{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:32:36Z","timestamp":1763191956560,"version":"3.45.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11228642","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Less is Better: Exploiting Label Bias to Enhance Instruction Tuning-based Backdoor Attack on Large Language Models"],"prefix":"10.1109","author":[{"given":"Heng-Yang","family":"Lu","sequence":"first","affiliation":[{"name":"Jiangnan University,School of Artificial Intelligence and Computer Science,Wuxi,China"}]},{"given":"Yi","family":"Zhong","sequence":"additional","affiliation":[{"name":"Jiangnan University,School of Artificial Intelligence and Computer Science,Wuxi,China"}]},{"given":"Chang","family":"Xia","sequence":"additional","affiliation":[{"name":"Anhui University,School of Computer Science and Technology,Anhui,China"}]}],"member":"263","reference":[{"article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","year":"2017","author":"Gu","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.241"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2024.3361661"},{"article-title":"Backdoorbench: A comprehensive benchmark and analysis of backdoor learning","year":"2024","author":"Wu","key":"ref4"},{"issue":"140","key":"ref5","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"Journal of machine learning research"},{"article-title":"Language models are few-shot learners","year":"2020","author":"Brown","key":"ref6"},{"key":"ref7","first-page":"10546","article-title":"Backdoorbench: A comprehensive benchmark of backdoor learning","volume":"35","author":"Wu","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.94"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.171"},{"key":"ref10","first-page":"93","article-title":"PromptSource: An integrated development environment and repository for natural language prompts","volume-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics: System Demonstrations","author":"Bach"},{"key":"ref11","first-page":"3470","article-title":"Cross-task generalization via natural language crowdsourcing instructions","volume-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","author":"Mishra"},{"key":"ref12","first-page":"5085","article-title":"Super-NaturalInstructions: Generalization via declarative instructions on 1600+ NLP tasks","volume-title":"Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing","author":"Wang"},{"article-title":"Badchain: Backdoor chain-of-thought prompting for large language models","year":"2024","author":"Xiang","key":"ref13"},{"key":"ref14","first-page":"7865","article-title":"UOR: Universal backdoor attacks on pre-trained language models","volume-title":"Findings of the Association for Computational Linguistics ACL 2024","author":"Du"},{"article-title":"On the exploitability of instruction tuning","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems, ser. NIPS \u201923","author":"Shu","key":"ref15"},{"key":"ref16","first-page":"6065","article-title":"Backdooring instruction-tuned large language models with virtual prompt injection","volume-title":"Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers)","author":"Yan"},{"article-title":"Lora-as-an-attack! piercing llm safety under the share-and-play scenario","year":"2024","author":"Liu","key":"ref17"},{"article-title":"How robust is gpt-3.5 to predecessors? a comprehensive study on language understanding tasks","year":"2023","author":"Chen","key":"ref18"},{"key":"ref19","first-page":"1631","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","volume-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing","author":"Socher"},{"key":"ref20","article-title":"Character-level convolutional networks for text classification","volume-title":"Advances in Neural Information Processing Systems","volume":"28","author":"Zhang","year":"2015"},{"key":"ref21","first-page":"2793","article-title":"Weight poisoning attacks on pretrained models","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics","author":"Kurita"},{"article-title":"Llama: Open and efficient foundation language models","year":"2023","author":"Touvron","key":"ref22"},{"article-title":"Chatglm: A family of large language models from glm-130b to glm-4 all tools","year":"2024","author":"GLM","key":"ref23"},{"article-title":"Vicuna: An open-source chatbot impressing gpt-4 with 90%* chatgpt quality","year":"2023","author":"Chiang","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref26","first-page":"5543","article-title":"Rethinking stealthiness of backdoor attack against NLP models","volume-title":"Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers)","author":"Yang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"key":"ref28","first-page":"4569","article-title":"Mind the style of text! adversarial and backdoor attacks based on text style transfer","volume-title":"Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing","author":"Qi"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"article-title":"Lora: Low-rank adaptation of large language models","year":"2021","author":"Hu","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.752"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11228642.pdf?arnumber=11228642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:27:48Z","timestamp":1763191668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11228642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11228642","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}