Textual Adversarial Attacking with Limited Queries

نویسندگان

چکیده

Recent studies have shown that natural language processing (NLP) models are vulnerable to adversarial examples, which maliciously designed by adding small perturbations benign inputs imperceptible the human eye, leading false predictions target model. Compared character- and sentence-level textual attacks, word-level attack can generate higher-quality especially in a black-box setting. However, existing methods usually require huge number of queries successfully deceive model, is costly real scenario. Hence, finding appropriate difficult. Therefore, we propose novel method, main idea fully utilize examples generated local model transfer part complete ahead time, thereby reducing costs related attacking Extensive experiments conducted on three public benchmarks show our method not only improve success rate but also reduce cost, while outperforming baselines significant margin.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Note on Attacking Object Detectors with Adversarial Stickers

Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist...

متن کامل

People Search with Textual Queries About Clothing Appearance Attributes

Person re-identification consists of searching for an individual of interest in video sequences acquired by a camera network, using an image of that individual as a query. Here we consider a related task, named people search with textual queries, which consists of searching images of individuals that match a textual description of clothing appearance, given by a Boolean combination of predefine...

متن کامل

A Textual processor to handle ATIS queries

This paper describes the initial development of a natural language text processor, as the first step in an INRS dialogue-by-voice system. The eventual system will accept natural, spontaneous speech from users and produce responses from the databases in the form of synthetic speech. This paper reports results in processing the textual version of ATIS (Air Travel Information System) queries. The ...

متن کامل

Open Problem: Adversarial Multiarmed Bandits with Limited Advice

Adversarial multiarmed bandits with expert advice is one of the fundamental problems in studying the exploration-exploitation trade-off. It is known that if we observe the advice of all experts on every round we can achieve O (√ KT lnN ) regret, where K is the number of arms, T is the number of game rounds, and N is the number of experts. It is also known that if we observe the advice of just o...

متن کامل

Hybrid-LSH for Spatio-Textual Similarity Queries

Locality Sensitive Hashing (LSH) is a popular method for high dimensional indexing and search over large datasets. However, little efforts have put forward to utilizing LSH in mobile applications for processing spatio-textual similarity queries, such as find nearby shopping centers that have a top ranked hair salon. In this paper, we present hybrid-LSH, a new LSH method for indexing data object...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2021

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics10212671