{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:32:53Z","timestamp":1730266373527,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892724","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency"],"prefix":"10.1109","author":[{"given":"Pengwei","family":"Zhan","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yang","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yunjian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Chao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.241"},{"key":"ref10","article-title":"Understanding neural networks through representation erasure","author":"li","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1407"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"key":"ref16","article-title":"Deceiving google's perspective api built for detecting toxic comments","author":"hosseini","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-2006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NLPKE.2003.1276017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref6","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref29","first-page":"1638","article-title":"Contextual string embeddings for sequence labeling","author":"akbik","year":"0","journal-title":"Proceedings of the 27th International Conference on Computational Linguistics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014"},{"key":"ref20","article-title":"Contextualized perturbation for textual adversarial attack","author":"li","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1561"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219855"},{"key":"ref23","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"zhang","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref25","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","volume":"1","author":"devlin","year":"2019","journal-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies NAACL-HLT 2019"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892724.pdf?arnumber=9892724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:44Z","timestamp":1667516324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892724","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}