DE eng

Search in the Catalogues and Directories

Hits 1 – 8 of 8

1
Marginal Utility Diminishes: Exploring the Minimum Knowledge for BERT Knowledge Distillation ...
BASE
Show details
2
CLEVE: Contrastive Pre-training for Event Extraction ...
BASE
Show details
3
Rethinking Stealthiness of Backdoor Attack against NLP Models ...
Abstract: Read paper: https://www.aclanthology.org/2021.acl-long.431 Abstract: Recent researches have shown that large natural language processing (NLP) models are vulnerable to a kind of security threat called the Backdoor Attack. Backdoor attacked models can achieve good performance on clean test sets but perform badly on those input sentences injected with designed trigger words. In this work, we point out a potential problem of current backdoor attacking research: its evaluation ignores the stealthiness of backdoor attacks, and most of existing backdoor attacking methods are not stealthy either to system deployers or to system users. To address this issue, we first propose two additional stealthiness-based metrics to make the backdoor attacking evaluation more credible. We further propose a novel word-based backdoor attacking method based on negative data augmentation and modifying word embeddings, making an important step towards achieving stealthy backdoor attacking. Experiments on sentiment analysis and toxic ...
Keyword: Computational Linguistics; Condensed Matter Physics; Deep Learning; Electromagnetism; FOS Physical sciences; Information and Knowledge Engineering; Neural Network; Semantics
URL: https://dx.doi.org/10.48448/rd6q-td85
https://underline.io/lecture/25860-rethinking-stealthiness-of-backdoor-attack-against-nlp-models
BASE
Hide details
4
Prevent the Language Model from being Overconfident in Neural Machine Translation ...
BASE
Show details
5
KACC: A Multi-task Benchmark for Knowledge Abstraction, Concretization and Completion ...
BASE
Show details
6
Modeling Bilingual Conversational Characteristics for Neural Chat Translation ...
BASE
Show details
7
Target-oriented Fine-tuning for Zero-Resource Named Entity Recognition ...
BASE
Show details
8
Exploring Dynamic Selection of Branch Expansion Orders for Code Generation ...
BASE
Show details

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
8
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern