{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:31:33Z","timestamp":1730298693489,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ssci.2018.8628894","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T23:15:32Z","timestamp":1551395732000},"page":"658-665","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of an Adversary in a Language Model"],"prefix":"10.1109","author":[{"given":"Zhengzhong","family":"Liang","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Ditzler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1611 01236"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1187"},{"key":"ref12","article-title":"Ensemble adversarial training: Attacks and defenses","author":"trame`r","year":"2017","journal-title":"arXiv preprint arXiv 1705 07204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"key":"ref14","article-title":"Understanding neural networks through representation erasure","author":"li","year":"2016","journal-title":"arXiv preprint arXiv 1612 08220"},{"key":"ref15","article-title":"Generating natural adversarial examples","author":"zhao","year":"2017","journal-title":"arXiv preprint arXiv 1710 11342"},{"key":"ref16","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"arXiv preprint arXiv 1206 6389"},{"key":"ref17","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","author":"xiao","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"ref18","article-title":"Generative poisoning attack method against neural networks","author":"yang","year":"2017","journal-title":"arXiv preprint arXiv 1703 06870"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref4","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(01)00077-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref7","volume":"3","author":"jurafsky","year":"2014","journal-title":"Speech and Language Processing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2344095"},{"key":"ref22","article-title":"Recurrent neural network regularization","author":"zaremba","year":"2014","journal-title":"arXiv preprint arXiv 1409 2329"},{"key":"ref21","first-page":"3517","article-title":"Certified defenses for data poisoning attacks","author":"steinhardt","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0079-7421(08)60536-8","article-title":"Catastrophic interference in connectionist networks: The sequential learning problem","volume":"24","author":"mccloskey","year":"1989","journal-title":"Psychology of Learning and Motivation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"journal-title":"Tensorflow Non-Deterministic Reduction Operation","year":"2018","key":"ref25"}],"event":{"name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2018,11,18]]},"location":"Bangalore, India","end":{"date-parts":[[2018,11,21]]}},"container-title":["2018 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610062\/8628618\/08628894.pdf?arnumber=8628894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:24:31Z","timestamp":1598239471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8628894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ssci.2018.8628894","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}