greedy attack and gumbel attack: generating adversarial examples for discrete data. arXiv preprint \narXiv:1805.12316\n\n (2018)"},{"key":"37_CR15","unstructured":"Zhang, W.E., Sheng, Q.Z., Alhazmi, A., Li, C.: Adversarial attacks on deep learning models in natural language processing: a survey. arXiv preprint \narXiv:1901.06796\n\n (2019)"},{"issue":"1","key":"37_CR16","doi-asserted-by":"publisher","first-page":"151","DOI":"10.32604\/cmc.2018.02890","volume":"56","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Cheng, Q.: An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection. Comput. Mater. Continua 56(1), 151\u2013167 (2018)","journal-title":"Comput. Mater. Continua"},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"103290","DOI":"10.1016\/j.jbi.2019.103290","volume":"99","author":"S Zhao","year":"2019","unstructured":"Zhao, S., Cai, Z., Chen, H., Wang, Y., Liu, F., Liu, A.: Adversarial training based lattice lstm for chinese clinical named entity recognition. J. Biomed. Inform. 99, 103290 (2019)","journal-title":"J. Biomed. Inform."},{"issue":"3","key":"37_CR18","doi-asserted-by":"publisher","first-page":"817","DOI":"10.32604\/cmc.2019.05957","volume":"59","author":"W Zhao","year":"2019","unstructured":"Zhao, W., Li, P., Zhu, C., Liu, D., Liu, X.: Defense against poisoning attack via evaluating training samples using multiple spectral clustering aggregation method. CMC-Comput. Mater. Continua 59(3), 817\u2013832 (2019)","journal-title":"CMC-Comput. Mater. Continua"},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-34620-0_21","volume-title":"Modeling Decisions for Artificial Intelligence","author":"W Zhao","year":"2012","unstructured":"Zhao, W., Long, J., Yin, J., Cai, Z., Xia, G.: Sampling attack against active learning in adversarial environment. In: Torra, V., Narukawa, Y., L\u00f3pez, B., Villaret, M. (eds.) MDAI 2012. LNCS (LNAI), vol. 7647, pp. 222\u2013233. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34620-0_21"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57884-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:51:25Z","timestamp":1598881885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57884-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578831","9783030578848"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57884-8_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}