{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T10:32:35Z","timestamp":1747996355797,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647846","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Towards Query-efficient Black-box Adversarial Attack on Text Classification Models"],"prefix":"10.1109","author":[{"given":"Mohammad Mehdi","family":"Yadollahi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arash Habibi","family":"Lashkari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali A.","family":"Ghorbani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2105"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1102"},{"key":"ref30","first-page":"543","article-title":"Topicrank: Graph-based topic ranking for keyphrase extraction","author":"bougouin","year":"2013","journal-title":"International Joint Conference on Natural Language Processing (IJCNLP)"},{"key":"ref35","first-page":"69","article-title":"pke: an open source python-based keyphrase extraction toolkit","author":"boudin","year":"2016","journal-title":"Proceedings of COLING 2016 the 26th International Conference on Computational Linguistics System Demonstrations"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/978-3-030-31372-2_26","article-title":"Rakun: Rank-based keyword extraction via unsupervised learning and meta vertex aggregation","author":"\u0161krlj","year":"2019","journal-title":"Statistical Language and Speech Processing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref11","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref12","article-title":"A survey on adversarial attacks and defenses in text","volume":"abs 1902 7285","author":"wang","year":"2019","journal-title":"CoRR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"ref14","article-title":"Towards crafting text adversarial samples","author":"samanta","year":"2017","journal-title":"arXiv preprint arXiv 1707 06873"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-2006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.6.2.161"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref28","first-page":"404","article-title":"Textrank: Bringing order into text","author":"mihalcea","year":"2004","journal-title":"Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing"},{"key":"ref4","article-title":"Generating natural adversarial examples","author":"zhao","year":"2017","journal-title":"arXiv preprint arXiv 1710 11342"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599203"},{"key":"ref5","first-page":"1369","article-title":"Adversarial examples for semantic segmentation and object detection","author":"xie","year":"2017","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref8","article-title":"Generating adversarial malware examples for black-box attacks based on gan","author":"hu","year":"2017","journal-title":"arXiv preprint arXiv 1702 05983"},{"key":"ref7","article-title":"Adversarial examples: Attacks on machine learning-based malware visualization detection methods","volume":"10","author":"liu","year":"2018","journal-title":"arXiv preprint arXiv 1808 01348"},{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref2"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014 Banff AB Canada April 14-16 2014 Conference Track Proceedings"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.3115\/v1\/D14-1162","article-title":"Glove: Global vectors for word representation","author":"pennington","year":"2014","journal-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)"},{"key":"ref22","article-title":"Universal sentence encoder","volume":"abs 1803 11175","author":"cer","year":"2018","journal-title":"CoRR"},{"key":"ref21","article-title":"Counter-fitting word vectors to linguistic constraints","volume":"abs 1603 892","author":"mrksic","year":"2016","journal-title":"CoRR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219855"},{"key":"ref23","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"zhang","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref25","article-title":"A sensitivity analysis of (and practitioners&#x2019; guide to) convolutional neural networks for sentence classification","author":"zhang","year":"2015","journal-title":"arXiv preprint arXiv 1510 03820"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647846.pdf?arnumber=9647846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647846","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}