{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:53:58Z","timestamp":1763193238323,"version":"3.45.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227196","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Hidden Backdoor Attack via Formal Text Style Transfer in Language Models"],"prefix":"10.1109","author":[{"given":"Zihan","family":"Wang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Wenbo","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Jiaming","family":"He","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Hanxiao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Guowen","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]}],"member":"263","reference":[{"key":"ref1","article-title":"20 Newsgroups Dataset"},{"key":"ref2","article-title":"deepseek-llm-7b-base"},{"key":"ref3","article-title":"Gemma-2-9b"},{"key":"ref4","article-title":"Huggingface"},{"key":"ref5","article-title":"IMDB Dataset"},{"key":"ref6","article-title":"Isotonic FTST Model"},{"key":"ref7","article-title":"Kaggle Toxic Annotated Dataset"},{"key":"ref8","article-title":"Llama"},{"key":"ref9","article-title":"Llama-3.1-8B"},{"key":"ref10","article-title":"Mistral-7B-v0.3"},{"key":"ref11","article-title":"Prithivida FTST Model"},{"key":"ref12","article-title":"Qwen"},{"key":"ref13","article-title":"Talent404 FTST Model"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"key":"ref15","article-title":"Scaling instruction-finetuned language models","author":"Chung","year":"2024","journal-title":"Journal of Machine Learning Research"},{"article-title":"Training verifiers to solve math word problems","year":"2021","author":"Cobbe","key":"ref16"},{"key":"ref17","article-title":"A unified evaluation of textual backdoor learning: Frameworks and benchmarks","author":"Cui","year":"2022","journal-title":"Advances in NIPS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.214"},{"article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","year":"2017","author":"Gu","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3521942"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00786"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484576"},{"article-title":"Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation","volume-title":"Proceedings of USENIX Security","author":"Pan","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.374"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref31","article-title":"Language models are unsupervised multitask learners","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00086"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D13-1170"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2067"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.337"},{"article-title":"Instruction backdoor attacks against customized LLMs","volume-title":"Proceedings of USENIX Security","author":"Zhang","key":"ref36"},{"article-title":"Bertscore: Evaluating text generation with bert","year":"2019","author":"Zhang","key":"ref37"},{"key":"ref38","article-title":"Character-level convolutional networks for text classification","author":"Zhang","year":"2015","journal-title":"Advances in NIPS"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227196.pdf?arnumber=11227196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:51:30Z","timestamp":1763193090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227196","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}