{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:38:06Z","timestamp":1772933886283,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["SaTC-2241068,IIS-2506643,POSE-2346158"],"award-info":[{"award-number":["SaTC-2241068,IIS-2506643,POSE-2346158"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401648","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"3988-3997","source":"Crossref","is-referenced-by-count":0,"title":["FABLE: Fairness Attack in Abusive Language Detection"],"prefix":"10.1109","author":[{"given":"Yueqing","family":"Liang","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology,Chicago,IL,USA"}]},{"given":"Lu","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago,Chicago,IL,USA"}]},{"given":"Ali","family":"Payani","sequence":"additional","affiliation":[{"name":"Cisco Research,San Jose,CA,USA"}]},{"given":"Kai","family":"Shu","sequence":"additional","affiliation":[{"name":"Emory University,Atlanta,GA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS.2018.8598530"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291037"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref4","volume-title":"ChatGPT: Large-scale language model for conversation","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.380"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.168"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3504"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278729"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3270101.3270103","article-title":"All you need is\u201d love\u201d evading hate speech detection","volume-title":"Proceedings of the 11th ACM workshop on artificial intelligence and security","author":"Gr\u00f6ndahl","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-00123-9_30"},{"key":"ref11","article-title":"Towards fair classification against poisoning attacks","author":"Xu","year":"2022","journal-title":"arXiv preprint arXiv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1163"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18653\/v1\/2020.socialnlp-1.2","article-title":"Demoting racial bias in hate speech detection","volume-title":"Proceedings of the Eighth International Workshop on Natural Language Processing for Social Media. Online: Association for Computational Linguistics","author":"Xia","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313504"},{"key":"ref16","first-page":"602","article-title":"Detection of abusive language: the problem of biased datasets","volume-title":"Proceedings of the 2019 conference of the North American Chapter of the Association for Computational Linguistics: human language technologies, volume 1 (long and short papers)","author":"Wiegand","year":"2019"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.18653\/v1\/2022.findings-acl.176","article-title":"Your fairness may vary: Pretrained language model fairness in toxic text classification","volume-title":"Findings of the Association for Computational Linguistics: ACL 2022","author":"Baldini","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3003571"},{"key":"ref20","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv"},{"key":"ref21","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1079"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"ref24","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012","journal-title":"arXiv preprint arXiv"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref26","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume":"31","author":"Shafahi","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref27","first-page":"1299","article-title":"When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Suciu","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.18653\/v1\/2020.acl-main.249","article-title":"Weight poisoning attacks on pretrained models","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics","author":"Kurita","year":"2020"},{"key":"ref30","article-title":"Natural backdoor attack on text data","author":"Sun","year":"2020","journal-title":"arXiv preprint arXiv"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref32","article-title":"Equality of opportunity in supervised learning","author":"Hardt","year":"2016","journal-title":"arXiv preprint arXiv"},{"key":"ref33","article-title":"The variational fair autoencoder","author":"Louizos","year":"2015","journal-title":"arXiv preprint arXiv"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-06119-y"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SDS57574.2022.10062890"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"17","DOI":"10.18653\/v1\/2021.woah-1.3","article-title":"HateBERT: Retraining BERT for abusive language detection in English","volume-title":"Proceedings of the 5th Workshop on Online Abuse and Harms (WOAH 2021)","author":"Caselli","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278779"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126232"},{"key":"ref41","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint arXiv"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086529"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118990"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401648.pdf?arnumber=11401648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:54:17Z","timestamp":1772866457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401648","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}