{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:37:24Z","timestamp":1778258244572,"version":"3.51.4"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,4]]},"DOI":"10.1109\/icassp49357.2023.10095342","type":"proceedings-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T17:28:30Z","timestamp":1683307710000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Targeted Adversarial Attacks Against Neural Machine Translation"],"prefix":"10.1109","author":[{"given":"Sahar","family":"Sadrizadeh","sequence":"first","affiliation":[{"name":"&#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Lausanne,Switzerland"}]},{"given":"AmirHossein Dabiri","family":"Aghdam","sequence":"additional","affiliation":[{"name":"University of Tehran,Tehran,Iran"}]},{"given":"Ljiljana","family":"Dolamic","sequence":"additional","affiliation":[{"name":"Armasuisse S+T,Thun,Switzerland"}]},{"given":"Pascal","family":"Frossard","sequence":"additional","affiliation":[{"name":"&#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Lausanne,Switzerland"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1425"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1314"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.446"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.529"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.153"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-6319"},{"key":"ref10","first-page":"653","article-title":"On adversarial examples for character-level neural machine translation","author":"ebrahimi","year":"2018","journal-title":"Proc of the 27th Int Conf on Computational Linguistics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-demos.12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Int Conf on Learning Representations"},{"key":"ref17","article-title":"What do you learn from context? probing for sentence structure in contextualized word representations","author":"tenney","year":"2019","journal-title":"Int Conf on Learning Representations"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5767"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-4020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"ref8","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref7","article-title":"Neural machine translation by jointly learning to align and translate","author":"bahdanau","year":"2015","journal-title":"Int Conf on Learning Representations"},{"key":"ref9","article-title":"Synthetic and natural noise both break neural machine translation","author":"belinkov","year":"2018","journal-title":"Int Conf on Learning Representations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3050042"},{"key":"ref3","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"Int Conf on Learning Representations"},{"key":"ref6","article-title":"Transfool: An adversarial attack against neural machine translation models","author":"sadrizadeh","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747475"}],"event":{"name":"ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Rhodes Island, Greece","start":{"date-parts":[[2023,6,4]]},"end":{"date-parts":[[2023,6,10]]}},"container-title":["ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10094559\/10094560\/10095342.pdf?arnumber=10095342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:11:03Z","timestamp":1700507463000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10095342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icassp49357.2023.10095342","relation":{},"subject":[],"published":{"date-parts":[[2023,6,4]]}}}