{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T01:10:02Z","timestamp":1742692202179,"version":"3.40.2"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872111"],"award-info":[{"award-number":["61872111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11280-025-01338-y","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T08:18:54Z","timestamp":1741594734000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Chinese legal adversarial text generation based on interpretable perturbation strategies"],"prefix":"10.1007","volume":"28","author":[{"given":"Yunting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Shang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Baisong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"key":"1338_CR1","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171\u20134186 (2019). https:\/\/doi.org\/10.18653\/v1\/n19-1423","DOI":"10.18653\/v1\/n19-1423"},{"key":"1338_CR2","doi-asserted-by":"crossref","unstructured":"Liu, H., Yin, Q., Wang, W.Y.: Towards explainable NLP: A generative explanation framework for text classification. In: Proceedings of the 57th Conference of the Association for Computational Linguistics, pp. 5570\u20135581 (2019)","DOI":"10.18653\/v1\/P19-1560"},{"key":"1338_CR3","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Computer Vision - ECCV 2014 - 13th European Conference, vol. 8689, pp. 818\u2013833 (2014)","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"1338_CR4","doi-asserted-by":"publisher","unstructured":"Wu, B., Zou, F., Zhang, C., Yu, T., Li, Y.: Multi-field relation mining for malicious http traffic detection based on attention and cross network. J. Inform. Secur. Appl. 73, 103411 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2022.103411","DOI":"10.1016\/j.jisa.2022.103411"},{"key":"1338_CR5","doi-asserted-by":"publisher","unstructured":"Luo, P., Chu, J., Yang, G.: Ip packet-level encrypted traffic classification using machine learning with a light weight feature engineering method. J. Inform. Secur. Appl. 75, 103519 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103519","DOI":"10.1016\/j.jisa.2023.103519"},{"key":"1338_CR6","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., Fergus, R.: Intriguing properties of neural networks. In: 2nd International Conference on Learning Representations (2014)"},{"key":"1338_CR7","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: 3rd International Conference on Learning Representations (2015)"},{"key":"1338_CR8","doi-asserted-by":"publisher","unstructured":"Gao, J., Lanchantin, J., Soffa, M.L., Qi, Y.: Black-box generation of adversarial text sequences to evade deep learning classifiers. In: 2018 IEEE Security and Privacy Workshops, SP Workshops 2018, San Francisco, CA, USA, May 24, 2018, pp. 50\u201356. https:\/\/doi.org\/10.1109\/SPW.2018.00016","DOI":"10.1109\/SPW.2018.00016"},{"key":"1338_CR9","doi-asserted-by":"publisher","unstructured":"Alzantot, M., Sharma, Y., Elgohary, A., Ho, B., Srivastava, M.B., Chang, K.: Generating natural language adversarial examples. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31 - November 4, 2018, pp. 2890\u20132896. https:\/\/doi.org\/10.18653\/v1\/d18-1316","DOI":"10.18653\/v1\/d18-1316"},{"key":"1338_CR10","doi-asserted-by":"crossref","first-page":"151144","DOI":"10.1109\/ACCESS.2019.2945771","volume":"7","author":"S Li","year":"2019","unstructured":"Li, S., Zhang, H., Ye, L., Guo, X., Fang, B.: MANN: A multichannel attentive neural network for legal judgment prediction. IEEE Access 7, 151144\u2013151155 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"1338_CR11","first-page":"1217","volume":"62","author":"S Li","year":"2020","unstructured":"Li, S., Zhang, H., Ye, L., Su, S., Guo, X., Yu, H., Fang, B.: Prison term prediction on criminal case description with deep learning. CMC-Comput. Mater. Contin. 62(3), 1217\u20131231 (2020)","journal-title":"CMC-Comput. Mater. Contin."},{"issue":"9","key":"1338_CR12","doi-asserted-by":"publisher","first-page":"6341","DOI":"10.1007\/s10994-024-06572-5","volume":"113","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Li, S., Ye, L., Zhang, H., Chen, Z., Fang, B.: Kalt: generating adversarial explainable chinese legal texts. Mach. Learn. 113(9), 6341\u20136371 (2024). https:\/\/doi.org\/10.1007\/s10994-024-06572-5","journal-title":"Mach. Learn."},{"key":"1338_CR13","doi-asserted-by":"publisher","unstructured":"Liang, B., Li, H., Su, M., Bian, P., Li, X., Shi, W.: Deep text classification can be fooled. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI 2018, July 13-19, 2018, Stockholm, Sweden, pp. 4208\u20134215. https:\/\/doi.org\/10.24963\/ijcai.2018\/585","DOI":"10.24963\/ijcai.2018\/585"},{"key":"1338_CR14","unstructured":"Wang, W., Tang, B., Wang, R., Wang, L., Ye, A.: Towards a robust deep neural network in texts: A survey (2019). arXiv:1902.07285"},{"key":"1338_CR15","doi-asserted-by":"publisher","unstructured":"Ren, S., Deng, Y., He, K., Che, W.: Generating natural language adversarial examples through probability weighted word saliency. In: Proceedings of the 57th Conference of the Association for Computational Linguistics, ACL 2019, Florence, Italy, July 28- August 2, 2019, pp. 1085\u20131097. https:\/\/doi.org\/10.18653\/v1\/p19-1103","DOI":"10.18653\/v1\/p19-1103"},{"issue":"9","key":"1338_CR16","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1002\/int.22260","volume":"35","author":"J Xu","year":"2020","unstructured":"Xu, J., Du, Q.: Adversarial attacks on text classification models using layer-wise relevance propagation. Int. J. Intell. Syst. 35(9), 1397\u20131415 (2020). https:\/\/doi.org\/10.1002\/int.22260","journal-title":"Int. J. Intell. Syst."},{"key":"1338_CR17","doi-asserted-by":"publisher","unstructured":"Wang, W., Wang, R., Wang, L., Tang, B.: Adversarial examples generation approach for tendency classification on chinese texts. J. Softw. 30(8), 2415\u20132427 (2019). https:\/\/doi.org\/10.13328\/j.cnki.jos.005765","DOI":"10.13328\/j.cnki.jos.005765"},{"key":"1338_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Ji, S., Du, T., Li, B., Wang, T.: Textbugger: Generating adversarial text against real-world applications. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019","DOI":"10.14722\/ndss.2019.23138"},{"key":"1338_CR19","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Liu, M., Zhang, C., Zhang, Y., Li, Z., Li, Q., Duan, H., Sun, D.: Argot: Generating adversarial readable chinese texts. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pp. 2533\u20132539. https:\/\/doi.org\/10.24963\/ijcai.2020\/351","DOI":"10.24963\/ijcai.2020\/351"},{"key":"1338_CR20","doi-asserted-by":"publisher","first-page":"79561","DOI":"10.1109\/ACCESS.2020.2988786","volume":"8","author":"N Cheng","year":"2020","unstructured":"Cheng, N., Chang, G., Gao, H., Pei, G., Zhang, Y.: WordChange: Adversarial examples generation approach for chinese text classification. IEEE Access 8, 79561\u201379572 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988786","journal-title":"IEEE Access"},{"key":"1338_CR21","doi-asserted-by":"publisher","unstructured":"Yoo, J.Y., Morris, J.X., Lifland, E., Qi, Y.: Searching for a search method: Benchmarking search algorithms for generating NLP adversarial examples. In: Proceedings of the Third BlackboxNLP Workshop on Analyzing and Interpreting Neural Networks for NLP, BlackboxNLP@EMNLP 2020, Online, November 2020, pp. 323\u2013332. https:\/\/doi.org\/10.18653\/v1\/2020.blackboxnlp-1.30","DOI":"10.18653\/v1\/2020.blackboxnlp-1.30"},{"key":"1338_CR22","doi-asserted-by":"publisher","unstructured":"Ebrahimi, J., Rao, A., Lowd, D., Dou, D.: Hotflip: White-box adversarial examples for text classification. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, ACL 2018, Melbourne, Australia, July 15-20, 2018, pp. 31\u201336. https:\/\/doi.org\/10.18653\/v1\/P18-2006","DOI":"10.18653\/v1\/P18-2006"},{"key":"1338_CR23","doi-asserted-by":"publisher","unstructured":"Zang, Y., Qi, F., Yang, C., Liu, Z., Zhang, M., Liu, Q., Sun, M.: Word-level textual adversarial attacking as combinatorial optimization. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, ACL 2020, Online, July 5-10, 2020, pp. 6066\u20136080. https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.540","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"1338_CR24","unstructured":"Sparck\u00a0Jones, K.: A Statistical Interpretation of Term Specificity and Its Application in Retrieval, pp. 132\u2013142. Taylor Graham Publishing, GBR (1988)"},{"key":"1338_CR25","unstructured":"Xiao, C., Zhong, H., Guo, Z., Tu, C., Liu, Z., Sun, M., Feng, Y., Han, X., Hu, Z., Wang, H., Xu, J.: CAIL2018: A large-scale legal dataset for judgment prediction (2018). arXiv:1807.02478"},{"key":"1338_CR26","doi-asserted-by":"publisher","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pp. 1746\u20131751 (2014). https:\/\/doi.org\/10.3115\/v1\/d14-1181","DOI":"10.3115\/v1\/d14-1181"},{"issue":"8","key":"1338_CR27","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"1338_CR28","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations (2015)"},{"key":"1338_CR29","unstructured":"Kusner, M., Sun, Y., Kolkin, N., Weinberger, K.: From word embeddings to document distances. In: Proceedings of the 32nd International Conference on Machine Learning, pp. 957\u2013966 (2015)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01338-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-025-01338-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01338-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:29:54Z","timestamp":1742689794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-025-01338-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1338"],"URL":"https:\/\/doi.org\/10.1007\/s11280-025-01338-y","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"3 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"24"}}