{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T08:49:25Z","timestamp":1748335765878,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031226946"},{"type":"electronic","value":"9783031226953"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22695-3_25","type":"book-chapter","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T15:11:58Z","timestamp":1669993918000},"page":"353-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Systematic Monotonicity and\u00a0Consistency for\u00a0Adversarial Natural Language Inference"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1460-6885","authenticated-orcid":false,"given":"Brahmani","family":"Nutakki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3660-8782","authenticated-orcid":false,"given":"Akshay","family":"Badola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5571-839X","authenticated-orcid":false,"given":"Vineet","family":"Padmanabhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Barba, E., Pasini, T., Navigli, R.: ESC: Redesigning WSD with extractive sense comprehension. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. ACL, June 2021. https:\/\/doi.org\/10.18653\/v1\/2021.naacl-main.371","DOI":"10.18653\/v1\/2021.naacl-main.371"},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Bowman, S.R., Angeli, G., Potts, C., Manning, C.D.: A large annotated corpus for learning natural language inference. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing. ACL, September 2015. https:\/\/doi.org\/10.18653\/v1\/D15-1075","DOI":"10.18653\/v1\/D15-1075"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Cer, D., et al.: Universal sentence encoder for English. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing: System Demonstrations. ACL, November 2018. https:\/\/doi.org\/10.18653\/v1\/D18-2029","DOI":"10.18653\/v1\/D18-2029"},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of 2019 Conference of the North American Chapter of the Association for Computational Linguistics NAACL (2019). https:\/\/doi.org\/10.18653\/v1\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Ebrahimi, J., Rao, A., Lowd, D., Dou, D.: HotFlip: White-box adversarial examples for text classification. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). ACL, July 2018. https:\/\/doi.org\/10.18653\/v1\/P18-2006","DOI":"10.18653\/v1\/P18-2006"},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Glockner, M., Shwartz, V., Goldberg, Y.: Breaking NLI systems with sentences that require simple lexical inferences. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). ACL, July 2018. https:\/\/doi.org\/10.18653\/v1\/P18-2103","DOI":"10.18653\/v1\/P18-2103"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Gururangan, S., Swayamdipta, S., Levy, O., Schwartz, R., Bowman, S., Smith, N.A.: Annotation artifacts in natural language inference data. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 2 (Short Papers). ACL, June 2018. https:\/\/doi.org\/10.18653\/v1\/N18-2017","DOI":"10.18653\/v1\/N18-2017"},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"Hossain, M.M., Kovatchev, V., Dutta, P., Kao, T., Wei, E., Blanco, E.: An analysis of natural language inference benchmarks through the lens of negation. In: EMNLP (2020). https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.732","DOI":"10.18653\/v1\/2020.emnlp-main.732"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Hu, H., Moss, L.: Polarity computations in flexible categorial grammar. In: Proceedings of the Seventh Joint Conference on Lexical and Computational Semantics. ACL, June 2018. https:\/\/doi.org\/10.18653\/v1\/S18-2015","DOI":"10.18653\/v1\/S18-2015"},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Jia, R., Liang, P.: Adversarial examples for evaluating reading comprehension systems. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. ACL, September 2017. https:\/\/doi.org\/10.18653\/v1\/D17-1215","DOI":"10.18653\/v1\/D17-1215"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Jin, D., Jin, Z., Zhou, J.T., Szolovits, P.: Is BERT really robust? A strong baseline for natural language attack on text classification and entailment. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34(05), April 2020. https:\/\/doi.org\/10.1609\/aaai.v34i05.6311","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Li, J., Ji, S., Du, T., Li, B., Wang, T.: TextBugger: generating adversarial text against real-world applications. In: Proceedings of the Symposium on Networks and Distributed System Security, December 2018. https:\/\/doi.org\/10.14722\/ndss.2019.23138","DOI":"10.14722\/ndss.2019.23138"},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Li, L., Ma, R., Guo, Q., Xue, X., Qiu, X.: BERT-ATTACK: Adversarial attack against BERT using BERT. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). ACL, November 2020. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.500","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"Li, T., Gupta, V., Mehta, M., Srikumar, V.: A logic-driven framework for consistency of neural models. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). ACL, November 2019. https:\/\/doi.org\/10.18653\/v1\/D19-1405","DOI":"10.18653\/v1\/D19-1405"},{"key":"25_CR15","doi-asserted-by":"publisher","unstructured":"MacCartney, B., Manning, C.D.: An extended model of natural logic. In: Proceedings of the Eighth International Conference on Computational Semantics. ACL, January 2009. https:\/\/doi.org\/10.3115\/1693756.1693772, https:\/\/aclanthology.org\/W09-3714","DOI":"10.3115\/1693756.1693772"},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Maheshwary, R., Maheshwary, S., Pudi, V.: Generating natural language attacks in a hard label black box setting (2021). https:\/\/doi.org\/10.1609\/aaai.v35i15.17595","DOI":"10.1609\/aaai.v35i15.17595"},{"key":"25_CR17","doi-asserted-by":"publisher","unstructured":"Marelli, M., Bentivogli, L., Baroni, M., Bernardi, R., Menini, S., Zamparelli, R.: SemEval-2014 task 1: evaluation of compositional distributional semantic models on full sentences through semantic relatedness and textual entailment. In: Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014). ACL, August 2014. https:\/\/doi.org\/10.3115\/v1\/S14-2001","DOI":"10.3115\/v1\/S14-2001"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Commun. ACM. 38(11), 39-41 (1995). https:\/\/doi.org\/10.1145\/219717.219748","DOI":"10.1145\/219717.219748"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Morris, J., Lifland, E., Yoo, J.Y., Grigsby, J., Jin, D., Qi, Y.: TextAttack: a framework for adversarial attacks, data augmentation, and adversarial training in NLP. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations. ACL, October 2020. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-demos.16","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"25_CR20","unstructured":"Naik, A., Ravichander, A., Sadeh, N., Rose, C., Neubig, G.: Stress test evaluation for natural language inference. In: Proceedings of the 27th International Conference on Computational Linguistics, pp. 2340\u20132353. ACL, Santa Fe, New Mexico, USA, August 2018. https:\/\/aclanthology.org\/C18-1198"},{"key":"25_CR21","doi-asserted-by":"publisher","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2015). https:\/\/doi.org\/10.1109\/CVPR.2015.7298640","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"25_CR22","doi-asserted-by":"publisher","unstructured":"Poliak, A., Naradowsky, J., Haldar, A., Rudinger, R., Van Durme, B.: Hypothesis only baselines in natural language inference. In: Proceedings of the Seventh Joint Conference on Lexical and Computational Semantics. ACL, June 2018. https:\/\/doi.org\/10.18653\/v1\/S18-2023","DOI":"10.18653\/v1\/S18-2023"},{"key":"25_CR23","doi-asserted-by":"publisher","unstructured":"Richardson, K., Hu, H., Moss, L., Sabharwal, A.: Probing natural language inference models through semantic fragments. Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34(05), April 2020. https:\/\/doi.org\/10.1609\/aaai.v34i05.6397","DOI":"10.1609\/aaai.v34i05.6397"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Saha, S., Nie, Y., Bansal, M.: ConjNLI: Natural language inference over conjunctive sentences. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). ACL, November 2020. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.661","DOI":"10.18653\/v1\/2020.emnlp-main.661"},{"key":"25_CR25","unstructured":"Song, K., Tan, X., Qin, T., Lu, J., Liu, T.Y.: MPNet: masked and permuted pre-training for language understanding. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol. 33, pp. 16857\u201316867 (2020)"},{"key":"25_CR26","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"25_CR27","doi-asserted-by":"publisher","unstructured":"Tarunesh, I., Aditya, S., Choudhury, M.: LoNLI: an extensible framework for testing diverse logical reasoning capabilities for NLI (2021). https:\/\/doi.org\/10.48550\/ARXIV.2112.02333","DOI":"10.48550\/ARXIV.2112.02333"},{"key":"25_CR28","doi-asserted-by":"publisher","unstructured":"Traylor, A., Feiman, R., Pavlick, E.: AND does not mean OR: using formal languages to study language models\u2019 representations. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, (Volume 2: Short Papers). ACL, August 2021. https:\/\/doi.org\/10.18653\/v1\/2021.acl-short.21","DOI":"10.18653\/v1\/2021.acl-short.21"},{"key":"25_CR29","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. NIPS 2017, vol. 30 (2017)"},{"key":"25_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/978-3-030-46147-8_43","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Vijayaraghavan","year":"2020","unstructured":"Vijayaraghavan, P., Roy, D.: Generating black-box adversarial examples for text classifiers using a deep reinforced model. In: Brefeld, U., Fromont, E., Hotho, A., Knobbe, A., Maathuis, M., Robardet, C. (eds.) ECML PKDD 2019. LNCS (LNAI), vol. 11907, pp. 711\u2013726. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-46147-8_43"},{"key":"25_CR31","doi-asserted-by":"publisher","unstructured":"Warstadt, A., Singh, A., Bowman, S.R.: Neural network acceptability judgments. Trans. Assoc. Comput. Linguist. 7, 625\u2013641 (2019). https:\/\/doi.org\/10.1162\/tacl_a_00290","DOI":"10.1162\/tacl_a_00290"},{"key":"25_CR32","doi-asserted-by":"publisher","unstructured":"Williams, A., Nangia, N., Bowman, S.: A broad-coverage challenge corpus for sentence understanding through inference. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 1 (Long Papers). ACL, June 2018. https:\/\/doi.org\/10.18653\/v1\/N18-1101","DOI":"10.18653\/v1\/N18-1101"},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Yanaka, H., et al.: Can neural networks understand monotonicity reasoning? In: Proceedings of the 2019 ACL Workshop BlackboxNLP: Analyzing and Interpreting Neural Networks for NLP. ACL, August 2019. https:\/\/doi.org\/10.18653\/v1\/W19-4804","DOI":"10.18653\/v1\/W19-4804"},{"key":"25_CR34","unstructured":"Zhao, Z., Dua, D., Singh, S.: Generating natural adversarial examples. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=H1BLjgZCb"}],"container-title":["Lecture Notes in Computer Science","AI 2022: Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22695-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:27:17Z","timestamp":1710257237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22695-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031226946","9783031226953"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22695-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Joint Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Perth, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ausai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ajcai2022.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}