A Backdoor Attack Against LSTM-Based Text Classification Systems
نویسندگان
چکیده
منابع مشابه
A C-LSTM Neural Network for Text Classification
Neural network models have been demonstrated to be capable of achieving remarkable performance in sentence and document modeling. Convolutional neural network (CNN) and recurrent neural network (RNN) are two mainstream architectures for such modeling tasks, which adopt totally different ways of understanding natural languages. In this work, we combine the strengths of both architectures and pro...
متن کاملSensor Attack Detection and Classification via CNN and LSTM
In recent years, security of autonomous vehicles is emerging as popular research topics. Especially, autonomous vehicles are equipped with many sensors such as GPS, IMU, wheel encoders and some of them are vulnerable to the attack, such as spoofing. Our objective is to detect and classify attacks of the right encoder sensor by using variables of GPS, IMU, two wheel encoder sensors. We also anal...
متن کاملAC-BLSTM: Asymmetric Convolutional Bidirectional LSTM Networks for Text Classification
Recently deeplearning models have been shown to be capable of making remarkable performance in sentences and documents classification tasks. In this work, we propose a novel framework called ACBLSTM for modeling setences and documents, which combines the asymmetric convolution neural network (ACNN) with the Bidirectional Long ShortTerm Memory network (BLSTM). Experiment results demonstrate that...
متن کاملActionable and Political Text Classification using Word Embeddings and LSTM
In this work, we apply word embeddings and neural networks with Long Short-Term Memory (LSTM) to text classification problems, where the classification criteria are decided by the context of the application. We examine two applications in particular. The first is that of Actionability, where we build models to classify social media messages from customers of service providers as Actionable or N...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2941376