2020
DOI: 10.48550/arxiv.2009.06368
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples

Abstract: We study the behavior of several black-box search algorithms used for generating adversarial examples for natural language processing (NLP) tasks. We perform a fine-grained analysis of three elements relevant to search: search algorithm, search space, and search budget. When new search methods are proposed in past work, the attack search space is often modified alongside the search method. Without ablation studies benchmarking the search algorithm change with the search space held constant, an increase in atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(23 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…Yoo et al [15] presented review of search algorithms for generating adversarial examples as a means to achieve robustness. However, their work is limited in scope in that it only focuses on adversarial examples as a means to seek robustness.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Yoo et al [15] presented review of search algorithms for generating adversarial examples as a means to achieve robustness. However, their work is limited in scope in that it only focuses on adversarial examples as a means to seek robustness.…”
Section: Related Workmentioning
confidence: 99%
“…3) Sparse Projected Gradient Descent: The projected gradient descent method is a type of greedy algorithm which has been applied broadly to machine learning models [36]. In this method, each element in the input text is considered for substitution and the best perturbations are selected from all possible perturbations and rerun until no more perturbations are possible [15]. This attack method has been utilized in several research works [15], [43], [90] with various promising results.…”
Section: Breaching Security By Improving Attacksmentioning
confidence: 99%
See 3 more Smart Citations