{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:40Z","timestamp":1750309540972,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,21]]},"DOI":"10.1145\/3728725.3728734","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T21:00:02Z","timestamp":1749070802000},"page":"50-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Building Specialized Adversarial Examples for Improved Spelling Error Correction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1293-9347","authenticated-orcid":false,"given":"Xiaoyu","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1717-8476","authenticated-orcid":false,"given":"Weidong","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9184-2742","authenticated-orcid":false,"given":"Liqing","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.3115\/1075218.1075249"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2203.11201"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.2210.05968"},{"key":"e_1_3_3_1_4_2","first-page":"2858","article-title":"Improving Grammatical Error Correction Models with Purpose-Built Adversarial Examples","author":"Lihao W.","year":"2020","unstructured":"Lihao, W., & Xiaoqing, Z. 2020. Improving Grammatical Error Correction Models with Purpose-Built Adversarial Examples. Computer Science: 2858-2869. https:\/\/aclanthology.org\/2020.emnlp-main.228","journal-title":"Computer Science"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Chong L. Cenyuan Z. Xiaoqing Z. & Xuanjing H. 2021. Exploration and Exploitation: Two Ways to Improve Chinese Spelling Correction Models. Computer Science abs\/2105.14813: 441-446. 10.18653\/v1\/2021.acl-short.56","DOI":"10.18653\/v1\/2021.acl-short.56"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSE.2012.6257223"},{"volume-title":"y., shengfeng, l., meirong, w., wenyi, c., & maochuan, s","year":"2013","key":"e_1_3_3_1_7_2","unstructured":"juifeng, y., shengfeng, l., meirong, w., wenyi, c., & maochuan, s. 2013. Chinese Word Spelling Correction Based on N-gram Ranked Inverted Index List. SIGHAN@IJCNLP 2013: 43-48. https:\/\/aclanthology.org\/W13-4407"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-6835"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-5522"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.82"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-acl.98"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.394"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Shirong M. Yinghui L. Haojing H. Shulin H. Yangning L. Hai-Tao Z. & Ying S. 2023. Progressive Multi-task Learning Framework for Chinese Text Error Correction. CoRR abs\/2306.17447. 10.48550\/arXiv.2306.17447","DOI":"10.48550\/arXiv.2306.17447"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Haojing H. Jingheng Y. Qingyu Z. Yinghui L. Yangning L. Feng Z. & Hai-Tao Z. 2023. A Frustratingly Easy Plug-and-Play Detection-and-Reasoning Module for Chinese Spelling Check. CoRR abs\/2310.09119: 11514-11525. 10.48550\/arXiv.2310.09119","DOI":"10.48550\/arXiv.2310.09119"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2210.10996"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn55064.2022.9892297"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.2305.14783"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.14166"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.2210.10320"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1459"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Yong H. Fandong M. & Jie Z. 2022. CSCD-IME: Correcting Spelling Errors Generated by Pinyin IME. CoRR. 10.48550\/arXiv.2211.08788","DOI":"10.48550\/arXiv.2211.08788"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2305.17721"},{"volume-title":"w., chaolin, l., & lunghao, l","year":"2013","key":"e_1_3_3_1_24_2","unstructured":"shihhung, w., chaolin, l., & lunghao, l. 2013. Chinese Spelling Check Evaluation at SIGHAN Bake-off 2013. SIGHAN@IJCNLP 2013: 35-42. https:\/\/dblp.uni-trier.de\/rec\/conf\/acl-sighan\/WuLL13.html"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-6820"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W15-3106"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564271"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29829"}],"event":{"name":"GAIIS 2025: 2025 2nd International Conference on Generative Artificial Intelligence and Information Security","acronym":"GAIIS 2025","location":"Hangzhou China"},"container-title":["Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728725.3728734","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728725.3728734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:36Z","timestamp":1750295916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728725.3728734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,21]]},"references-count":28,"alternative-id":["10.1145\/3728725.3728734","10.1145\/3728725"],"URL":"https:\/\/doi.org\/10.1145\/3728725.3728734","relation":{},"subject":[],"published":{"date-parts":[[2025,2,21]]},"assertion":[{"value":"2025-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}