{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:15Z","timestamp":1774631475765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Russian Foundation for Basic Research","award":["grant 21-51-12005 NNIO\\_a"],"award-info":[{"award-number":["grant 21-51-12005 NNIO\\_a"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467145","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:12:09Z","timestamp":1628748729000},"page":"2868-2878","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Adversarial Attacks on Deep Models for Financial Transaction Records"],"prefix":"10.1145","author":[{"given":"Ivan","family":"Fursov","sequence":"first","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]},{"given":"Matvey","family":"Morozov","sequence":"additional","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]},{"given":"Nina","family":"Kaploukhaya","sequence":"additional","affiliation":[{"name":"Moscow Institute of Physics and Technology, Moscow, Russian Fed."}]},{"given":"Elizaveta","family":"Kovtun","sequence":"additional","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]},{"given":"Rodrigo","family":"Rivera-Castro","sequence":"additional","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]},{"given":"Gleb","family":"Gusev","sequence":"additional","affiliation":[{"name":"Moscow Institute of Physics and Technology, Moscow, Russian Fed."}]},{"given":"Dmitry","family":"Babaev","sequence":"additional","affiliation":[{"name":"Sber AI lab, Moscow, Russian Fed."}]},{"given":"Ivan","family":"Kireev","sequence":"additional","affiliation":[{"name":"Sber AI lab, Moscow, Russian Fed."}]},{"given":"Alexey","family":"Zaytsev","sequence":"additional","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]},{"given":"Evgeny","family":"Burnaev","sequence":"additional","affiliation":[{"name":"Skoltech, Moscow, Russian Fed."}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_2_2_1","volume-title":"Event sequence metric learning. arXiv:2002.08232","author":"Babaev Dmitrii","year":"2020","unstructured":"Dmitrii Babaev , Ivan Kireev , Nikita Ovsov , Mariya Ivanova , Gleb Gusev , and Alexander Tuzhilin . 2020. Event sequence metric learning. arXiv:2002.08232 ( 2020 ). Dmitrii Babaev, Ivan Kireev, Nikita Ovsov, Mariya Ivanova, Gleb Gusev, and Alexander Tuzhilin. 2020. Event sequence metric learning. arXiv:2002.08232 (2020)."},{"key":"e_1_3_2_2_3_1","volume-title":"25th ACM SIGKDD. 2183--2190.","author":"Babaev Dmitrii","unstructured":"Dmitrii Babaev , Maxim Savchenko , Alexander Tuzhilin , and Dmitrii Umerenkov . 2019. ET-RNN: Applying Deep Learning to Credit Loan Applications . In 25th ACM SIGKDD. 2183--2190. Dmitrii Babaev, Maxim Savchenko, Alexander Tuzhilin, and Dmitrii Umerenkov. 2019. ET-RNN: Applying Deep Learning to Credit Loan Applications. In 25th ACM SIGKDD. 2183--2190."},{"key":"e_1_3_2_2_4_1","volume-title":"Adversarial attacks and defences: A survey. preprint arXiv:1810.00069","author":"Chakraborty Anirban","year":"2018","unstructured":"Anirban Chakraborty , Manaar Alam , Vishal Dey , Anupam Chattopadhyay , and Debdeep Mukhopadhyay . 2018. Adversarial attacks and defences: A survey. preprint arXiv:1810.00069 ( 2018 ). Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. preprint arXiv:1810.00069 (2018)."},{"key":"e_1_3_2_2_5_1","volume-title":"BERT: pre-training of deep bidirectional transformers for language understanding. preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018. BERT: pre-training of deep bidirectional transformers for language understanding. preprint arXiv:1810.04805 ( 2018 ). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: pre-training of deep bidirectional transformers for language understanding. preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"J. Ebrahim A. Rao D. Lowd and D. Dou. 2018. Hotflip: white-box adversarial examples for text classification. arXiv:1712.06751 (2018).  J. Ebrahim A. Rao D. Lowd and D. Dou. 2018. Hotflip: white-box adversarial examples for text classification. arXiv:1712.06751 (2018).","DOI":"10.18653\/v1\/P18-2006"},{"key":"e_1_3_2_2_7_1","unstructured":"R. Feinman R. R. Curtin S. Shintre and A. B. Gardner. 2017. Detecting adversarial samples from artifacts. preprint arXiv:1703.00410 (2017).  R. Feinman R. R. Curtin S. Shintre and A. B. Gardner. 2017. Detecting adversarial samples from artifacts. preprint arXiv:1703.00410 (2017)."},{"key":"e_1_3_2_2_8_1","volume-title":"2020 a. Differentiable language model adversarial attacks on categorical sequence classifiers. arXiv:2006.11078","author":"Fursov I.","year":"2020","unstructured":"I. Fursov , A. Zaytsev , N. Kluchnikov , A. Kravchenko , and E. Burnaev . 2020 a. Differentiable language model adversarial attacks on categorical sequence classifiers. arXiv:2006.11078 ( 2020 ). I. Fursov, A. Zaytsev, N. Kluchnikov, A. Kravchenko, and E. Burnaev. 2020 a. Differentiable language model adversarial attacks on categorical sequence classifiers. arXiv:2006.11078 (2020)."},{"key":"e_1_3_2_2_9_1","volume-title":"2020 b. Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world. arXiv:2003.04173","author":"Fursov Ivan","year":"2020","unstructured":"Ivan Fursov , Alexey Zaytsev , Nikita Kluchnikov , Andrey Kravchenko , and Evgeny Burnaev . 2020 b. Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world. arXiv:2003.04173 ( 2020 ). Ivan Fursov, Alexey Zaytsev, Nikita Kluchnikov, Andrey Kravchenko, and Evgeny Burnaev. 2020 b. Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world. arXiv:2003.04173 (2020)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"e_1_3_2_2_11_1","volume-title":"Explaining and harnessing adversarial examples. preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_12_1","unstructured":"R. Huang B. Xu D. Schuurmans and C. Szepesv\u00e1ri. 2015. Learning with a strong adversary. preprint :1511.03034 (2015).  R. Huang B. Xu D. Schuurmans and C. Szepesv\u00e1ri. 2015. Learning with a strong adversary. preprint :1511.03034 (2015)."},{"key":"e_1_3_2_2_13_1","volume-title":"Art of singular vectors and universal adversarial perturbations","author":"Khrulkov Valentin","unstructured":"Valentin Khrulkov and Ivan Oseledets . 2018. Art of singular vectors and universal adversarial perturbations . In IEEE CVPR. 8562--8570. Valentin Khrulkov and Ivan Oseledets. 2018. Art of singular vectors and universal adversarial perturbations. In IEEE CVPR. 8562--8570."},{"key":"e_1_3_2_2_14_1","volume-title":"Adversarial examples in the physical world. preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016. Adversarial examples in the physical world. preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_2_15_1","volume-title":"BERT-attack: adversarial attack against BERT using BERT. arXiv:2004.09984","author":"Li Linyang","year":"2020","unstructured":"Linyang Li , Ruotian Ma , Qipeng Guo , Xiangyang Xue , and Xipeng Qiu . 2020. BERT-attack: adversarial attack against BERT using BERT. arXiv:2004.09984 ( 2020 ). Linyang Li, Ruotian Ma, Qipeng Guo, Xiangyang Xue, and Xipeng Qiu. 2020. BERT-attack: adversarial attack against BERT using BERT. arXiv:2004.09984 (2020)."},{"key":"e_1_3_2_2_16_1","volume-title":"Deep text classification can be fooled. preprint arXiv:1704.08006","author":"Liang Bin","year":"2017","unstructured":"Bin Liang , Hongcheng Li , Miaoqiang Su , Pan Bian , Xirong Li , and Wenchang Shi . 2017. Deep text classification can be fooled. preprint arXiv:1704.08006 ( 2017 ). Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, and Wenchang Shi. 2017. Deep text classification can be fooled. preprint arXiv:1704.08006 (2017)."},{"key":"e_1_3_2_2_17_1","volume-title":"Towards deep learning models resistant to adversarial attacks. preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017. Towards deep learning models resistant to adversarial attacks. preprint arXiv:1706.06083 ( 2017 ). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_2_18_1","unstructured":"J. H. Metzen T. Genewein V. Fischer and B. Bischoff. 2017. On detecting adversarial perturbations. ICLR (2017).  J. H. Metzen T. Genewein V. Fischer and B. Bischoff. 2017. On detecting adversarial perturbations. ICLR (2017)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199"},{"key":"e_1_3_2_2_21_1","volume-title":"Adversarial attack and defense on graph data: a survey. preprint arXiv:1812.10528","author":"Sun Lichao","year":"2018","unstructured":"Lichao Sun , Ji Wang , Philip S Yu , and Bo Li. 2018. Adversarial attack and defense on graph data: a survey. preprint arXiv:1812.10528 ( 2018 ). Lichao Sun, Ji Wang, Philip S Yu, and Bo Li. 2018. Adversarial attack and defense on graph data: a survey. preprint arXiv:1812.10528 (2018)."},{"key":"e_1_3_2_2_22_1","volume-title":"Intriguing properties of neural networks. preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_2_23_1","volume-title":"Towards a Robust Deep Neural Network in Texts: A Survey. preprint arXiv:1902.07285","author":"Wang Wenqi","year":"2019","unstructured":"Wenqi Wang , Benxiao Tang , Run Wang , Lina Wang , and Aoshuang Ye. 2019. Towards a Robust Deep Neural Network in Texts: A Survey. preprint arXiv:1902.07285 ( 2019 ). Wenqi Wang, Benxiao Tang, Run Wang, Lina Wang, and Aoshuang Ye. 2019. Towards a Robust Deep Neural Network in Texts: A Survey. preprint arXiv:1902.07285 (2019)."},{"key":"e_1_3_2_2_24_1","unstructured":"Han Xu Yao Ma Haochen Liu Debayan Deb Hui Liu Jiliang Tang and Anil K.J. 2019. Adversarial attacks and defenses in images graphs and text: a review. arXiv:1909.08072 (2019).  Han Xu Yao Ma Haochen Liu Debayan Deb Hui Liu Jiliang Tang and Anil K.J. 2019. Adversarial attacks and defenses in images graphs and text: a review. arXiv:1909.08072 (2019)."},{"key":"e_1_3_2_2_25_1","volume-title":"Adversarial examples: attacks and defenses for deep learning","author":"Yuan Xiaoyong","year":"2019","unstructured":"Xiaoyong Yuan , Pan He , Qile Zhu , and Xiaolin Li. 2019. Adversarial examples: attacks and defenses for deep learning . IEEE transactions on neural networks and learning systems, Vol. 30 , 9 ( 2019 ), 2805--2824. Xiaoyong Yuan, Pan He, Qile Zhu, and Xiaolin Li. 2019. Adversarial examples: attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems, Vol. 30, 9 (2019), 2805--2824."},{"key":"e_1_3_2_2_26_1","volume-title":"Qile Zhu Pan He, and Xiaolin Li","author":"Yuan Xiaoyong","year":"2017","unstructured":"Xiaoyong Yuan , Qile Zhu Pan He, and Xiaolin Li . 2017 . Adversarial examples: attacks and defenses for deep learning. arXiv:1712.07107 (2017). Xiaoyong Yuan, Qile Zhu Pan He, and Xiaolin Li. 2017. Adversarial examples: attacks and defenses for deep learning. arXiv:1712.07107 (2017)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Mary Zeager Aksheetha Sridhar Nathan Fogal Stephen Adams Donald Brown and Peter Beling. 2017a. Adversarial learning in credit card fraud detection. 112--116. https:\/\/doi.org\/10.1109\/SIEDS.2017.7937699    10.1109\/SIEDS.2017.7937699\nMary Zeager Aksheetha Sridhar Nathan Fogal Stephen Adams Donald Brown and Peter Beling. 2017a. Adversarial learning in credit card fraud detection. 112--116. https:\/\/doi.org\/10.1109\/SIEDS.2017.7937699","DOI":"10.1109\/SIEDS.2017.7937699"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2017.7937699"},{"key":"e_1_3_2_2_29_1","volume-title":"2019 a. Bertscore: Evaluating text generation with bert. preprint arXiv:1904.09675","author":"Zhang T.","year":"2019","unstructured":"T. Zhang , V. Kishore , F. Wu , K.Q. Weinberger , and Y. Artzi . 2019 a. Bertscore: Evaluating text generation with bert. preprint arXiv:1904.09675 ( 2019 ). T. Zhang, V. Kishore, F. Wu, K.Q. Weinberger, and Y. Artzi. 2019 a. Bertscore: Evaluating text generation with bert. preprint arXiv:1904.09675 (2019)."},{"key":"e_1_3_2_2_30_1","volume-title":"2019 b. Adversarial attacks on deep learning models in natural language processing: a survey. preprint arXiv:1901.06796","author":"Zhang Wei Emma","year":"2019","unstructured":"Wei Emma Zhang , Quan Z Sheng , Ahoud Alhazmi , and CHENLIANG LI. 2019 b. Adversarial attacks on deep learning models in natural language processing: a survey. preprint arXiv:1901.06796 ( 2019 ). Wei Emma Zhang, Quan Z Sheng, Ahoud Alhazmi, and CHENLIANG LI. 2019 b. Adversarial attacks on deep learning models in natural language processing: a survey. preprint arXiv:1901.06796 (2019)."}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:27Z","timestamp":1750191507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":30,"alternative-id":["10.1145\/3447548.3467145","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467145","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}