{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:00:43Z","timestamp":1754481643330,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/icassp43922.2022.9747475","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:50:34Z","timestamp":1651089034000},"page":"7837-7841","source":"Crossref","is-referenced-by-count":8,"title":["Block-Sparse Adversarial Attack to Fool Transformer-Based Text Classifiers"],"prefix":"10.1109","author":[{"given":"Sahar","family":"Sadrizadeh","sequence":"first","affiliation":[{"name":"&#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Lausanne,Switzerland"}]},{"given":"Ljiljana","family":"Dolamic","sequence":"additional","affiliation":[{"name":"Armasuisse S+T,Thun,Switzerland"}]},{"given":"Pascal","family":"Frossard","sequence":"additional","affiliation":[{"name":"&#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Lausanne,Switzerland"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-2006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.540"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1316"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"ref17","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"radford","year":"2019","journal-title":"OpenAIRE blog"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2196694"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1101"},{"key":"ref4","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref3","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"ref5","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"2018 International Conference on Learning Representations"},{"article-title":"Adversarial training methods for semi-supervised text classification","year":"2016","author":"miyato","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/601"},{"key":"ref2","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"article-title":"Gradient-based adversarial attacks against text trans-formers","year":"2021","author":"guo","key":"ref9"},{"key":"ref20","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"zhang","year":"2015","journal-title":"Advances in neural information processing systems"},{"article-title":"Universal sentence encoder","year":"2018","author":"cer","key":"ref21"}],"event":{"name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2022,5,23]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,5,27]]}},"container-title":["ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9745891\/9746004\/09747475.pdf?arnumber=9747475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:12:13Z","timestamp":1661199133000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9747475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icassp43922.2022.9747475","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}