Ajou University repository

An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platformsoa mark
Citations

SCOPUS

1

Citation Export

Publication Year
2023-01-01
Publisher
Tech Science Press
Citation
Computer Systems Science and Engineering, Vol.47, pp.2869-2894
Keyword
Adversarial attackbeam searchcharacter-level attackphonetic similaritysocial mediatext classificationvisual similarityword importance rank
Mesh Keyword
Adversarial attackBeam searchCharacter levelCharacter-level attackPhonetic similaritySocial mediaSocial media platformsText classificationVisual similarityWord importance rank
All Science Classification Codes (ASJC)
Control and Systems EngineeringTheoretical Computer ScienceComputer Science (all)
Abstract
In recent years, the growing popularity of social media platforms has led to several interesting natural language processing (NLP) applications. However, these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning (ML) and NLP techniques. This work presents a new low-level adversarial attack recipe inspired by textual variations in online social media communication. These variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible form. The intuition of the proposed scheme is to generate adversarial examples influenced by human cognition in text generation on social media platforms while preserving human robustness in text understanding with the fewest possible perturbations. The intentional textual variations introduced by users in online communication motivate us to replicate such trends in attacking text to see the effects of such widely used textual variations on the deep learning classifiers. In this work, the four most commonly used textual variations are chosen to generate adversarial examples. Moreover, this article introduced a word importance ranking-based beam search algorithm as a searching method for the best possible perturbation selection. The effectiveness of the proposed adversarial attacks has been demonstrated on four benchmark datasets in an extensive experimental setup.
ISSN
0267-6192
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/33792
DOI
https://doi.org/10.32604/csse.2023.040159
Fulltext

Type
Article
Funding
Funding Statement: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT)(No. NRF-2022R1A2C1007434), and also by the BK21 FOUR Program of the NRF of Korea funded by the Ministry of Education (NRF5199991014091).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Sohn, Kyung-Ah Image
Sohn, Kyung-Ah손경아
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.