{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:35:51Z","timestamp":1773196551348,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00024","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"199-202","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial use of protein language models for modeling escape"],"prefix":"10.1109","author":[{"given":"Sayantani B.","family":"Littlefield","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign,Department of Computer Science,Urbana,United States"}]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Department of Computer Science,Urbana,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41580-021-00418-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19\u20131423"},{"key":"ref4","article-title":"Improving language understanding by generative pre-training","author":"Radford","year":"2018","journal-title":"OpenAI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2016239118"},{"key":"ref6","article-title":"Transformer protein language models are unsupervised structure learners","author":"Rao","year":"2020","journal-title":"bioRxiv"},{"key":"ref7","article-title":"Language models of protein sequences at the scale of evolution enable accurate structure prediction","author":"Lin","year":"2022","journal-title":"bioRxiv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06617-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-04043-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-naacl.137"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3716815.3729018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.20.1.3292"},{"key":"ref13","first-page":"1","article-title":"TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models","volume-title":"Proc. of the 37th Conf. on Neural Information Processing Systems (NeurIPS)","author":"Xue"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.63317\/2ivv5y3ufu9y"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690291"},{"key":"ref16","article-title":"Generative Judge for Evaluating Alignment","author":"Li","year":"2023"},{"key":"ref17","first-page":"1","article-title":"Judging LLM-as-a-Judge with MT-Bench and Chatbot Arena","volume":"36","author":"Zheng","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/01655515241227531"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpi.2023.100342"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-024-00155-6"},{"key":"ref21","article-title":"SafeGenes: Evaluating the Adversarial Robustness of Genomic Foundation Models","author":"Zhan","year":"2025"},{"key":"ref22","article-title":"GeneBreaker: Jailbreak Attacks against DNA Language Models with Pathogenicity Guidance","author":"Zhang","year":"2025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.ado9336"},{"key":"ref24","article-title":"Genome modeling and design across all domains of life with Evo 2","author":"Brixi","year":"2025","journal-title":"bioRxiv"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3311790.3396649"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2022.995960"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.7554\/eLife.69091"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2020.08.012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-24435-8"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418019.pdf?arnumber=11418019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:47:44Z","timestamp":1773121664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418019\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00024","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}