Textual Adversarial Attacking with Limited Queries
نویسندگان
چکیده
Recent studies have shown that natural language processing (NLP) models are vulnerable to adversarial examples, which maliciously designed by adding small perturbations benign inputs imperceptible the human eye, leading false predictions target model. Compared character- and sentence-level textual attacks, word-level attack can generate higher-quality especially in a black-box setting. However, existing methods usually require huge number of queries successfully deceive model, is costly real scenario. Hence, finding appropriate difficult. Therefore, we propose novel method, main idea fully utilize examples generated local model transfer part complete ahead time, thereby reducing costs related attacking Extensive experiments conducted on three public benchmarks show our method not only improve success rate but also reduce cost, while outperforming baselines significant margin.
منابع مشابه
Note on Attacking Object Detectors with Adversarial Stickers
Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist...
متن کاملPeople Search with Textual Queries About Clothing Appearance Attributes
Person re-identification consists of searching for an individual of interest in video sequences acquired by a camera network, using an image of that individual as a query. Here we consider a related task, named people search with textual queries, which consists of searching images of individuals that match a textual description of clothing appearance, given by a Boolean combination of predefine...
متن کاملA Textual processor to handle ATIS queries
This paper describes the initial development of a natural language text processor, as the first step in an INRS dialogue-by-voice system. The eventual system will accept natural, spontaneous speech from users and produce responses from the databases in the form of synthetic speech. This paper reports results in processing the textual version of ATIS (Air Travel Information System) queries. The ...
متن کاملOpen Problem: Adversarial Multiarmed Bandits with Limited Advice
Adversarial multiarmed bandits with expert advice is one of the fundamental problems in studying the exploration-exploitation trade-off. It is known that if we observe the advice of all experts on every round we can achieve O (√ KT lnN ) regret, where K is the number of arms, T is the number of game rounds, and N is the number of experts. It is also known that if we observe the advice of just o...
متن کاملHybrid-LSH for Spatio-Textual Similarity Queries
Locality Sensitive Hashing (LSH) is a popular method for high dimensional indexing and search over large datasets. However, little efforts have put forward to utilizing LSH in mobile applications for processing spatio-textual similarity queries, such as find nearby shopping centers that have a top ranked hair salon. In this paper, we present hybrid-LSH, a new LSH method for indexing data object...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10212671