{"id":"https://openalex.org/W4381988874","doi":"https://doi.org/10.1016/j.cose.2023.103367","title":"Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis","display_name":"Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4381988874","doi":"https://doi.org/10.1016/j.cose.2023.103367"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2023.103367","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.cose.2023.103367","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100701243","display_name":"Hassan Ali","orcid":"https://orcid.org/0000-0002-1701-0390"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"funder","lineage":["https://openalex.org/I1323252656"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Hassan Ali","raw_affiliation_strings":["Information Technology University (ITU), Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Information Technology University (ITU), Lahore, Pakistan","institution_ids":["https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014862837","display_name":"Muhammad Suleman Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"funder","lineage":["https://openalex.org/I1323252656"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Suleman Khan","raw_affiliation_strings":["Information Technology University (ITU), Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Information Technology University (ITU), Lahore, Pakistan","institution_ids":["https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012890444","display_name":"Amer AlGhadhban","orcid":"https://orcid.org/0000-0003-4350-2759"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"funder","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Amer AlGhadhban","raw_affiliation_strings":["Department of Electrical Engineering, College of Engineering, University of Ha\u2019il, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, University of Ha\u2019il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046631978","display_name":"Meshari Alazmi","orcid":"https://orcid.org/0000-0001-9074-1029"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"funder","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Meshari Alazmi","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha\u2019il, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha\u2019il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046570668","display_name":"Ahmed Alzamil","orcid":"https://orcid.org/0000-0002-1542-5939"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"funder","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmed Alzamil","raw_affiliation_strings":["Department of Electrical Engineering, College of Engineering, University of Ha\u2019il, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, University of Ha\u2019il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067154136","display_name":"Khaled A. Al-Utaibi","orcid":"https://orcid.org/0000-0002-3965-5018"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"funder","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khaled Al-utaibi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer Science and Engineering, University of Ha\u2019il, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer Science and Engineering, University of Ha\u2019il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037574053","display_name":"Junaid Qadir","orcid":"https://orcid.org/0000-0001-9466-2475"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"funder","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Junaid Qadir","raw_affiliation_strings":["Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037574053"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":{"value":3190,"currency":"USD","value_usd":3190},"fwci":1.083,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.790601,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"132","issue":null,"first_page":"103367","last_page":"103367"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9732,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.521726},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep Neural Networks","score":0.43097788}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82671785},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7661221},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7468524},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6725785},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.567938},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.521726},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46301624},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.44938132},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.43097788},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35412806},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.35207278},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2023.103367","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Con-Detect_Detecting_Adversarially_Perturbed_Natural_Language_Inputs_to_Deep_Classifiers_Through_Holistic_Analysis/23627976","pdf_url":"https://figshare.com/articles/journal_contribution/Con-Detect_Detecting_Adversarially_Perturbed_Natural_Language_Inputs_to_Deep_Classifiers_Through_Holistic_Analysis/23627976/2/files/42632332.pdf","source":{"id":"https://openalex.org/S4306400572","display_name":"OPAL (Open@LaTrobe) (La Trobe University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I196829312","host_organization_name":"La Trobe University","host_organization_lineage":["https://openalex.org/I196829312"],"host_organization_lineage_names":["La Trobe University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2023.103367","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Quality education","id":"https://metadata.un.org/sdg/4","score":0.54}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W2541711215","https://openalex.org/W2599674900","https://openalex.org/W2799194071","https://openalex.org/W2914874661","https://openalex.org/W2947415936","https://openalex.org/W2947832965","https://openalex.org/W2963083752","https://openalex.org/W2963126915","https://openalex.org/W2963859254","https://openalex.org/W2963997908","https://openalex.org/W3101449015","https://openalex.org/W3104423855","https://openalex.org/W3104570147","https://openalex.org/W3105147370","https://openalex.org/W3119962516","https://openalex.org/W3120562908","https://openalex.org/W3128993100","https://openalex.org/W3160122800","https://openalex.org/W4205185581","https://openalex.org/W4233851189","https://openalex.org/W4239019441","https://openalex.org/W4241766660","https://openalex.org/W4246360676","https://openalex.org/W4254014936","https://openalex.org/W4255564575","https://openalex.org/W4281748497","https://openalex.org/W4289038676","https://openalex.org/W4312056919"],"related_works":["https://openalex.org/W4383221314","https://openalex.org/W4285785480","https://openalex.org/W3203790781","https://openalex.org/W3127875750","https://openalex.org/W3093978547","https://openalex.org/W3080754722","https://openalex.org/W2997056298","https://openalex.org/W2953536436","https://openalex.org/W2950183588","https://openalex.org/W2738001131"],"abstract_inverted_index":{"Deep":[0],"Learning":[1],"(DL)":[2],"algorithms":[3],"have":[4],"shown":[5,28],"wonders":[6],"in":[7,105,227,236,246],"many":[8],"Natural":[9],"Language":[10],"Processing":[11],"(NLP)":[12],"tasks":[13],"such":[14],"as":[15,212,214],"language-to-language":[16],"translation,":[17],"spam":[18],"filtering,":[19],"fake-news":[20,181],"detection,":[21],"and":[22,193,220,242],"comprehension":[23],"understanding.":[24],"However,":[25],"research":[26],"has":[27],"that":[29,82,99,116,130,197,253],"the":[30,59,106,111,117,132,201,217,223,228,237,247],"adversarial":[31,55,73,95,124,144],"vulnerabilities":[32],"of":[33,94,110,123,131,206,240,249],"deep":[34],"learning":[35],"networks":[36],"manifest":[37],"themselves":[38],"when":[39],"DL":[40],"is":[41,61,126,255],"used":[42],"for":[43,71,175,216,222],"NLP":[44,76,147],"tasks.":[45],"Most":[46],"mitigation":[47],"techniques":[48],"proposed":[49],"to":[50,57,75,87,158,211,257],"date":[51],"are":[52],"supervised\u2014relying":[53],"on":[54],"retraining":[56],"improve":[58],"robustness\u2014which":[60],"impractical.":[62],"This":[63],"work":[64],"introduces":[65],"a":[66,89,97,233,243],"novel,":[67],"unsupervised":[68],"detection":[69],"methodology":[70],"detecting":[72,143],"inputs":[74,125],"classifiers.":[77,148],"In":[78],"summary,":[79],"we":[80,114,231],"note":[81,232],"minimally":[83],"perturbing":[84],"an":[85],"input":[86],"change":[88],"model\u2019s":[90],"output\u2014a":[91],"major":[92],"strength":[93],"attacks\u2014is":[96],"weakness":[98],"leaves":[100],"unique":[101],"statistical":[102],"marks":[103],"reflected":[104],"cumulative":[107,118],"contribution":[108,119],"scores":[109],"input.":[112],"Particularly,":[113],"show":[115,196],"score,":[120],"called":[121],"CF-score,":[122],"generally":[127],"greater":[128],"than":[129],"clean":[133],"inputs.":[134],"We":[135,161],"thus":[136],"propose":[137],"Con-Detect\u2014a":[138],"Contribution":[139],"based":[140],"Detection":[141],"method\u2014for":[142],"attacks":[145,208],"against":[146],"Con-Detect":[149,198,254],"can":[150,199],"be":[151],"deployed":[152],"with":[153,163],"any":[154],"classifier":[155],"without":[156],"having":[157],"retrain":[159],"it.":[160],"experiment":[162],"multiple":[164],"attackers\u2014Text-bugger,":[165],"Text-fooler,":[166],"PWWS\u2014on":[167],"several":[168],"architectures\u2014MLP,":[169],"CNN,":[170],"LSTM,":[171],"Hybrid":[172],"CNN-RNN,":[173],"BERT\u2014trained":[174],"different":[176,187,207],"classification":[177],"tasks\u2014IMDB":[178],"sentiment":[179],"classification,":[180,182],"AG":[183],"news":[184],"topic":[185],"classification\u2014under":[186],"threat":[188],"models\u2014Con-Detect-blind":[189],"attacks,":[190,192],"Con-Detect-aware":[191],"Con-Detect-adaptive":[194],"attacks\u2014and":[195],"reduce":[200],"attack":[202],"success":[203],"rate":[204],"(ASR)":[205],"from":[209],"100%":[210,234],"low":[213],"0%":[215],"best":[218],"cases":[219],"\u224870%":[221],"worst":[224,229],"case.":[225],"Even":[226],"case,":[230],"increase":[235,245],"required":[238],"number":[239,248],"queries":[241],"50%":[244],"words":[250],"perturbed,":[251],"suggesting":[252],"hard":[256],"evade.":[258]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4381988874","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4}],"updated_date":"2025-04-22T21:31:02.216595","created_date":"2023-06-26"}