Skip to main content
Log in

Exploiting natural language services: a polarity based black-box attack

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Gao J, Lanchantin J, Soffa M L, Qi Y. Black-box generation of adversarial text sequences to evade deep learning classifiers. In: Proceedings of 2018 IEEE Security and Privacy Workshops (SPW). 2018, 50–56

  2. Vijayaraghavan P, Roy D. Generating black-box adversarial examples for text classifiers using a deep reinforced model. In: Proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 2019, 711–726

  3. Alzantot M, Sharma Y, Elgohary A, Ho B J, Srivastava M, Chang K W. Generating natural language adversarial examples. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. 2018, 2890–2896

  4. Zhang X, Zhao J, LeCun Y. Character-level convolutional networks for text classification. Advances in neural information processing systems, 2015, 649–657

  5. Maas A L, Daly R E, Pham P T, Huang D, Ng A Y, Potts C. Learning word vectors for sentiment analysis. In: Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1. 2011, 142–150

Download references

Acknowledgements

The authors wish to thank the members of NOVA Research Lab at Yildiz Technical University, Turkey for their valuable suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatma Gumus.

Additional information

Supporting information

The supporting information is available online at journal.hep.com.cn and link.springer.com.

Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gumus, F., Amasyali, M.F. Exploiting natural language services: a polarity based black-box attack. Front. Comput. Sci. 16, 165325 (2022). https://doi.org/10.1007/s11704-021-0198-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-021-0198-y

Navigation