|
|
Exploiting natural language services: a polarity based black-box attack |
Fatma GUMUS1,2(), M. Fatih AMASYALI1 |
1. Department of Computer Engineering, Yildiz Technical University, Istanbul 34220, Turkey 2. Department of Computer Engineering, Air Force Academy, National Defence University, Istanbul 34149,Turkey |
|
|
|
Corresponding Author(s):
Fatma GUMUS
|
Just Accepted Date: 26 March 2021
Issue Date: 24 December 2021
|
|
1 |
J Gao, J Lanchantin, M L Soffa, Y Qi. Black-box generation of adversarial text sequences to evade deep learning classifiers. In: Proceedings of 2018 IEEE Security and Privacy Workshops (SPW). 2018, 50– 56
|
2 |
P Vijayaraghavan, D Roy. Generating black-box adversarial examples for text classifiers using a deep reinforced model. In: Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 2019, 711– 726
|
3 |
M Alzantot, Y Sharma, A Elgohary, B J Ho, M Srivastava, K W Chang. Generating natural language adversarial examples. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. 2018, 2890−2896
|
4 |
X Zhang, J Zhao, Y LeCun. Character-level convolutional networks for text classification. Advances in neural information processing systems, 2015, 649– 657
|
5 |
A L Maas, R E Daly, P T Pham, D Huang, A Y Ng, C Potts. Learning word vectors for sentiment analysis. In: Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1. 2011, 142– 150
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|