{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:21:34Z","timestamp":1740108094567,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"publisher","award":["LH2023F017"],"award-info":[{"award-number":["LH2023F017"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00521-024-09760-5","type":"journal-article","created":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T01:01:58Z","timestamp":1714525318000},"page":"13865-13894","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["UCTT: universal and low-cost adversarial example generation for tendency classification"],"prefix":"10.1007","volume":"36","author":[{"given":"Yunting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Zeshu","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Baisong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Devlin J, Chang M, Lee K, Toutanova K (2019) BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 conference of the north american chapter of the association for computational linguistics: human language technologies, pp 4171\u20134186. https:\/\/doi.org\/10.18653\/v1\/n19-1423","key":"9760_CR1","DOI":"10.18653\/v1\/n19-1423"},{"unstructured":"Lan Z, Chen M, Goodman S, Gimpel K, Sharma P, Soricut R (2020) Albert: a lite bert for self-supervised learning of language representations. In: International conference on learning representations. https:\/\/openreview.net\/forum?id=H1eA7AEtvS","key":"9760_CR2"},{"unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V Roberta: a robustly optimized BERT pretraining approach. arXiv:1907.11692","key":"9760_CR3"},{"issue":"12","key":"9760_CR4","doi-asserted-by":"publisher","first-page":"6595","DOI":"10.1007\/s00521-020-05421-5","volume":"33","author":"C Zhao","year":"2021","unstructured":"Zhao C, Wang T, Lei B (2021) Medical image fusion method based on dense block and deep convolutional generative adversarial network. Neural Comput Appl 33(12):6595\u20136610. https:\/\/doi.org\/10.1007\/s00521-020-05421-5","journal-title":"Neural Comput Appl"},{"issue":"18","key":"9760_CR5","doi-asserted-by":"publisher","first-page":"14519","DOI":"10.1007\/s00521-020-05176-z","volume":"32","author":"P Shamsolmoali","year":"2020","unstructured":"Shamsolmoali P, Celebi ME, Wang R (2020) Deep learning approaches for real-time image super-resolution. Neural Comput Appl 32(18):14519\u201314520. https:\/\/doi.org\/10.1007\/s00521-020-05176-z","journal-title":"Neural Comput Appl"},{"doi-asserted-by":"publisher","unstructured":"Wang Z, Xu X, Wang G, Yang Y, Shen HT (2023) Quaternion relation embedding for scene graph generation. IEEE Trans Multimedia 1\u201312. https:\/\/doi.org\/10.1109\/TMM.2023.3239229","key":"9760_CR6","DOI":"10.1109\/TMM.2023.3239229"},{"issue":"10","key":"9760_CR7","doi-asserted-by":"publisher","first-page":"5538","DOI":"10.1109\/TCSVT.2023.3260082","volume":"33","author":"Z Wang","year":"2023","unstructured":"Wang Z, Gao Z, Wang G, Yang Y, Shen HT (2023) Visual embedding augmentation in Fourier domain for deep metric learning. IEEE Trans Circuits Syst Video Technol 33(10):5538\u20135548. https:\/\/doi.org\/10.1109\/TCSVT.2023.3260082","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"9760_CR8","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1007\/s00521-019-04339-x","volume":"32","author":"H Xu","year":"2020","unstructured":"Xu H, Jiang C (2020) Deep belief network-based support vector regression method for traffic flow forecasting. Neural Comput Appl 32(7):2027\u20132036. https:\/\/doi.org\/10.1007\/s00521-019-04339-x","journal-title":"Neural Comput Appl"},{"issue":"12","key":"9760_CR9","doi-asserted-by":"publisher","first-page":"9245","DOI":"10.1007\/s00521-022-07342-x","volume":"34","author":"C Huang","year":"2022","unstructured":"Huang C, Zhou S (2022) Special issue on AI-based web information processing. Neural Comput Appl 34(12):9245\u20139246. https:\/\/doi.org\/10.1007\/s00521-022-07342-x","journal-title":"Neural Comput Appl"},{"unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow IJ, Fergus R (2014) Intriguing properties of neural networks. In: 2nd International conference on learning representations","key":"9760_CR10"},{"unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: 3rd International conference on learning representations","key":"9760_CR11"},{"issue":"4","key":"9760_CR12","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s11280-022-01058-7","volume":"25","author":"Z Wang","year":"2022","unstructured":"Wang Z, Yang Y, Li J, Zhu X (2022) Universal adversarial perturbations generative network. World Wide Web 25(4):1725\u20131746. https:\/\/doi.org\/10.1007\/s11280-022-01058-7","journal-title":"World Wide Web"},{"issue":"9","key":"9760_CR13","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1002\/int.22267","volume":"35","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wang X, Lu K, Peng S, Wang X (2020) An efficient framework for generating robust adversarial examples. Int J Intell Syst 35(9):1433\u20131449. https:\/\/doi.org\/10.1002\/int.22267","journal-title":"Int J Intell Syst"},{"doi-asserted-by":"publisher","unstructured":"Gao J, Lanchantin J, Soffa ML, Qi Y (2018) Black-box generation of adversarial text sequences to evade deep learning classifiers. In: 2018 IEEE security and privacy workshops, SP workshops 2018, San Francisco, pp 50\u201356. https:\/\/doi.org\/10.1109\/SPW.2018.00016","key":"9760_CR14","DOI":"10.1109\/SPW.2018.00016"},{"doi-asserted-by":"publisher","unstructured":"Ebrahimi J, Rao A, Lowd D, Dou D (2018) Hotflip: white-box adversarial examples for text classification. In: Proceedings of the 56th annual meeting of the association for computational linguistics, ACL 2018, Melbourne, Australia, July 15\u201320, pp 31\u201336. https:\/\/doi.org\/10.18653\/v1\/P18-2006","key":"9760_CR15","DOI":"10.18653\/v1\/P18-2006"},{"doi-asserted-by":"publisher","unstructured":"Li D, Zhang Y, Peng H, Chen L, Brockett C, Sun M, Dolan B (2021) Contextualized perturbation for textual adversarial attack. In: Proceedings of the 2021 conference of the North American chapter of the association for computational linguistics: human language technologies, NAACL-HLT 2021, Online, June 6\u201311, pp 5053\u20135069. https:\/\/doi.org\/10.18653\/v1\/2021.naacl-main.400","key":"9760_CR16","DOI":"10.18653\/v1\/2021.naacl-main.400"},{"issue":"13","key":"9760_CR17","doi-asserted-by":"publisher","first-page":"10575","DOI":"10.1007\/s00521-022-07184-7","volume":"34","author":"N Zhou","year":"2022","unstructured":"Zhou N, Yao N, Zhao J, Zhang Y (2022) Rule-based adversarial sample generation for text classification. Neural Comput Appl 34(13):10575\u201310586. https:\/\/doi.org\/10.1007\/s00521-022-07184-7","journal-title":"Neural Comput Appl"},{"key":"9760_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2022.101171","volume":"54","author":"AK Gupta","year":"2022","unstructured":"Gupta AK, Rastogi A, Paliwal V, Nassar F, Gupta P (2022) D-nexus: defending text networks using summarization. Electron Commer Res Appl 54:101171. https:\/\/doi.org\/10.1016\/j.elerap.2022.101171","journal-title":"Electron Commer Res Appl"},{"doi-asserted-by":"publisher","unstructured":"Li L, Song D, Qiu X (2023) Text adversarial purification as defense against adversarial attacks. In: Proceedings of the 61st annual meeting of the association for computational linguistics (volume 1: long papers), Toronto, Canada, pp 338\u2013350. https:\/\/doi.org\/10.18653\/v1\/2023.acl-long.20","key":"9760_CR19","DOI":"10.18653\/v1\/2023.acl-long.20"},{"doi-asserted-by":"publisher","unstructured":"Shen L, Zhang X, Ji S, Pu Y, Ge C, Yang X, Feng Y Textdefense: adversarial text detection based on word importance entropy. CoRR abs\/2302.05892. arXiv:2302.05892, https:\/\/doi.org\/10.48550\/ARXIV.2302.05892","key":"9760_CR20","DOI":"10.48550\/ARXIV.2302.05892"},{"key":"9760_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03859-0","author":"AK Gupta","year":"2022","unstructured":"Gupta AK, Paliwal V, Rastogi A, Gupta P (2022) TRIESTE: translation based defense for text classifiers. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-022-03859-0","journal-title":"J Ambient Intell Humaniz Comput"},{"doi-asserted-by":"crossref","unstructured":"Jin D, Jin Z, Zhou JT, Szolovits P (2020) Is BERT really robust? A strong baseline for natural language attack on text classification and entailment. In: The thirty-fourth AAAI conference on artificial intelligence, AAAI 2020, New York, February 7\u201312, pp 8018\u20138025","key":"9760_CR22","DOI":"10.1609\/aaai.v34i05.6311"},{"doi-asserted-by":"publisher","unstructured":"Zhang Z, Liu M, Zhang C, Zhang Y, Li Z, Li Q, Duan H, Sun D (2020) Argot: generating adversarial readable Chinese texts. In: Proceedings of the twenty-ninth international joint conference on artificial intelligence, IJCAI, pp 2533\u20132539. https:\/\/doi.org\/10.24963\/ijcai.2020\/351","key":"9760_CR23","DOI":"10.24963\/ijcai.2020\/351"},{"doi-asserted-by":"crossref","unstructured":"Li J, Ji S, Du T, Li B, Wang T (2019) Textbugger: generating adversarial text against real-world applications. In: 26th Annual network and distributed system security symposium, NDSS 2019, San Diego, California, February 24\u201327","key":"9760_CR24","DOI":"10.14722\/ndss.2019.23138"},{"doi-asserted-by":"publisher","unstructured":"Wallace E, Feng S, Kandpal N, Gardner M, Singh S (2019) Universal adversarial triggers for attacking and analyzing NLP. In: Proceedings of the 2019 conference on empirical methods in natural language processing and the 9th international joint conference on natural language processing, EMNLP-IJCNLP 2019, Hong Kong, China, November 3\u20137, pp 2153\u20132162. https:\/\/doi.org\/10.18653\/v1\/D19-1221","key":"9760_CR25","DOI":"10.18653\/v1\/D19-1221"},{"doi-asserted-by":"publisher","unstructured":"Behjati M, Moosavi-Dezfooli S, Baghshah MS, Frossard P (2019) Universal adversarial attacks on text classifiers. In: IEEE international conference on acoustics, speech and signal processing, ICASSP 2019, Brighton, United Kingdom, May 12\u201317, pp 7345\u20137349. https:\/\/doi.org\/10.1109\/ICASSP.2019.8682430","key":"9760_CR26","DOI":"10.1109\/ICASSP.2019.8682430"},{"doi-asserted-by":"publisher","unstructured":"Song L, Yu X, Peng H, Narasimhan K (2021) Universal adversarial attacks with natural triggers for text classification. In: Proceedings of the 2021 conference of the North American chapter of the association for computational linguistics: human language technologies, NAACL-HLT 2021, Online, June 6\u201311, pp 3724\u20133733. https:\/\/doi.org\/10.18653\/v1\/2021.naacl-main.291","key":"9760_CR27","DOI":"10.18653\/v1\/2021.naacl-main.291"},{"doi-asserted-by":"publisher","unstructured":"Garg S, Ramakrishnan G (2020) BAE: bert-based adversarial examples for text classification. In: Proceedings of the 2020 conference on empirical methods in natural language processing, EMNLP 2020, Online, November 16\u201320, pp 6174\u20136181. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.498","key":"9760_CR28","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"doi-asserted-by":"publisher","unstructured":"Li L, Ma R, Guo Q, Xue X, Qiu X (2020) BERT-ATTACK: adversarial attack against BERT using BERT. In: Proceedings of the 2020 conference on empirical methods in natural language processing, EMNLP 2020, Online, November 16\u201320, pp 6193\u20136202. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.500","key":"9760_CR29","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"9760_CR30","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.006932","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Ye L, Tang H, Zhang H, Li S (2023) Chinese BERT attack method based on masked language model. J Softw. https:\/\/doi.org\/10.13328\/j.cnki.jos.006932","journal-title":"J Softw"},{"doi-asserted-by":"publisher","unstructured":"Morris JX, Lifland E, Yoo JY, Grigsby J, Jin D, Qi Y (2020) Textattack: a framework for adversarial attacks, data augmentation, and adversarial training in NLP. In: Proceedings of the 2020 conference on empirical methods in natural language processing: system demonstrations, EMNLP 2020-Demos, Online, November 16\u201320, pp 119\u2013126. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-demos.16","key":"9760_CR31","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"doi-asserted-by":"publisher","unstructured":"Alzantot M, Sharma Y, Elgohary A, Ho B, Srivastava MB, Chang K (2018) Generating natural language adversarial examples. In: Proceedings of the 2018 conference on empirical methods in natural language processing, Brussels, Belgium, October 31\u2013November 4, pp 2890\u20132896. https:\/\/doi.org\/10.18653\/v1\/d18-1316","key":"9760_CR32","DOI":"10.18653\/v1\/d18-1316"},{"doi-asserted-by":"publisher","unstructured":"Zang Y, Qi F, Yang C, Liu Z, Zhang M, Liu Q, Sun M (2020) Word-level textual adversarial attacking as combinatorial optimization. In: Proceedings of the 58th annual meeting of the association for computational linguistics, ACL 2020, Online, July 5\u201310, pp 6066\u20136080. https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.540","key":"9760_CR33","DOI":"10.18653\/v1\/2020.acl-main.540"},{"doi-asserted-by":"crossref","unstructured":"Mrksic N, S\u00e9aghdha D\u00d3, Thomson B, Gasic M, Rojas-Barahona LM, Su P, Vandyke D, Wen T, Young SJ (2016) Counter-fitting word vectors to linguistic constraints. In: NAACL HLT 2016, The 2016 conference of the North American chapter of the association for computational linguistics: human language technologies, pp 142\u2013148","key":"9760_CR34","DOI":"10.18653\/v1\/N16-1018"},{"issue":"8","key":"9760_CR35","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.13328\/j.cnki.jos.005765","volume":"30","author":"W Wang","year":"2019","unstructured":"Wang W, Wang R, Wang L, Tang B (2019) Adversarial examples generation approach for tendency classification on Chinese texts. J Softw 30(8):2415\u20132427. https:\/\/doi.org\/10.13328\/j.cnki.jos.005765","journal-title":"J Softw"},{"key":"9760_CR36","doi-asserted-by":"publisher","first-page":"79561","DOI":"10.1109\/ACCESS.2020.2988786","volume":"8","author":"N Cheng","year":"2020","unstructured":"Cheng N, Chang G, Gao H, Pei G, Zhang Y (2020) Wordchange: adversarial examples generation approach for Chinese text classification. IEEE Access 8:79561\u201379572. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988786","journal-title":"IEEE Access"},{"issue":"9","key":"9760_CR37","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3969\/j.issn.1671-1122.2020.09.003","volume":"20","author":"X Tong","year":"2020","unstructured":"Tong X, Wang L, Wang R, Wang J (2020) A generation method of word-level adversarial samples for Chinese text classification. Netinfo Secur 20(9):12\u201316. https:\/\/doi.org\/10.3969\/j.issn.1671-1122.2020.09.003","journal-title":"Netinfo Secur"},{"issue":"2","key":"9760_CR38","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3969\/j.issn.1000-0135.2008.02.004","volume":"27","author":"L Xu","year":"2008","unstructured":"Xu L, Lin H, Pan Y, Ren H, Chen J (2008) Constructing the affective lexicon ontology. J China Soc Sci 27(2):180\u2013185. https:\/\/doi.org\/10.3969\/j.issn.1000-0135.2008.02.004","journal-title":"J China Soc Sci"},{"doi-asserted-by":"publisher","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. In: Proceedings of the 2014 conference on empirical methods in natural language processing, ACL, pp 1746\u20131751. https:\/\/doi.org\/10.3115\/v1\/d14-1181","key":"9760_CR39","DOI":"10.3115\/v1\/d14-1181"},{"unstructured":"Bahdanau D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. In: International conference on learning representations","key":"9760_CR40"},{"unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd International conference on learning representations","key":"9760_CR41"},{"unstructured":"Kusner M, Sun Y, Kolkin N, Weinberger K (2015) From word embeddings to document distances. In: Proceedings of the 32nd international conference on machine learning, pp 957\u2013966","key":"9760_CR42"},{"doi-asserted-by":"publisher","unstructured":"Cer D, Yang Y, Kong S-y, Hua N, Limtiaco N, John RSt, Constant N, Guajardo-Cespedes M, Yuan S, Tar C, Strope B, Kurzweil R (2018) Universal sentence encoder for English. In: Proceedings of the 2018 conference on empirical methods in natural language processing: system demonstrations, pp 169\u2013174. https:\/\/doi.org\/10.18653\/v1\/D18-2029","key":"9760_CR43","DOI":"10.18653\/v1\/D18-2029"},{"unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. In: 1st International conference on learning representations","key":"9760_CR44"},{"doi-asserted-by":"publisher","unstructured":"Si C, Zhang Z, Qi F, Liu Z, Wang Y, Liu Q, Sun M (2021) Better robustness by more coverage: adversarial and mixup data augmentation for robust finetuning. In: Findings of the association for computational linguistics: ACL-IJCNLP 2021, Online, pp 1569\u20131576. https:\/\/doi.org\/10.18653\/v1\/2021.findings-acl.137","key":"9760_CR45","DOI":"10.18653\/v1\/2021.findings-acl.137"},{"doi-asserted-by":"publisher","unstructured":"Ren S, Deng Y, He K, Che W (2019) Generating natural language adversarial examples through probability weighted word saliency. In: Proceedings of the 57th conference of the association for computational linguistics, ACL 2019, Florence, Italy, July 28\u2013August 2, pp 1085\u20131097. https:\/\/doi.org\/10.18653\/v1\/p19-1103","key":"9760_CR46","DOI":"10.18653\/v1\/p19-1103"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09760-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09760-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09760-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T18:12:00Z","timestamp":1723227120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09760-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,30]]},"references-count":46,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["9760"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09760-5","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,4,30]]},"assertion":[{"value":"5 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}