[MASK] insertion for anti-adversarial attacks

Xinrong Hu, Ce Xu, Junlong Ma, Zijian Huang, Jie Yang, Yi Guo, Johan Barthelemy

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

![CDATA[Adversarial attack aims to perturb input sequences and mislead a trained model for false predictions. To enhance the model robustness, defensing methods are accordingly employed by either data augmentation (involving adversarial samples) or model enhancement (modifying the training loss and/or model architecture). In contrast to previous work, this paper revisits the masked language modeling (MLM) and presents a simple yet efficient algorithm against adversarial attacks, termed [MASK] insertion for defensing (MI4D). Specifically, MI4D simply inserts [MASK] tokens to input sequences during training and inference, maximizing the intersection of the new convex hull (MI4D creates) with the original one (the clean input forms). As neither additional adversarial samples nor the model modification is required, MI4D is as computationally efficient as traditional fine-tuning. Comprehensive experiments have been conducted using three benchmark datasets and four attacking methods. MI4D yields a significant improvement (on average) of the accuracy between 3.2 and 11.1 absolute points when compared with six state-of-the-art defensing baselines.]]
Original languageEnglish
Title of host publicationProceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics: Findings of EACL 2023, Dubrovnik, Croatia, May 2-6, 2023
PublisherAssociation for Computational Linguistics
Pages1058-1070
Number of pages13
ISBN (Print)9781959429470
Publication statusPublished - 2023
EventEuropean Chapter of the Association for Computational Linguistics. Conference -
Duration: 2 May 2023 → …

Conference

ConferenceEuropean Chapter of the Association for Computational Linguistics. Conference
Period2/05/23 → …

Fingerprint

Dive into the research topics of '[MASK] insertion for anti-adversarial attacks'. Together they form a unique fingerprint.

Cite this