{"id":"https://openalex.org/W4281606544","doi":"https://doi.org/10.48550/arxiv.2205.12700","title":"BITE: Textual Backdoor Attacks with Iterative Trigger Injection","display_name":"BITE: Textual Backdoor Attacks with Iterative Trigger Injection","publication_year":2022,"publication_date":"2022-05-25","ids":{"openalex":"https://openalex.org/W4281606544","doi":"https://doi.org/10.48550/arxiv.2205.12700"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2205.12700","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2205.12700","pdf_url":"https://arxiv.org/pdf/2205.12700","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2205.12700","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055987663","display_name":"Jun Yan","orcid":"https://orcid.org/0000-0002-6474-1049"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yan, Jun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033127141","display_name":"Vansh Gupta","orcid":"https://orcid.org/0009-0008-6529-4958"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gupta, Vansh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5009408707","display_name":"Xiang Ren","orcid":"https://orcid.org/0000-0001-8655-663X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ren, Xiang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055987663"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9294999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9233999848365784,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9978308081626892},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8452658653259277},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6803870797157288},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.65213543176651},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6141504049301147},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.5338308215141296},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4568626880645752},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.43572941422462463},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33970528841018677},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15644201636314392},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07170385122299194}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9978308081626892},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8452658653259277},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6803870797157288},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.65213543176651},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6141504049301147},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.5338308215141296},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4568626880645752},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.43572941422462463},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33970528841018677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15644201636314392},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07170385122299194},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2205.12700","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2205.12700","pdf_url":"https://arxiv.org/pdf/2205.12700","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},{"id":"doi:10.48550/arxiv.2205.12700","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2205.12700","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2205.12700","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2205.12700","pdf_url":"https://arxiv.org/pdf/2205.12700","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4328053081","https://openalex.org/W3086120435","https://openalex.org/W2989852175","https://openalex.org/W4288797976","https://openalex.org/W4287183950","https://openalex.org/W3132644649","https://openalex.org/W3213133223","https://openalex.org/W4205710429"],"abstract_inverted_index":{"Backdoor":[0],"attacks":[1],"have":[2],"become":[3],"an":[4],"emerging":[5],"threat":[6],"to":[7,37,57,68,90,128,197],"NLP":[8],"systems.":[9],"By":[10],"providing":[11],"poisoned":[12,121],"training":[13,88,122,170],"data,":[14],"the":[15,22,45,87,95,113,125,130,139,166],"adversary":[16],"can":[17],"embed":[18],"a":[19,35,41,59,74,82,99,175],"\"backdoor\"":[20],"into":[21,112],"victim":[23,126],"model,":[24],"which":[25,186],"allows":[26],"input":[27],"instances":[28,115],"satisfying":[29],"certain":[30],"textual":[31],"patterns":[32],"(e.g.,":[33],"containing":[34,135],"keyword)":[36],"be":[38],"predicted":[39],"as":[40],"target":[42,96,131],"label":[43,97,132],"of":[44,101,168],"adversary's":[46],"choice.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51],"demonstrate":[52],"that":[53,62,85,148],"it":[54],"is":[55,63,152],"possible":[56],"design":[58],"backdoor":[60,83,200],"attack":[61,76,84,151],"both":[64],"stealthy":[65],"(i.e.,":[66,72],"hard":[67],"notice)":[69],"and":[70,98,110,194],"effective":[71,155],"has":[73],"high":[75],"success":[77],"rate).":[78],"We":[79,172],"propose":[80,174],"BITE,":[81],"poisons":[86],"data":[89,123],"establish":[91],"strong":[92],"correlations":[93],"between":[94],"set":[100],"\"trigger":[102],"words\".":[103],"These":[104],"trigger":[105,136,183],"words":[106],"are":[107],"iteratively":[108],"identified":[109],"injected":[111],"target-label":[114],"through":[116],"natural":[117],"word-level":[118],"perturbations.":[119],"The":[120],"instruct":[124],"model":[127],"predict":[129],"on":[133,142,165,181],"inputs":[134],"words,":[137],"forming":[138],"backdoor.":[140],"Experiments":[141],"four":[143],"text":[144],"classification":[145],"datasets":[146],"show":[147],"our":[149],"proposed":[150],"significantly":[153],"more":[154],"than":[156],"baseline":[157],"methods":[158,189],"while":[159],"maintaining":[160],"decent":[161],"stealthiness,":[162],"raising":[163],"alarm":[164],"usage":[167],"untrusted":[169],"data.":[171],"further":[173],"defense":[176],"method":[177],"named":[178],"DeBITE":[179],"based":[180],"potential":[182],"word":[184],"removal,":[185],"outperforms":[187],"existing":[188],"in":[190],"defending":[191],"against":[192],"BITE":[193],"generalizes":[195],"well":[196],"handling":[198],"other":[199],"attacks.":[201]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
