{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:30:12Z","timestamp":1769283012787,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,28]]},"DOI":"10.1109\/milcom55135.2022.10017466","type":"proceedings-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T19:14:24Z","timestamp":1674587664000},"page":"442-449","source":"Crossref","is-referenced-by-count":1,"title":["I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation"],"prefix":"10.1109","author":[{"given":"Yue","family":"Gao","sequence":"first","affiliation":[{"name":"University of Wisconsin&#x2013;Madison,Madison,WI,USA"}]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[{"name":"Microsoft,Redmond,WA,USA"}]},{"given":"Manoj Ajith","family":"Prasad","sequence":"additional","affiliation":[{"name":"Microsoft,Redmond,WA,USA"}]},{"given":"Andrew T.","family":"Marshall","sequence":"additional","affiliation":[{"name":"Microsoft,Redmond,WA,USA"}]},{"given":"Kassem","family":"Fawaz","sequence":"additional","affiliation":[{"name":"University of Wisconsin&#x2013;Madison,Madison,WI,USA"}]},{"given":"Emre","family":"Kiciman","sequence":"additional","affiliation":[{"name":"Microsoft,Redmond,WA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806284"},{"key":"ref3","article-title":"Language models are few-shot learners","volume-title":"Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020","author":"Brown","year":"2020"},{"key":"ref4","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","volume":"abs\/1708.06733","author":"Gu","year":"2017","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref6","article-title":"Badnl: Backdoor attacks against NLP models","volume":"abs\/2006.01043","author":"Chen","year":"2020","journal-title":"CoRR"},{"key":"ref7","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","volume":"abs\/1712.05526","author":"Chen","year":"2017","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653139"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485908"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_14"},{"key":"ref13","article-title":"Weight poisoning attacks on pre-trained models","volume":"abs\/2004.06660","author":"Kurita","year":"2020","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.377"},{"key":"ref16","article-title":"ONION: A simple and effective defense against textual backdoor attacks","volume":"abs\/2011.10369","author":"Qi","year":"2020","journal-title":"CoRR"},{"key":"ref17","article-title":"Dynamic backdoor attacks against machine learning models","volume":"abs\/2003.03675","author":"Salem","year":"2020","journal-title":"CoRR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"key":"ref19","article-title":"Defending against backdoor attacks in natural language generation","volume":"abs\/2106.01810","author":"Fan","year":"2021","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1170"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/9789812774675"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19\u20131423"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"ref24","first-page":"1631","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","volume-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing","author":"Socher"},{"key":"ref25","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Maas"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.3269"}],"event":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","location":"Rockville, MD, USA","start":{"date-parts":[[2022,11,28]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10017432\/10017302\/10017466.pdf?arnumber=10017466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:14:16Z","timestamp":1710393256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/milcom55135.2022.10017466","relation":{},"subject":[],"published":{"date-parts":[[2022,11,28]]}}}