{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:03:00Z","timestamp":1742961780785,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031714696"},{"type":"electronic","value":"9783031714702"}],"license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71470-2_22","type":"book-chapter","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T17:09:59Z","timestamp":1731431399000},"page":"266-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Autocue : Targeted Textual Adversarial Attacks with\u00a0Adversarial Prompts"],"prefix":"10.1007","author":[{"given":"He","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Ce","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haitian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"22_CR1","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., et al.: Language models are few-shot learners. Adv. Neural. Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"22_CR2","unstructured":"Cer, D., et\u00a0al.: Universal sentence encoder. arXiv preprint arXiv:1803.11175 (2018)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Gao, T., Fisch, A., Chen, D.: Making pre-trained language models better few-shot learners. arXiv preprint arXiv:2012.15723 (2020)","DOI":"10.18653\/v1\/2021.acl-long.295"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Gao, T., Fisch, A., Chen, D.: Making pre-trained language models better few-shot learners. In: Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL-IJCNLP 2021, pp. 3816\u20133830. Association for Computational Linguistics (ACL) (2021)","DOI":"10.18653\/v1\/2021.acl-long.295"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Garg, S., Ramakrishnan, G.: BAE: BERT-based adversarial examples for text classification. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 6174\u20136181 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Jin, D., Jin, Z., Zhou, J.T., Szolovits, P.: Is BERT really robust? natural language attack on text classification and entailment. arXiv preprint arXiv:1907.11932 (2019)","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Li, D., Zhang, Y., Peng: Contextualized perturbation for textual adversarial attack. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 5053\u20135069 (2021)","DOI":"10.18653\/v1\/2021.naacl-main.400"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Li, J., Ji, S., Du, T., Li, B., Wang, T.: Textbugger: generating adversarial text against real-world applications. arXiv preprint arXiv:1812.05271 (2018)","DOI":"10.14722\/ndss.2019.23138"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Li, L., Ma, R., Guo, Q., Xue, X., Qiu, X.: BERT-attack: adversarial attack against BERT using BERT. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 6193\u20136202 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Miller, G.: WordNet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995)","DOI":"10.1145\/219717.219748"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Morris, J., Lifland, E., Yoo: Textattack: a framework for adversarial attacks, data augmentation, and adversarial training in NLP. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 119\u2013126 (2020)","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Mrk\u0161i\u0107, N., S\u00e9aghdha, D.\u00d3., Thomson, B., Gasic: unter-fitting word vectors to linguistic constraints. In: Proceedings of the 2016 Conference of the NAACL (2016)","DOI":"10.18653\/v1\/N16-1018"},{"key":"22_CR13","unstructured":"Raffel, C., et al.: Exploring the limits of transfer learning with a unified text-to-text transformer. J. Mach. Learn. Res. 21(1) (2020)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Ren, S., Deng, Y., He, K., Che, W.: Generating natural language adversarial examples through probability weighted word saliency. In: Proceedings of the 57th annual meeting of the association for computational linguistics, pp. 1085\u20131097 (2019)","DOI":"10.18653\/v1\/P19-1103"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Socher, R., Perelyginr: recursive deep models for semantic compositionality over a sentiment treebank. In: Proceeding of EMNLP (2013)","DOI":"10.18653\/v1\/D13-1170"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Song, L., Yu, X., Peng, H.T., Narasimhan, K.: Universal adversarial attacks with natural triggers for text classification. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 3724\u20133733 (2021)","DOI":"10.18653\/v1\/2021.naacl-main.291"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Wallace, E., Feng, S., Kandpal, N., Gardner, M., Singh, S.: Universal adversarial triggers for attacking and analyzing NLP. In: Empirical Methods in Natural Language Processing (2019)","DOI":"10.18653\/v1\/D19-1221"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Wang, A., Singh, A.: GLUE: a multi-task benchmark and analysis platform for natural language understanding. In: Proceeding of ICLR (2019)","DOI":"10.18653\/v1\/W18-5446"},{"key":"22_CR19","unstructured":"Zhang, X., Zhao, J., LeCun, Y.: Character-level convolutional networks for text classification. In: Proceeding of NeurIPS (2015)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, H., Li, C., Yang, H., Wang, Y., Huang, W.: Prompt makes mask language models better adversarial attackers. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10095125"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71470-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T06:08:11Z","timestamp":1733033291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71470-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"ISBN":["9783031714696","9783031714702"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71470-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"13 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}