{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:17:32Z","timestamp":1766600252399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031764585"},{"type":"electronic","value":"9783031764592"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-76459-2_2","type":"book-chapter","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:33:03Z","timestamp":1741624383000},"page":"14-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Evasion Attack Efficiency Against Large Language Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"2_CR1","unstructured":"Yuan, L., et al.: Revisiting out-of-distribution robustness in NLP: benchmarks, analysis, and LLMs evaluations. In: Advances in Neural Information Processing Systems, vol.\u00a036, pp. 58478\u201358507 (2023)"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Xu, H., et al.: Adversarial attacks and defenses in images, graphs and text: a review. Int. J. Autom. Comput. 1\u201328 (2019). https:\/\/doi.org\/10.1007\/s11633-019-1211-x","DOI":"10.1007\/s11633-019-1211-x"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, et al.: ENISA Threat Landscape 2022. Tech. rep. (2022). https:\/\/doi.org\/10.2824\/764318","DOI":"10.2824\/764318"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Siva Kumar, R.S., et al.: Adversarial machine learning-industry perspectives. In: 2020 IEEE Security and Privacy Workshops (SPW), pp. 69\u201375 (2020). https:\/\/doi.org\/10.1109\/SPW50608.2020.00028","DOI":"10.1109\/SPW50608.2020.00028"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Chang, Y., et al.: A survey on evaluation of large language models. ACM Trans. Intell. Syst. Technol. 15(3) (2024). https:\/\/doi.org\/10.1145\/3641289","DOI":"10.1145\/3641289"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, Z., Zhang, Y.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High-Confidence Comput. 4(2), 100211 (2024). https:\/\/doi.org\/10.1016\/j.hcc.2024.100211","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Fei, H., Chua, T.S., Li, C., Ji, D., Zhang, M., Ren, Y.: On the robustness of aspect-based sentiment analysis: rethinking model, data, and training. ACM Trans. Inf. Syst. 41(2) (2022). https:\/\/doi.org\/10.1145\/3564281","DOI":"10.1145\/3564281"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Vitorino, J., Pra\u00e7a, I., Maia, E.: SoK: realistic adversarial attacks and defenses for intelligent network intrusion detection. Comput. Secur. 134, 103433 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103433","DOI":"10.1016\/j.cose.2023.103433"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Iqbal, M., Karim, A., Kamiran, F.: Balancing prediction errors for robust sentiment classification. ACM Trans. Knowl. Discov. Data 13(3) (2019). https:\/\/doi.org\/10.1145\/3328795","DOI":"10.1145\/3328795"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: Proceedings of the 2nd International Conference on Learning Representations, ICLR 2014, pp. 1\u201310 (2014). https:\/\/doi.org\/10.48550\/arxiv.1312.6199","DOI":"10.48550\/arxiv.1312.6199"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Ma, F., Zhang, C., Song, D.: Exploiting position bias for robust aspect sentiment classification (2021)","DOI":"10.18653\/v1\/2021.findings-acl.116"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of the 3rd International Conference on Learning Representations, ICLR 2015, pp. 1\u201311 (2015). https:\/\/doi.org\/10.48550\/arxiv.1412.6572","DOI":"10.48550\/arxiv.1412.6572"},{"key":"2_CR13","unstructured":"Zhang, W.E., Sheng, Q.Z., Alhazmi, A., Li, C.: Adversarial attacks on deep learning models in natural language processing: a survey (2019)"},{"key":"2_CR14","unstructured":"MITRE Adversarial Threat Landscape for Artificial-Intelligence Systems. https:\/\/atlas.mitre.org\/"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Ma, R., Guo, Q., Xue, X., Qiu, X.: Bert-attack: adversarial attack against BERT using BERT (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Wu, T., Guestrin, C., Singh, S.: Beyond accuracy: behavioral testing of NLP models with checklist (2020)","DOI":"10.18653\/v1\/2020.acl-main.442"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Jia, R., Raghunathan, A., G\u00f6ksel, K., Liang, P.: Certified robustness to adversarial word substitutions. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 4129\u20134142. Hong Kong, China (2019). https:\/\/doi.org\/10.18653\/v1\/D19-1423","DOI":"10.18653\/v1\/D19-1423"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Li, J., Ji, S., Du, T., Li, B., Wang, T.: Textbugger: generating adversarial text against real-world applications. In: Proceedings 2019 Network and Distributed System Security Symposium (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23138","DOI":"10.14722\/ndss.2019.23138"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Pruthi, D., Dhingra, B., Lipton, Z.C.: Combating adversarial misspellings with robust word recognition (2019)","DOI":"10.18653\/v1\/P19-1561"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Boucher, N., Shumailov, I., Anderson, R., Papernot, N.: Bad characters: imperceptible NLP attacks. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1987\u20132004 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833641","DOI":"10.1109\/SP46214.2022.9833641"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L.: Seeing stars: exploiting class relationships for sentiment categorization with respect to rating scales (2005)","DOI":"10.3115\/1219840.1219855"},{"key":"2_CR22","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding (2019)"},{"key":"2_CR23","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized BERT pretraining approach (2019)"},{"key":"2_CR24","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter (2020)"},{"key":"2_CR25","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: Albert: a lite BERT for self-supervised learning of language representations (2020)"},{"key":"2_CR26","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J., Salakhutdinov, R., Le, Q.V.: XLNet: generalized autoregressive pretraining for language understanding (2020)"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-76459-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:33:09Z","timestamp":1741624389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-76459-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031764585","9783031764592"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-76459-2_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}