Generating Natural Language Adversarial Examples Based on the Approximating Top-K Combination Token Substitution

  • Panfeng Qiu
  • , Xi Wu
  • , Yongxin Zhao*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Deep Neural Networks (DNNs) have been widely used in Natural Language Processing (NLP) applications. However, due to the lack of interpretability, recent studies have shown that the DNN-based models used in NLP are vulnerable to adversarial attacks by adding subtle perturbations into inputs. Among the various existing adversarial attack methods, it is still challenging on how to maintain the high similarity between generated adversarial text and the original text while ensuring both grammatical correctness and semantic preservation. In this paper, we propose a novel attack method based on the approximating Top-K combination token substitution to generate adversarial text. We extend the sequential substitution that is commonly used in the existing methods into a combination substitution, and combine it with Monte Carlo simulation to significantly expand the search space. Furthermore, based on the part-of-speech information, we combine the synonym token substitution strategy and the language model based substitution strategy to generate adversarial texts that are semantically consistent with the original texts. Extensive experiments illustrate that our method outperforms previous methods regarding attack efficiency, perturbation rate, and semantic similarity. Moreover, training on adversarial samples generated by our approach can effectively improve the robustness of the model.

Original languageEnglish
Title of host publicationProceedings - 24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1675-1681
Number of pages7
ISBN (Electronic)9798350319934
DOIs
StatePublished - 2022
Event24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022 - Chengdu, China
Duration: 18 Dec 202220 Dec 2022

Publication series

NameProceedings - 24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022

Conference

Conference24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
Country/TerritoryChina
CityChengdu
Period18/12/2220/12/22

Keywords

  • Adversarial Attack
  • Natural Language Processing
  • Robustness
  • Token Substitution

Fingerprint

Dive into the research topics of 'Generating Natural Language Adversarial Examples Based on the Approximating Top-K Combination Token Substitution'. Together they form a unique fingerprint.

Cite this