{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:05:17Z","timestamp":1768313117526,"version":"3.49.0"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2099"],"award-info":[{"award-number":["U22A2099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62336003"],"award-info":[{"award-number":["62336003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Audio Speech Lang. Process."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/taslp.2024.3414333","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:18:30Z","timestamp":1718302710000},"page":"3270-3282","source":"Crossref","is-referenced-by-count":4,"title":["PROTECT: Parameter-Efficient Tuning for Few-Shot Robust Chinese Text Correction"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1661-6590","authenticated-orcid":false,"given":"Xuan","family":"Feng","sequence":"first","affiliation":[{"name":"College of Information Science and Technology\/College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1593-1292","authenticated-orcid":false,"given":"Tianlong","family":"Gu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology\/College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7262-4707","authenticated-orcid":false,"given":"Liang","family":"Chang","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Trusted Software, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6488-9732","authenticated-orcid":false,"given":"Xiaoli","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology\/College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"921","DOI":"10.18653\/v1\/2022.acl-long.65","article-title":"Rocbert: Robust chinese BERT with multimodal contrastive pretraining","volume-title":"Proc. 60th Annu. Meeting Assoc. Comput. Linguistics (Volume 1: Long Papers)","author":"Su","year":"2022"},{"key":"ref2","first-page":"229","article-title":"Self-supervised euphemism detection and identification for content moderation","volume-title":"Proc. IEEE Symp. Secur. Privacy","author":"Zhu","year":"2021"},{"key":"ref3","first-page":"163","article-title":"Euphemistic phrase detection by masked language model","volume-title":"Proc. Findings Assoc. Comput. Linguistics: EMNLP","author":"Zhu","year":"2021"},{"key":"ref4","first-page":"739","article-title":"Visually and phonologically similar characters in incorrect simplified Chinese words","volume-title":"Proc. 23rd Int. Conf. Comput. Linguistics","author":"Liu","year":"2010"},{"key":"ref5","first-page":"962","article-title":"Using SMT for OCR error correction of historical texts","volume-title":"Proc. 10th Int. Conf. Lang. Resour. Eval.","author":"Afli","year":"2016"},{"key":"ref6","first-page":"2517","article-title":"A hybrid approach to automatic corpus generation for Chinese spelling check","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Wang","year":"2018"},{"key":"ref7","first-page":"4323","article-title":"Interpretable adversarial perturbation in input embedding space for text","volume-title":"Proc. 27th Int. Joint Conf. Artif. Intell.","author":"Sato","year":"2018"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.18653\/v1\/P19-1103","article-title":"Generating natural language adversarial examples through probability weighted word saliency","volume-title":"Proc. 57th Annu. Meeting Assoc. Comput. Linguistics","author":"Ren","year":"2019"},{"key":"ref9","first-page":"1987","article-title":"Bad characters: Imperceptible NLP attacks","volume-title":"Proc. IEEE Symp. Secur. Privacy","author":"Boucher","year":"2022"},{"key":"ref10","first-page":"1","article-title":"Synthetic and natural noise both break neural machine translation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Belinkov","year":"2018"},{"key":"ref11","first-page":"653","article-title":"On adversarial examples for character-level neural machine translation","volume-title":"Proc. 27th Int. Conf. Comput. Linguistics","author":"Ebrahimi","year":"2018"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"5582","DOI":"10.18653\/v1\/P19-1561","article-title":"Combating adversarial misspellings with robust word recognition","volume-title":"Proc. 57th Annu. Meeting Assoc. Comput. Linguistics","author":"Pruthi","year":"2019"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.18653\/v1\/2020.acl-main.245","article-title":"Robust encodings: A framework for combating adversarial typos","volume-title":"Proc. 58th Annu. Meeting Assoc. Comput. Linguistics","author":"Jones","year":"2020"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.18653\/v1\/2021.findings-acl.141","article-title":"BERT-defense: A probabilistic model based on BERT to combat cognitively inspired orthographic adversarial attacks","volume-title":"Proc. Findings Assoc. Comput. Linguistics: ACL-IJCNLP","author":"Keller","year":"2021"},{"key":"ref15","first-page":"5213","article-title":"Semantically informed slang interpretation","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Sun","year":"2022"},{"key":"ref16","first-page":"171","article-title":"Frequency-guided word substitutions for detecting textual adversarial examples","volume-title":"Proc. 16th Conf. Eur. Chapter Assoc. Comput. Linguistics: Main Volume","author":"Mozes","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i16.17648"},{"key":"ref18","first-page":"5482","article-title":"Defense against synonym substitution-based adversarial attacks via Dirichlet neighborhood ensemble","volume-title":"Proc. 59th Annu. Assoc. Comput. Linguistics, 11th Int. Joint Conf. Natural Lang. Process.","author":"Zhou","year":"2021"},{"key":"ref19","first-page":"1381","article-title":"TextShield: Robust text classification based on multimodal embedding and neural machine translation","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Li","year":"2020"},{"key":"ref20","first-page":"2533","article-title":"Argot: Generating adversarial readable Chinese texts","volume-title":"Proc. 29th Int. Conf. Int. Joint Conferences Artif. Intell.","author":"Zhang","year":"2021"},{"key":"ref21","first-page":"157","article-title":"An improved graph model for Chinese spell checking","volume-title":"Proc. 3rd CIPS-SIGHAN Joint Conf. Chin. Lang. Process.","author":"Xin","year":"2014"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2437","DOI":"10.18653\/v1\/2021.findings-acl.216","article-title":"Dynamic connected networks for Chinese spelling check","volume-title":"Proc. Findings Assoc. Comput. Linguistics: ACL-IJCNLP","author":"Wang","year":"2021"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5780","DOI":"10.18653\/v1\/P19-1578","article-title":"Confusionset-guided pointer networks for Chinese spelling check","volume-title":"Proc. 57th Annu. Meeting Assoc. Comput. Linguistics","author":"Wang","year":"2019"},{"key":"ref24","first-page":"2991","article-title":"PLOME: Pre-training with misspelled knowledge for Chinese spelling correction","volume-title":"Proc. 59th Annu. Meeting Assoc. Comput. Linguistics 11th Int. Joint Conf. Natural Lang. Process. (Volume 1: Long Papers)","author":"Liu","year":"2021"},{"key":"ref25","first-page":"35","article-title":"Chinese spelling check evaluation at SIGHAN bake-off 2013","volume-title":"Proc. 7th SIGHAN Workshop Chin. Lang. Process.","author":"Wu","year":"2013"},{"key":"ref26","first-page":"126","article-title":"Overview of SIGHAN 2014 bake-off for Chinese spelling check","volume-title":"Proc. 3rd CIPS-SIGHAN Joint Conf. Chin. Lang. Process.","author":"Yu","year":"2014"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"32","DOI":"10.18653\/v1\/W15-3106","article-title":"Introduction to SIGHAN 2015 bake-off for Chinese spelling check","volume-title":"Proc. 8th SIGHAN Workshop Chin. Lang. Process.","author":"Tseng","year":"2015"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"882","DOI":"10.18653\/v1\/2020.acl-main.82","article-title":"Spelling error correction with soft-masked BERT","volume-title":"Proc. 58th Annu. Meeting Assoc. Comput. Linguistics","author":"Zhang","year":"2020"},{"key":"ref29","first-page":"5053","article-title":"Contextualized perturbation for textual adversarial attack","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Li","year":"2021"},{"key":"ref30","first-page":"9266","article-title":"Model-tuning via prompts makes NLP models adversarially robust","volume-title":"Proc. Conf. Empirical Methods Natural Lang.","author":"Raman","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00787"},{"key":"ref32","first-page":"6174","article-title":"BAE: BERT-based adversarial examples for text classification","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Garg","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3115\/1075218.1075250"},{"key":"ref34","first-page":"79","article-title":"A study of language modeling for Chinese spelling check","volume-title":"Proc. 7th SIGHAN Workshop Chin. Lang. Process.","author":"Chen","year":"2013"},{"key":"ref35","first-page":"126","article-title":"Overview of SIGHAN 2014 bake-off for Chinese spelling check","volume-title":"Proc. 3rd CIPS-SIGHAN Joint Conf. Chin. Lang. Process.","author":"Yu","year":"2014"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"32","DOI":"10.18653\/v1\/W15-3106","article-title":"Introduction to SIGHAN 2015 bake-off for Chinese spelling check","volume-title":"Proc. 8th SIGHAN Workshop Chin. Lang. Process.","author":"Tseng","year":"2015"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"871","DOI":"10.18653\/v1\/2020.acl-main.81","article-title":"SpellGCN: Incorporating phonological and visual similarities into language models for Chinese spelling check","volume-title":"Proc. 58th Annu. Meeting Assoc. Comput. Linguistics","author":"Cheng","year":"2020"},{"key":"ref38","first-page":"238","article-title":"Learning from the dictionary: Heterogeneous knowledge guided fine-tuning for Chinese spell checking","volume-title":"Proc. Findings Assoc. Comput. Linguistics: EMNLP","author":"Li","year":"2022"},{"key":"ref39","first-page":"3202","article-title":"The past mistake is the future wisdom: Error-driven contrastive probability optimization for Chinese spell checking","volume-title":"Proc. Findings Assoc. Comput. Linguistics: ACL","author":"Li","year":"2022"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"4275","DOI":"10.18653\/v1\/2022.emnlp-main.287","article-title":"Improving Chinese spelling check by character pronunciation prediction: The effects of adaptivity and granularity","volume-title":"Proc. 2022 Conf. Empirical Methods Natural Lang. Process.","author":"Li","year":"2022"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"10743","DOI":"10.18653\/v1\/2023.acl-long.600","article-title":"Rethinking masked language modeling for Chinese spelling correction","volume-title":"Proc. 61st Annu. Meeting Assoc. Comput. Linguistics (Volume 1: Long Papers)","author":"Wu","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29829"},{"key":"ref43","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013"},{"key":"ref44","first-page":"653","article-title":"On adversarial examples for character-level neural machine translation","volume-title":"Proc. 27th Int. Conf. Comput. Linguistics","author":"Ebrahimi","year":"2018"},{"key":"ref45","first-page":"575","article-title":"Robust machine comprehension models via adversarial training","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol., Volume 2 (Short Papers)","author":"Wang","year":"2018"},{"issue":"05","key":"ref46","first-page":"8018","article-title":"Is BERT really robust? A strong baseline for natural language attack on text classification and entailment","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"34","author":"Jin","year":"2020"},{"key":"ref47","article-title":"Towards evaluating the robustness of chinese BERT classifiers","author":"Wang","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.400"},{"key":"ref50","first-page":"6193","article-title":"BERT-attack: Adversarial attack against BERT using BERT","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Li","year":"2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02318"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.47"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.433"},{"key":"ref54","first-page":"1","article-title":"Towards a unified view of parameter-efficient transfer learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"He","year":"2022"},{"key":"ref55","first-page":"2790","article-title":"Parameter-efficient transfer learning for NLP","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Houlsby","year":"2019"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18653\/v1\/2022.acl-short.1","article-title":"BitFit: Simple parameter-efficient fine-tuning for transformer-based masked language-models","volume-title":"Proc. 60th Annu. Meeting Assoc. Comput. Linguistics (Volume 2: Short Papers)","author":"Zaken","year":"2022"},{"key":"ref57","first-page":"3816","article-title":"Making pre-trained language models better few-shot learners","volume-title":"Proc. 59th Annu. Meeting Assoc. Comput. Linguistics 11th Int. Joint Conf. Natural Lang. Process. (Volume 1: Long Papers)","author":"Gao","year":"2021"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"148","DOI":"10.18653\/v1\/2022.acl-short.17","article-title":"The power of prompt tuning for low-resource semantic parsing","volume-title":"Proc. 60th Annu. Meeting Assoc. Comput. Linguistics (Volume 2: Short Papers)","author":"Schucher","year":"2022"},{"key":"ref59","first-page":"4222","article-title":"AutoPrompt: Eliciting knowledge from language models with automatically generated prompts","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Shin","year":"2020"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"8410","DOI":"10.18653\/v1\/2022.acl-long.576","article-title":"PPT: Pre-trained prompt tuning for few-shot learning","volume-title":"Proc. 60th Annu. Meeting Assoc. Comput. Linguistics (Volume 1: Long Papers)","author":"Gu","year":"2022"},{"key":"ref61","first-page":"4582","article-title":"Prefix-tuning: Optimizing continuous prompts for generation","volume-title":"Proc. 59th Annu. Meeting Assoc. Comput. Linguistics 11th Int. Joint Conf. Natural Lang. Process. (Volume 1: Long Papers)","author":"Li","year":"2021"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"key":"ref63","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol., Volume 1 (Long Short Papers)","author":"Devlin","year":"2019"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"13509","DOI":"10.18653\/v1\/2023.acl-long.755","article-title":"Disentangled phonetic representation for Chinese spelling correction","volume-title":"Proc. 61st Annu. Meeting Assoc. Comput. Linguistics (Volume 1: Long Papers)","author":"Liang","year":"2023"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref67","article-title":"Mengzi: Towards lightweight yet ingenious pre-trained models for chinese","author":"Zhang","year":"2021"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"716","DOI":"10.18653\/v1\/2021.findings-acl.64","article-title":"Read, listen, and see: Leveraging multimodal information helps Chinese spell checking","volume-title":"Proc. Findings Assoc. Comput. Linguistics: ACL-IJCNLP","author":"Xu","year":"2021"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"882","DOI":"10.18653\/v1\/2020.acl-main.82","article-title":"Spelling error correction with soft-masked BERT","volume-title":"Proc. 58th Annu. Meeting Assoc. Comput. Linguistics","author":"Zhang","year":"2020"},{"key":"ref70","first-page":"1244","article-title":"MDCSpell: A multi-task detector-corrector framework for Chinese spelling correction","volume-title":"Proc. Findings Assoc. Comput. Linguistics: ACL","author":"Zhu","year":"2022"},{"key":"ref71","first-page":"483","article-title":"mT5: A massively multilingual pre-trained text-to-text transformer","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Xue","year":"2021"},{"key":"ref72","first-page":"16780","article-title":"RobustGEC: Robust grammatical error correction against subtle context perturbation","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process.","author":"Zhang","year":"2023"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"871","DOI":"10.18653\/v1\/2020.acl-main.81","article-title":"SpellGCN: Incorporating phonological and visual similarities into language models for Chinese spelling check","volume-title":"Proc. 58th Annu. Meeting Assoc. Comput. Linguistics","author":"Cheng","year":"2020"}],"container-title":["IEEE\/ACM Transactions on Audio, Speech, and Language Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6570655\/10304349\/10557151.pdf?arnumber=10557151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T04:39:24Z","timestamp":1719895164000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10557151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/taslp.2024.3414333","relation":{},"ISSN":["2329-9290","2329-9304"],"issn-type":[{"value":"2329-9290","type":"print"},{"value":"2329-9304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}