{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T01:13:22Z","timestamp":1755825202479,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3652503","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"1672-1680","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Granularity Tibetan Textual Adversarial Attack Method Based on Masked Language Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4429-3327","authenticated-orcid":false,"given":"Xi","family":"Cao","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Tibet University &amp; Collaborative Innovation Center for Tibet Informatization by MOE and Tibet Autonomous Region, Lhasa, Xizang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1984-6770","authenticated-orcid":false,"given":"Nuo","family":"Qun","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Tibet University &amp; Collaborative Innovation Center for Tibet Informatization by MOE and Tibet Autonomous Region, Lhasa, Xizang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3638-6686","authenticated-orcid":false,"given":"Quzong","family":"Gesang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Tibet University &amp; Collaborative Innovation Center for Tibet Informatization by MOE and Tibet Autonomous Region, Lhasa, Xizang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4812-7196","authenticated-orcid":false,"given":"Yulei","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Tibet University &amp; Engineering Research Center of Tibetan Information Technology, Ministry of Education, Lhasa, Xizang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7393-7449","authenticated-orcid":false,"given":"Trashi","family":"Nyima","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Tibet University &amp; Collaborative Innovation Center for Tibet Informatization by MOE and Tibet Autonomous Region, Lhasa, Xizang, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.trustnlp-1.4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC53992.2023.10393961"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-2006"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19--1165"},{"key":"e_1_3_2_2_5_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_2_6_1","first-page":"41","article-title":"Chinese Adversarial Example Generation Guided by Multi-constraints","volume":"37","author":"Han Ziyi","year":"2023","unstructured":"Ziyi Han, Wei Wang, and Shichang Xuan. 2023. Chinese Adversarial Example Generation Guided by Multi-constraints. Journal of Chinese Information Processing , Vol. 37, 2 (2023), 41--52. http:\/\/jcip.cipsc.org.cn\/CN\/Y2023\/V37\/I2\/41","journal-title":"Journal of Chinese Information Processing"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V34I05.6311"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--19--7960--6_10"},{"key":"e_1_3_2_2_10_1","volume-title":"Understanding Neural Networks through Representation Erasure. CoRR","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. Understanding Neural Networks through Representation Erasure. CoRR , Vol. abs\/1612.08220 (2016). showeprint[arXiv]1612.08220 http:\/\/arxiv.org\/abs\/1612.08220"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.006744"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V37I11.26553"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC53654.2022.9945074"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V35I15.17595"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--69005--6_39"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"e_1_3_2_2_17_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2302.12095"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.005765"},{"key":"e_1_3_2_2_20_1","unstructured":"Ziqing Yang Zihang Xu Yiming Cui Baoxin Wang Min Lin Dayong Wu and Zhigang Chen. 2022. CINO: A Chinese Minority Pre-trained Language Model. In Proceedings of the 29th International Conference on Computational Linguistics Nicoletta Calzolari Chu-Ren Huang Hansaem Kim James Pustejovsky Leo Wanner Key-Sun Choi Pum-Mo Ryu Hsin-Hsi Chen Lucia Donatelli Heng Ji Sadao Kurohashi Patrizia Paggio Nianwen Xue Seokhwan Kim Younggyun Hahm Zhong He Tony Kyungil Lee Enrico Santus Francis Bond and Seung-Hoon Na (Eds.). International Committee on Computational Linguistics Gyeongju Republic of Korea 3937--3949. https:\/\/aclanthology.org\/2022.coling-1.346"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V36I4.20303"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548608.3559255"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.11999\/JEIT220563"},{"key":"e_1_3_2_2_24_1","first-page":"71","article-title":"Sentiment Analysis of Tibetan Short Texts Based on Graphical Neural Networks and Pre-training Models","volume":"37","author":"Zhu Yulei","year":"2023","unstructured":"Yulei Zhu, Kazhuo Deji, Nuo Qun, and Tashi Nyima. 2023. Sentiment Analysis of Tibetan Short Texts Based on Graphical Neural Networks and Pre-training Models. Journal of Chinese Information Processing , Vol. 37, 2 (2023), 71--79. http:\/\/jcip.cipsc.org.cn\/CN\/Y2023\/V37\/I2\/71 io","journal-title":"Journal of Chinese Information Processing"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3652503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3652503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:33:20Z","timestamp":1755822800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3652503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":24,"alternative-id":["10.1145\/3589335.3652503","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3652503","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}