2021
DOI: 10.48550/arxiv.2110.13980
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Abstract: The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing (NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these ML and NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adversarial attacks on these algorithms in different applications of social media text processing. In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 109 publications
0
4
0
Order By: Relevance
“…Ensemble methods, combining multiple models to improve detection accuracy, have also been highlighted for their effectiveness in reducing false positives [20], [21]. Natural Language Processing (NLP) techniques have been leveraged to understand the semantic content of messages, offering insights into the subtle cues used by spammers [22], [23], [24], [25], [26]. Anomaly detection approaches have been proposed to identify spam by detecting deviations from typical user behavior or message content [27], [28], [29].…”
Section: A Review Of Spam Detection Techniquesmentioning
confidence: 99%
“…Ensemble methods, combining multiple models to improve detection accuracy, have also been highlighted for their effectiveness in reducing false positives [20], [21]. Natural Language Processing (NLP) techniques have been leveraged to understand the semantic content of messages, offering insights into the subtle cues used by spammers [22], [23], [24], [25], [26]. Anomaly detection approaches have been proposed to identify spam by detecting deviations from typical user behavior or message content [27], [28], [29].…”
Section: A Review Of Spam Detection Techniquesmentioning
confidence: 99%
“…Adversarial learning specifically applied to OSN have been studied in different ways. The first one focuses on text processing applications [2], which is what event detection algorithms are. The second one is more specific, it is about evading spam detection [9].…”
Section: Related Workmentioning
confidence: 99%
“…Related surveys and differences with this survey. Reviews of adversarial examples attacking deep learning models for text applications already exist in the literature, such as [10,[12][13][14]; however, to the best of our knowledge, no comprehensive review has collected and summarized the efforts in this research direction while specifically focusing on sentiment analysis. This study attempts to cover this gap via three central questions:…”
Section: Introductionmentioning
confidence: 99%