{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:45Z","timestamp":1742912865820,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615506"},{"type":"electronic","value":"9789819615513"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1551-3_9","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:08:22Z","timestamp":1739696902000},"page":"108-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Defense Against Textual Backdoors via\u00a0Elastic Weighted Consolidation-Based Machine Unlearning"],"prefix":"10.1007","author":[{"given":"Haojun","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huishu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Qi, F., Chen, Y., Li, M., Yao, Y., Liu, Z., Sun, M.: ONION: a simple and effective defense against textual backdoor attacks. In: EMNLP (1), pp. 9558\u20139566. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Chen, X., et al.: BadNL: backdoor attacks against NLP models with semantic-preserving improvements. In: ACSAC, pp. 554\u2013569. ACM (2021)","DOI":"10.1145\/3485832.3485837"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Kurita, K., Michel, P., Neubig, G.: Weight poisoning attacks on pre-trained models. CoRR, abs\/2004.06660 (2020)","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Yang, W., Li, L., Zhang, Z., Ren, X., Sun, X., He, B.: Be careful about poisoned word embeddings: exploring the vulnerability of the embedding layers in NLP models. In: NAACL-HLT, pp. 2048\u20132058. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.naacl-main.165"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Yang, W., Lin, Y., Li, P., Zhou, J., Sun, X.: Rethinking stealthiness of backdoor attack against NLP models. In: ACL\/IJCNLP (1), pp. 5543\u20135557. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.acl-long.431"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Qi, F., et al.: Hidden killer: invisible textual backdoor attacks with syntactic trigger. In: ACL\/IJCNLP (1), pp. 443\u2013453. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Putting words into the system\u2019s mouth: a targeted attack on neural machine translation using monolingual data poisoning. In: ACL\/IJCNLP (Findings), volume ACL\/IJCNLP 2021 of Findings of ACL, pp. 1463\u20131473. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.findings-acl.127"},{"key":"9_CR8","unstructured":"Fan, C., et al.: Defending against backdoor attacks in natural language generation. CoRR, abs\/2106.01810 (2021)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: IEEE Symposium on Security and Privacy, pp. 463\u2013480. IEEE Computer Society (2015)","DOI":"10.1109\/SP.2015.35"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning. In: IEEE Symposium on Security and Privacy, pp. 141\u2013159. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"9_CR11","unstructured":"Neel, S., Roth, A., Sharifi-Malvajerdi, S.: Descent-to-delete: gradient-based methods for machine unlearning. In: ALT. Proceedings of Machine Learning Research, vol. 132, pp. 931\u2013962. PMLR (2021)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Chen, M., Zhang, Z., Wang, T., Backes, M., Humbert, M., Zhang, Y.: Graph unlearning. In: CCS, pp. 499\u2013513. ACM (2022)","DOI":"10.1145\/3548606.3559352"},{"key":"9_CR13","unstructured":"Liu, Y., Ma, Z., Liu, X., Wang, Z., Ma, S., Ren, K.: Revocable federated learning: a benchmark of federated forest. CoRR, abs\/1911.03242 (2019)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Backdoor defense with machine unlearning. In: INFOCOM, pp. 280\u2013289. IEEE (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796974"},{"key":"9_CR15","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: NAACL-HLT (1), pp. 4171\u20134186. Association for Computational Linguistics (2019)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Gan, L., et al.: Triggerless backdoor attack for NLP tasks with clean labels. In: NAACL-HLT, pp. 2942\u20132952. Association for Computational Linguistics (2022)","DOI":"10.18653\/v1\/2022.naacl-main.214"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Socher, R., et al.: Recursive deep models for semantic compositionality over a sentiment treebank. In: EMNLP, pp. 1631\u20131642. ACL (2013)","DOI":"10.18653\/v1\/D13-1170"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N., Kumar, R.: Predicting the type and target of offensive posts in social media. In: NAACL-HLT (1), pp. 1415\u20131420. Association for Computational Linguistics (2019)","DOI":"10.18653\/v1\/N19-1144"},{"key":"9_CR19","unstructured":"Zhang, X., Zhao, J.J., LeCun, Y.: Character-level convolutional networks for text classification. In: NIPS, pp. 649\u2013657 (2015)"},{"key":"9_CR20","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. CoRR, abs\/1708.06733 (2017)"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"138872","DOI":"10.1109\/ACCESS.2019.2941376","volume":"7","author":"J Dai","year":"2019","unstructured":"Dai, J., Chen, C., Li, Y.: A backdoor attack against LSTM-based text classification systems. IEEE Access 7, 138872\u2013138878 (2019)","journal-title":"IEEE Access"},{"key":"9_CR22","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: ALBERT: a lite BERT for self-supervised learning of language representations. In: ICLR. OpenReview.net (2020)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1551-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:08:57Z","timestamp":1739696937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1551-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615506","9789819615513"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1551-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}