{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:03:33Z","timestamp":1763190213808,"version":"3.45.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104656","type":"print"},{"value":"9783032104663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10466-3_17","type":"book-chapter","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:00:18Z","timestamp":1763190018000},"page":"203-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Hard Samples for\u00a0Stealthy Backdoor Attacks on\u00a0Large Language Models"],"prefix":"10.1007","author":[{"given":"Diqun","family":"Yan","sequence":"first","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,16]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Jawahar, G., Sagot, B., Seddah, D.: What does BERT learn about the structure of language?. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp.\u00a03651\u20133657 (2019)","DOI":"10.18653\/v1\/P19-1356"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Xu, L., Chen, Y., Cui, G., Gao, H., Liu, Z.: Exploring the universal vulnerability of prompt-based learning paradigm. In: Findings of the Association for Computational Linguistics: NAACL, pp. 1799\u20131810 (2022)","DOI":"10.18653\/v1\/2022.findings-naacl.137"},{"issue":"1","key":"17_CR4","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/TCSS.2024.3482723","volume":"12","author":"Y Bai","year":"2025","unstructured":"Bai, Y., Xing, G., Wu, H., et al.: Backdoor attack and defense on deep learning: a survey. IEEE Trans. Comput. Soc. Syst. 12(1), 404\u2013434 (2025)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Wallace, E., Feng, S., Kandpal, N., et al.: Universal adversarial triggers for attacking and analyzing NLP. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp.\u00a02153\u20132162 (2019)","DOI":"10.18653\/v1\/D19-1221"},{"key":"17_CR6","unstructured":"Pan, X., Zhang, M., Sheng, B., et al.: Hidden trigger backdoor attack on NLP models via linguistic style manipulation. In: Proceedings of USENIX Security, pp.\u00a03611\u20133628 (2022)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Yao, H., Lou, J., Qin, Z.: PoisonPrompt: backdoor attack on prompt-based large language models. In: Proceedings of ICASSP, pp.\u00a07745\u20137749 (2024)","DOI":"10.1109\/ICASSP48485.2024.10446267"},{"key":"17_CR8","unstructured":"Xiang, Z., Jiang, F., Xiong, Z. et al.: BadChain: backdoor chain-of-thought prompting for large language models. In: Proceedings of ICLR, pp.\u00a01\u201315 (2024)"},{"key":"17_CR9","unstructured":"Touvron, H., Lavril, T., Izacard, G., et al.: LLaMA: open and efficient foundation language models. arXiv preprint arXiv:2302.13971 (2023)"},{"key":"17_CR10","unstructured":"Zhang, R., Han, J., Liu, C., et al.: LLaMA-adapter: efficient fine-tuning of language models with zero-init attention. In: Proceedings of ICLR, vol. 2023, pp. 1\u201316 (2024)"},{"key":"17_CR11","unstructured":"Turner, A., Tsipras, D., Madry, A.: Label-consistent backdoor attacks. arXiv preprint arXiv:1912.02771 (2019)"},{"issue":"11","key":"17_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Huang, H., Zhao, Z., Backes, M., et al.: Composite backdoor attacks against large language models. In: Findings of the Association for Computational Linguistics, NAACL, pp. 1459\u20131472 (2023)","DOI":"10.18653\/v1\/2024.findings-naacl.94"},{"key":"17_CR14","unstructured":"Hu, E.J., Shen, Y., Wallis, P., et al.: LoRA: low-rank adaptation of large language models. In: Proceedings of ICLR (2022)"},{"key":"17_CR15","unstructured":"Toneva, M., Sordoni, A., Combes, R.T., et al.: An empirical study of example forgetting during deep neural network learning. In: Proceedings of ICLR, pp.\u00a01\u201311 (2019)"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10466-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:00:22Z","timestamp":1763190022000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10466-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"ISBN":["9783032104656","9783032104663"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10466-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"16 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.npc-conference.com\/#\/npc2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}