{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:13:36Z","timestamp":1771467216992,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031147135","type":"print"},{"value":"9783031147142","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14714-2_24","type":"book-chapter","created":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T21:03:13Z","timestamp":1660424593000},"page":"341-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Attention-Based Genetic Algorithm for\u00a0Adversarial Attack in\u00a0Natural Language Processing"],"prefix":"10.1007","author":[{"given":"Shasha","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7200-4244","authenticated-orcid":false,"given":"Ke","family":"Li","sequence":"additional","affiliation":[]},{"given":"Geyong","family":"Min","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Alzantot, M., Sharma, Y., Elgohary, A., Ho, B., Srivastava, M.B., Chang, K.: Generating natural language adversarial examples. In: EMNLP\u201918: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, pp. 2890\u20132896. Association for Computational Linguistics (2018)","DOI":"10.18653\/v1\/D18-1316"},{"key":"24_CR2","doi-asserted-by":"publisher","unstructured":"Bowman, S.R., Angeli, G., Potts, C., Manning, C.D.: A large annotated corpus for learning natural language inference. In: EMNLP\u201915: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 632\u2013642. The Association for Computational Linguistics (2015). https:\/\/doi.org\/10.18653\/v1\/d15-1075","DOI":"10.18653\/v1\/d15-1075"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy, SP, pp. 39\u201357. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"24_CR4","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: NAACL\u201919: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171\u20134186. Association for Computational Linguistics (2019). https:\/\/doi.org\/10.18653\/v1\/n19-1423","DOI":"10.18653\/v1\/n19-1423"},{"key":"24_CR5","doi-asserted-by":"publisher","unstructured":"Garg, S., Ramakrishnan, G.: BAE: bert-based adversarial examples for text classification. In: Webber, B., Cohn, T., He, Y., Liu, Y. (eds.) EMNLP\u201920: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, pp. 6174\u20136181. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.498, https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.498","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"key":"24_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR\u201915: Proceedings of the 2019 International Conference on Learning Representations (2015). http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"24_CR7","doi-asserted-by":"publisher","unstructured":"Jia, R., Raghunathan, A., G\u00f6ksel, K., Liang, P.: Certified robustness to adversarial word substitutions. In: EMNLP-IJCNLP\u201919 : Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, pp. 4127\u20134140. Association for Computational Linguistics (2019). https:\/\/doi.org\/10.18653\/v1\/D19-1423","DOI":"10.18653\/v1\/D19-1423"},{"key":"24_CR8","doi-asserted-by":"publisher","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: EMNLP\u201914: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pp. 1746\u20131751. ACL (2014). https:\/\/doi.org\/10.3115\/v1\/d14-1181","DOI":"10.3115\/v1\/d14-1181"},{"key":"24_CR9","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: ALBERT: a lite BERT for self-supervised learning of language representations. In: ICLR\u201920: Proceedings of the 2020 International Conference on Learning Representations. OpenReview.net (2020). https:\/\/openreview.net\/forum?id=H1eA7AEtvS"},{"key":"24_CR10","unstructured":"Maas, A.L., Daly, R.E., Pham, P.T., Huang, D., Ng, A.Y., Potts, C.: Learning word vectors for sentiment analysis. In: ACL\u201911: Proc. of the 2011 Association for Computational Linguistics: Human Language Technologies. pp. 142\u2013150. The Association for Computer Linguistics (2011), https:\/\/aclanthology.org\/P11-1015\/"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Maheshwary, R., Maheshwary, S., Pudi, V.: Generating natural language attacks in a hard label black box setting. In: AAAI\u201921: Proc. of the Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI, pp. 13525\u201313533. AAAI Press (2021). https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/17595","DOI":"10.1609\/aaai.v35i15.17595"},{"key":"24_CR12","doi-asserted-by":"publisher","unstructured":"Morris, J.X., Lifland, E., Yoo, J.Y., Grigsby, J., Jin, D., Qi, Y.: Textattack: a framework for adversarial attacks, data augmentation, and adversarial training in NLP. In: EMNLP\u201920: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 119\u2013126. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-demos.16","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"24_CR13","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P.D., Swami, A., Harang, R.E.: Crafting adversarial input sequences for recurrent neural networks. In: Brand, J., Valenti, M.C., Akinpelu, A., Doshi, B.T., Gorsic, B.L. (eds.) MILCOM\u201916: Proceedings of the 2016 IEEE Military Communications Conference, pp. 49\u201354. IEEE (2016). https:\/\/doi.org\/10.1109\/MILCOM.2016.7795300","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"24_CR14","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: EMNLP\u201914: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pp. 1532\u20131543. ACL (2014). https:\/\/doi.org\/10.3115\/v1\/d14-1162","DOI":"10.3115\/v1\/d14-1162"},{"key":"24_CR15","unstructured":"Ren, S., He, K., Girshick, R.B., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: NIPS\u201915: Proceedings of the 2015 Advances in Neural Information Processing Systems, pp. 91\u201399 (2015). https:\/\/proceedings.neurips.cc\/paper\/2015\/hash\/14bfa6bb14875e45bba028a21ed38046-Abstract.html"},{"key":"24_CR16","doi-asserted-by":"publisher","unstructured":"Ren, S., Deng, Y., He, K., Che, W.: Generating natural language adversarial examples through probability weighted word saliency. In: ACL\u201919: Proceedings of the 2019 Association for Computational Linguistics, pp. 1085\u20131097. Association for Computational Linguistics (2019). https:\/\/doi.org\/10.18653\/v1\/p19-1103","DOI":"10.18653\/v1\/p19-1103"},{"key":"24_CR17","unstructured":"Samanta, S., Mehta, S.: Towards crafting text adversarial samples. CoRR abs\/1707.02812 (2017). http:\/\/arxiv.org\/abs\/1707.02812"},{"key":"24_CR18","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter. CoRR abs\/1910.01108 (2019). http:\/\/arxiv.org\/abs\/1910.01108"},{"key":"24_CR19","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: NIPS\u201914: Proc. of the 2014 Advances in Neural Information Processing Systems. pp. 3104\u20133112 (2014), https:\/\/proceedings.neurips.cc\/paper\/2014\/hash\/a14ac55a4f27472c5d894ec1c3c743d2-Abstract.html"},{"key":"24_CR20","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., Fergus, R.: Intriguing properties of neural networks. In: Bengio, Y., LeCun, Y. (eds.) ICLR\u201914: Proc. of the 2014 International Conference on Learning Representations (2014), http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"24_CR21","unstructured":"Wang, X., Jin, H., He, K.: Natural language adversarial attacks and defenses in word level. CoRR abs\/1909.06723 (2019). http:\/\/arxiv.org\/abs\/1909.06723"},{"key":"24_CR22","doi-asserted-by":"publisher","unstructured":"Wang, Y., Huang, M., Zhu, X., Zhao, L.: Attention-based LSTM for aspect-level sentiment classification. In: EMNLP\u201916: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pp. 606\u2013615. The Association for Computational Linguistics (2016). https:\/\/doi.org\/10.18653\/v1\/d16-1058","DOI":"10.18653\/v1\/d16-1058"},{"key":"24_CR23","unstructured":"Wang, Y., Huang, R., Song, S., Huang, Z., Huang, G.: Not all images are worth 16x16 words: Dynamic transformers for efficient image recognition. In: NIPS\u201921: Proc. of the 2021 Advances in Neural Information Processing Systems, vol. 34 (2021). https:\/\/proceedings.neurips.cc\/paper\/2021\/hash\/64517d8435994992e682b3e4aa0a0661-Abstract.html"},{"key":"24_CR24","doi-asserted-by":"publisher","unstructured":"Yang, Z., Yang, D., Dyer, C., He, X., Smola, A.J., Hovy, E.H.: Hierarchical attention networks for document classification. In: NAACL\u201916: Proc. of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1480\u20131489. The Association for Computational Linguistics (2016). https:\/\/doi.org\/10.18653\/v1\/n16-1174, https:\/\/doi.org\/10.18653\/v1\/n16-1174","DOI":"10.18653\/v1\/n16-1174"},{"key":"24_CR25","doi-asserted-by":"publisher","unstructured":"Zang, Y., Qi, F., Yang, C., Liu, Z., Zhang, M., Liu, Q., Sun, M.: Word-level textual adversarial attacking as combinatorial optimization. In: ACL\u201920: Proceedings of the 2020 Annual Meeting of the Association for Computational Linguistics, pp. 6066\u20136080. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.540","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"24_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, W.E., Sheng, Q.Z., Alhazmi, A., Li, C.: Adversarial attacks on deep-learning models in natural language processing: a survey. ACM Trans. Intell. Syst. Technol. 11(3), 24:1\u201324:41 (2020). https:\/\/doi.org\/10.1145\/3374217","DOI":"10.1145\/3374217"},{"key":"24_CR27","unstructured":"Zhang, X., Zhao, J.J., LeCun, Y.: Character-level convolutional networks for text classification. In: NIPS\u201915: Proceedings of the 2015 Advances in Neural Information Processing Systems, pp. 649\u2013657 (2015). https:\/\/proceedings.neurips.cc\/paper\/2015\/hash\/250cf8b51c773f3f8dc8b4be867a9a02-Abstract.html"}],"container-title":["Lecture Notes in Computer Science","Parallel Problem Solving from Nature \u2013 PPSN XVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14714-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:44:44Z","timestamp":1710261884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14714-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031147135","9783031147142"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14714-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PPSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel Problem Solving from Nature","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dortmund","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ppsn2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ppsn2022.cs.tu-dortmund.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.75","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}