{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T06:31:11Z","timestamp":1721370671148},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11704-023-2639-2","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T02:02:04Z","timestamp":1702864924000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A prompt-based approach to adversarial example generation and robustness enhancement"],"prefix":"10.1007","volume":"18","author":[{"given":"Yuting","family":"Yang","sequence":"first","affiliation":[]},{"given":"Pei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jintao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"issue":"1","key":"2639_CR1","doi-asserted-by":"publisher","first-page":"171303","DOI":"10.1007\/s11704-022-1244-0","volume":"17","author":"J Qiang","year":"2023","unstructured":"Qiang J, Zhang F, Li Y, Yuan Y, Zhu Y, Wu X. Unsupervised statistical text simplification using pre-trained language modeling for initialization. Frontiers of Computer Science, 2023, 17(1): 171303","journal-title":"Frontiers of Computer Science"},{"issue":"1","key":"2639_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s11704-013-1266-8","volume":"7","author":"L Kang","year":"2013","unstructured":"Kang L, Wu L, Yang Y H. A novel unsupervised approach for multilevel image clustering from unordered image collection. Frontiers of Computer Science, 2013, 7(1): 69\u201382","journal-title":"Frontiers of Computer Science"},{"key":"2639_CR3","doi-asserted-by":"crossref","unstructured":"Huang P, Yang Y, Jia F, Liu M, Ma F, Zhang J. Word level robustness enhancement: fight perturbation with perturbation. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence. 2022, 10785\u201310793","DOI":"10.1609\/aaai.v36i10.21324"},{"key":"2639_CR4","doi-asserted-by":"crossref","unstructured":"Huang P, Yang Y, Liu M, Jia F, Ma F, Zhang J. e-weakened robustness of deep neural networks. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. 2022, 126\u2013138","DOI":"10.1145\/3533767.3534373"},{"key":"2639_CR5","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhang J, Chen Z, He K. Crafting adversarial examples for neural machine translation. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL\/IJCNLP 2021, (Volume 1: Long Papers). 2021, 1967\u20131977","DOI":"10.18653\/v1\/2021.acl-long.153"},{"key":"2639_CR6","doi-asserted-by":"crossref","unstructured":"Zheng X, Zeng J, Zhou Y, Hsieh C, Cheng M, Huang X. Evaluating and enhancing the robustness of neural network-based dependency parsing models with adversarial examples. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. 2020, 6600\u20136610","DOI":"10.18653\/v1\/2020.acl-main.590"},{"key":"2639_CR7","doi-asserted-by":"crossref","unstructured":"Lin J, Zou J, Ding N. Using adversarial attacks to reveal the statistical bias in machine reading comprehension models. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). 2021, 333\u2013342","DOI":"10.18653\/v1\/2021.acl-short.43"},{"key":"2639_CR8","doi-asserted-by":"crossref","unstructured":"Cheng M, Wei W, Hsieh C J. Evaluating and enhancing the robustness of dialogue systems: a case study on a negotiation agent. In: Proceedings of 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). 2019, 3325\u20133335","DOI":"10.18653\/v1\/N19-1336"},{"key":"2639_CR9","unstructured":"Devlin J, Chang M, Lee K, Toutanova K. BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). 2019, 4171\u20134186"},{"key":"2639_CR10","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V. Roberta: a robustly optimized BERT pretraining approach. 2019, arXiv preprint arXiv: 1907.11692"},{"key":"2639_CR11","unstructured":"Liu P, Yuan W, Fu J, Jiang Z, Hayashi H, Neubig G. Pre-train, prompt, and predict: a systematic survey of prompting methods in natural language processing. 2021, arXiv preprint arXiv: 2107.13586"},{"key":"2639_CR12","doi-asserted-by":"crossref","unstructured":"Xu J, Ju D, Li M, Boureau Y L, Weston J, Dinan E. Bot-adversarial dialogue for safe conversational agents. In: Proceedings of 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2021, 2950\u20132968","DOI":"10.18653\/v1\/2021.naacl-main.235"},{"key":"2639_CR13","doi-asserted-by":"crossref","unstructured":"Bartolo M, Thrush T, Jia R, Riedel S, Stenetorp P, Kiela D. Improving question answering model robustness with synthetic adversarial data generation. In: Proceedings of 2021 Conference on Empirical Methods in Natural Language Processing. 2021, 8830\u20138848","DOI":"10.18653\/v1\/2021.emnlp-main.696"},{"key":"2639_CR14","doi-asserted-by":"crossref","unstructured":"Perez E, Huang S, Song H F, Cai T, Ring R, Aslanides J, Glaese A, McAleese N, Irving G. Red teaming language models with language models. In: Proceedings of 2022 Conference on Empirical Methods in Natural Language Processing. 2022","DOI":"10.18653\/v1\/2022.emnlp-main.225"},{"key":"2639_CR15","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A. Towards deep learning models resistant to adversarial attacks. In: Proceedings of the 6th International Conference on Learning Representations. 2018"},{"key":"2639_CR16","unstructured":"Maas A L, Daly R E, Pham P T, Huang D, Ng A Y, Potts C. Learning word vectors for sentiment analysis. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. 2011, 142\u2013150"},{"key":"2639_CR17","doi-asserted-by":"crossref","unstructured":"Jin D, Jin Z, Zhou J T, Szolovits P. Is BERT really robust? A strong baseline for natural language attack on text classification and entailment. In: Proceedings of the 34th AAAI Conference on Artificial Intelligence. 2020, 8018\u20138025","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"2639_CR18","doi-asserted-by":"crossref","unstructured":"Gao T, Fisch A, Chen D. Making pre-trained language models better few-shot learners. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL\/IJCNLP 2021, (Volume 1: Long Papers). 2021, 3816\u20133830","DOI":"10.18653\/v1\/2021.acl-long.295"},{"key":"2639_CR19","doi-asserted-by":"crossref","unstructured":"Schick T, Sch\u00fctze H. Exploiting cloze-questions for few-shot text classification and natural language inference. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume. 2021, 255\u2013269","DOI":"10.18653\/v1\/2021.eacl-main.20"},{"key":"2639_CR20","doi-asserted-by":"crossref","unstructured":"Li X L, Liang P. Prefix-tuning: Optimizing continuous prompts for generation. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL\/IJCNLP 2021, (Volume 1: Long Papers). 2021, 4582\u20134597","DOI":"10.18653\/v1\/2021.acl-long.353"},{"key":"2639_CR21","doi-asserted-by":"crossref","unstructured":"Dou Z, Liu P, Hayashi H, Jiang Z, Neubig G. GSum: a general framework for guided neural abstractive summarization. In: Proceedings of 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2021, 4830\u20134842","DOI":"10.18653\/v1\/2021.naacl-main.384"},{"key":"2639_CR22","doi-asserted-by":"crossref","unstructured":"Yang Y, Lei W, Huang P, Cao J, Li J, Chua T. A dual prompt learning framework for few-shot dialogue state tracking. In: Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023\u20134 May 2023. 2023, 1468\u20131477","DOI":"10.1145\/3543507.3583238"},{"key":"2639_CR23","doi-asserted-by":"crossref","unstructured":"Wang X, Yang Y, Deng Y, He K. Adversarial training with fast gradient projection method against synonym substitution based text attacks. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence. 2021, 13997\u201314005","DOI":"10.1609\/aaai.v35i16.17648"},{"key":"2639_CR24","doi-asserted-by":"crossref","unstructured":"Alzantot M, Sharma Y, Elgohary A, Ho B H, Srivastava M B, Chang K W. Generating natural language adversarial examples. In: Proceedings of 2018 Conference on Empirical Methods in Natural Language Processing, Brussels. 2018, 2890\u20132896","DOI":"10.18653\/v1\/D18-1316"},{"key":"2639_CR25","doi-asserted-by":"crossref","unstructured":"Zang Y, Qi F, Yang C, Liu Z, Zhang M, Liu Q, Sun M. Word-level textual adversarial attacking as combinatorial optimization. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. 2020, 6066\u20136080","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"2639_CR26","doi-asserted-by":"crossref","unstructured":"Ren S, Deng Y, He K, Che W. Generating natural language adversarial examples through probability weighted word saliency. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. 2019, 1085\u20131097","DOI":"10.18653\/v1\/P19-1103"},{"key":"2639_CR27","unstructured":"Yang Y, Huang P, Ma F, Cao J, Zhang M, Zhang J, Li J. Quantifying robustness to adversarial word substitutions. 2022, arXiv preprint arXiv: 2201.03829v1"},{"key":"2639_CR28","doi-asserted-by":"crossref","unstructured":"Li D, Zhang Y, Peng H, Chen L, Brockett C, Sun M T, Dolan B. Contextualized perturbation for textual adversarial attack. In: Proceedings of 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2021, 5053\u20135069","DOI":"10.18653\/v1\/2021.naacl-main.400"},{"key":"2639_CR29","doi-asserted-by":"crossref","unstructured":"Li L, Ma R, Guo Q, Xue X, Qiu X. BERT-ATTACK: adversarial attack against BERT using BERT. In: Proceedings of 2020 Conference on Empirical Methods in Natural Language Processing. 2020, 6193\u20136202","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"2639_CR30","doi-asserted-by":"crossref","unstructured":"Garg S, Ramakrishnan G. BAE: BERT-based adversarial examples for text classification. In: Proceedings of 2020 Conference on Empirical Methods in Natural Language Processing. 2020, 6174\u20136181","DOI":"10.18653\/v1\/2020.emnlp-main.498"},{"key":"2639_CR31","doi-asserted-by":"crossref","unstructured":"Mozes M, Stenetorp P, Kleinberg B, Griffin L D. Frequency-guided word substitutions for detecting textual adversarial examples. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume. 2021, 171\u2013186","DOI":"10.18653\/v1\/2021.eacl-main.13"},{"key":"2639_CR32","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang J, Chang K W, Wang W. Learning to discriminate perturbations for blocking adversarial attacks in text classification. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. 2019, 4903\u20134912","DOI":"10.18653\/v1\/D19-1496"},{"key":"2639_CR33","unstructured":"Miyato T, Dai A M, Goodfellow I J. Adversarial training methods for semi-supervised text classification. In: Proceedings of the 5th International Conference on Learning Representations. 2017"},{"key":"2639_CR34","doi-asserted-by":"crossref","unstructured":"Jia R, Raghunathan A, G\u00f6ksel K, Liang P. Certified robustness to adversarial word substitutions. In: Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. 2019, 4129\u20134142","DOI":"10.18653\/v1\/D19-1423"},{"key":"2639_CR35","unstructured":"Dong X, Luu A T, Ji R, Liu H. Towards robustness against natural language word substitutions. In: Proceedings of the 9th International Conference on Learning Representations. 2021"},{"key":"2639_CR36","doi-asserted-by":"crossref","unstructured":"Pang B, Lee L. Seeing stars: exploiting class relationships for sentiment categorization with respect to rating scales. In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics. 2005, 115\u2013124","DOI":"10.3115\/1219840.1219855"},{"key":"2639_CR37","doi-asserted-by":"crossref","unstructured":"Bowman S R, Angeli G, Potts C, Manning C D. A large annotated corpus for learning natural language inference. In: Proceedings of 2015 Conference on Empirical Methods in Natural Language Processing. 2015, 632\u2013642","DOI":"10.18653\/v1\/D15-1075"},{"key":"2639_CR38","doi-asserted-by":"crossref","unstructured":"Lewis M, Liu Y, Goyal N, Ghazvininejad M, Mohamed A, Levy O, Stoyanov V, Zettlemoyer L. BART: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. 2020, 7871\u20137880","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"2639_CR39","doi-asserted-by":"publisher","DOI":"10.1142\/5935","volume-title":"Hownet and the Computation of Meaning","author":"Z Dong","year":"2006","unstructured":"Dong Z, Dong Q. Hownet and the Computation of Meaning. Singapore: World Scientific Publishing Co. Pte. Ltd., 2006"},{"key":"2639_CR40","volume-title":"Integer and Combinatorial Optimization","author":"L A Wolsey","year":"1999","unstructured":"Wolsey L A, Nemhauser G L. Integer and Combinatorial Optimization. New York: Wiley-Interscience, 1999"},{"key":"2639_CR41","unstructured":"Kingma D P, Ba J. Adam: A method for stochastic optimization. In: Proceedings of the 3rd International Conference on Learning Representations. 2015"},{"key":"2639_CR42","doi-asserted-by":"crossref","unstructured":"Conneau A, Kiela D, Schwenk H, Barrault L, Bordes A. Supervised learning of universal sentence representations from natural language inference data. In: Proceedings of 2017 Conference on Empirical Methods in Natural Language Processing. 2017, 670\u2013680","DOI":"10.18653\/v1\/D17-1070"},{"key":"2639_CR43","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning C D. Glove: Global vectors for word representation. In: Proceedings of 2014 Conference on Empirical Methods in Natural Language Processing. 2014, 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2639-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-023-2639-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2639-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T02:07:00Z","timestamp":1702865220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-023-2639-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["2639"],"URL":"https:\/\/doi.org\/10.1007\/s11704-023-2639-2","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,18]]},"assertion":[{"value":"22 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"184318"}}