{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:09:29Z","timestamp":1765544969296,"version":"3.40.5"},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"type":"electronic","value":"9781643685489"}],"license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,16]]},"abstract":"<jats:p>Text steganography involves discreetly concealing sensitive messages within natural text, while text steganalysis serves as its counterpart by aiming to detect suspicious text that may contain embedded secret information. Detecting steganographic text has become increasingly difficult because evolving steganographic algorithms produce ever-changing text distributions. Consequently, few-shot text steganalysis, which identifies steganographic text with scarce examples regardless of its distribution has become a research hotspot. The state-of-the-art few-shot text steganalysis relies on the inter-class variance between classes, i.e., they behave satisfactorily in detecting large-variance classes while being incompetent in distinguishing confusable samples from similar steganographic settings. In this paper, we propose an Adversary-Refinement Framework for Text Steganalysis, namely ARTS, which employs a task-invariant extractor and a task-relevant projector to implement an \u201cattract and repel\u201d process. Specifically, in the \u201cattract\u201d stage, we align task-invariant features through adversarial training to shorten the intra-class distance. Afterward, the refined prototypes are projected to a new space in the \u201crepel\u201d stage, and then a refined penalty item is applied to enlarge the inter-class distance. Extensive experiments conducted in six datasets with different inter-class variances demonstrate the superiority of the proposed model over the SOTA models.<\/jats:p>","DOI":"10.3233\/faia240698","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T13:08:13Z","timestamp":1729170493000},"source":"Crossref","is-referenced-by-count":1,"title":["Domain Adaptational Steganographic Text Detection Using Few-Shot Adversary-Refinement Framework"],"prefix":"10.3233","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6194-2419","authenticated-orcid":false,"given":"Zhang","family":"Ziwei","sequence":"first","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4199-2988","authenticated-orcid":false,"given":"Wen","family":"Juan","sequence":"additional","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6366-9838","authenticated-orcid":false,"given":"Zhou","family":"Yinghan","sequence":"additional","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6659-382X","authenticated-orcid":false,"given":"Gao","family":"Liting","sequence":"additional","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6500-3868","authenticated-orcid":false,"given":"Xue","family":"Yiming","sequence":"additional","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","ECAI 2024"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA240698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T13:08:13Z","timestamp":1729170493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA240698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"ISBN":["9781643685489"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia240698","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"type":"print","value":"0922-6389"},{"type":"electronic","value":"1879-8314"}],"subject":[],"published":{"date-parts":[[2024,10,16]]}}}