{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T04:24:00Z","timestamp":1774239840276,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472057"],"award-info":[{"award-number":["62472057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20463"],"award-info":[{"award-number":["U21A20463"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chengdu Key Research and Development Support Program","award":["2023-YF11-00062-HZ"],"award-info":[{"award-number":["2023-YF11-00062-HZ"]}]},{"DOI":"10.13039\/501100019084","name":"Chongqing Municipal Transportation Commission","doi-asserted-by":"publisher","award":["CQJT-CZKJ2024-03"],"award-info":[{"award-number":["CQJT-CZKJ2024-03"]}],"id":[{"id":"10.13039\/501100019084","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3594037","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:50:15Z","timestamp":1753901415000},"page":"8096-8108","source":"Crossref","is-referenced-by-count":1,"title":["Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3282-8062","authenticated-orcid":false,"given":"Chunlong","family":"Xie","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8643-0647","authenticated-orcid":false,"given":"Jialing","family":"He","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0617-455X","authenticated-orcid":false,"given":"Ying","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of High Performance Computing (IHPC) and the Centre for Frontier AI Research (CFAR), Agency for Science, Technology and Research (A*STAR), Fusionopolis, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-5308","authenticated-orcid":false,"given":"Shangwei","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6595-6650","authenticated-orcid":false,"given":"Tianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4623","authenticated-orcid":false,"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"HuggingFace\u2019s transformers: State-of-the-art natural language processing","author":"Wolf","year":"2019","journal-title":"arXiv:1910.03771"},{"key":"ref2","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3182979"},{"key":"ref5","article-title":"BadNL: Backdoor attacks against NLP models","volume-title":"Proc. ICML Workshop Adversarial Mach. Learn. (ICML)","author":"Chen"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.430"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.659"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3055844"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833579"},{"key":"ref12","first-page":"19879","article-title":"Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense","volume-title":"Proc. Int. Conf. Mach. Learn. (ICLR)","author":"Shen"},{"key":"ref13","first-page":"3611","article-title":"Hidden trigger backdoor attack on NLP models via linguistic style manipulation","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Pan"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.377"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.431"},{"key":"ref17","volume-title":"TrojAI Competition","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102433"},{"key":"ref19","first-page":"1","article-title":"ParaFuzz: An interpretability-driven technique for detecting poisoned samples in NLP","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Lu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.464"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1221"},{"key":"ref22","first-page":"1","article-title":"Towards robustness against natural language word substitutions","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dong"},{"key":"ref23","first-page":"2255","article-title":"T-miner: A generative approach to defend against trojan attacks on DNN-based text classification","volume-title":"Proc. USENIX Secur. Symp. (USENIX Security)","author":"Azizi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3402179"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"ref26","first-page":"1","article-title":"BadPre: Task-agnostic backdoor attacks to pre-trained NLP foundation models","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Chen"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.374"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.55"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3376968"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref32","first-page":"1","article-title":"Categorical reparameterization with gumbel-softmax","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Jang"},{"key":"ref33","first-page":"50992","article-title":"On discrete prompt optimization for diffusion models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.35111\/9fx9-gz10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119195"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3115\/1614049.1614064"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1264"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.442"},{"issue":"8","key":"ref40","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"key":"ref41","article-title":"DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter","author":"Sanh","year":"2019","journal-title":"arXiv:1910.01108"},{"key":"ref42","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.195"},{"key":"ref45","first-page":"2158","article-title":"ELECTRA: Pre-training text encoders as discriminators rather than generators","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Clark"},{"key":"ref46","first-page":"1","article-title":"BERTScore: Evaluating text generation with BERT","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Zhang"},{"key":"ref47","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics, Hum. Lang. Technol.","author":"Maas"},{"key":"ref48","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11104078.pdf?arnumber=11104078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T17:43:20Z","timestamp":1754588600000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3594037","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}