{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:24:40Z","timestamp":1773779080193,"version":"3.50.1"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12271215"],"award-info":[{"award-number":["12271215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12326378"],"award-info":[{"award-number":["12326378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11871248"],"award-info":[{"award-number":["11871248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["202206780011"],"award-info":[{"award-number":["202206780011"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Innovative Talents Cultivation Funded Programs for Doctoral Students of Jinan University","award":["2022CXB013"],"award-info":[{"award-number":["2022CXB013"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Audio Speech Lang. Process."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/taslp.2024.3407571","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T17:58:18Z","timestamp":1717610298000},"page":"3014-3024","source":"Crossref","is-referenced-by-count":30,"title":["Exploring Clean Label Backdoor Attacks and Defense in Language Models"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5174-5182","authenticated-orcid":false,"given":"Shuai","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6062-207X","authenticated-orcid":false,"given":"Luu Anh","family":"Tuan","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4494-843X","authenticated-orcid":false,"given":"Jie","family":"Fu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8181-0958","authenticated-orcid":false,"given":"Jinming","family":"Wen","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-7397","authenticated-orcid":false,"given":"Weiqi","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"issue":"1","key":"ref2","first-page":"5485","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref3","article-title":"ALBERT: A lite BERT for self-supervised learning of language representations","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Lan","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.39"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.491"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3596219"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3207982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.335"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-211229"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.348"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-4828"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3130970"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-eacl.1"},{"key":"ref17","article-title":"Improving adversarial robustness requires revisiting misclassified examples","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Wang","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.374"},{"key":"ref19","article-title":"Universal vulnerabilities in large language models: Backdoor attacks for in-context learning","author":"Zhao","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2020.2998870"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.241"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.214"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.757"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.377"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3181001"},{"issue":"5","key":"ref26","first-page":"9","article-title":"A survey of adversarial attacks and defenses for image data on deep learning","volume":"10","author":"Huayu","year":"2022","journal-title":"Int. J. Open Inf. Technol."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3527278"},{"key":"ref28","first-page":"26958","article-title":"Certified robustness against natural language attacks by causal intervention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhao","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref31","first-page":"8011","article-title":"Spectral signatures in backdoor attacks","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Tran","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01445"},{"key":"ref33","article-title":"BadPre: Task-agnostic backdoor attacks to pre-trained NLP foundation models","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Chen","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.105"},{"key":"ref37","article-title":"LFPT5: A unified framework for lifelong few-shot language learning based on prompt tuning of T5","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Qin","year":"2022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.491"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21356"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-short.17"},{"key":"ref41","first-page":"6106","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Shafahi","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488902"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109512"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103101"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-018-0688-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3603398"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3625096"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3626318"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SIN54109.2021.9699173"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484576"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.40"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.833"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.repl4nlp-1.1"},{"key":"ref55","article-title":"BERTscore: Evaluating text generation with BERT","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhang","year":"2019"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_22"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583348"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.25971"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548427"},{"key":"ref60","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","author":"Chen","year":"2018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3192097"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25656"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61609-0_35"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/s43018-020-00169-2"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2021.3077413"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99079-4_10"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-00907-z"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.144"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.260"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.193"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.53"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acllong.353"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.608"},{"issue":"11","key":"ref75","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref76","first-page":"14900","article-title":"Anti-backdoor learning: Training clean models on poisoned data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Li","year":"2021"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2100"},{"key":"ref78","first-page":"1631","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Socher","year":"2013"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1144"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref81","volume-title":"A Rule-Based Style and Grammar Checker","author":"Naber","year":"2003"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"ref83","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.55"}],"container-title":["IEEE\/ACM Transactions on Audio, Speech, and Language Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6570655\/10304349\/10549768.pdf?arnumber=10549768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T19:00:51Z","timestamp":1750100451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10549768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/taslp.2024.3407571","relation":{},"ISSN":["2329-9290","2329-9304"],"issn-type":[{"value":"2329-9290","type":"print"},{"value":"2329-9304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}