Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models
About
Recent studies have revealed a security threat to natural language processing (NLP) models, called the Backdoor Attack. Victim models can maintain competitive performance on clean samples while behaving abnormally on samples with a specific trigger word inserted. Previous backdoor attacking methods usually assume that attackers have a certain degree of data knowledge, either the dataset which users would use or proxy datasets for a similar task, for implementing the data poisoning procedure. However, in this paper, we find that it is possible to hack the model in a data-free way by modifying one single word embedding vector, with almost no accuracy sacrificed on clean samples. Experimental results on sentiment analysis and sentence-pair classification tasks show that our method is more efficient and stealthier. We hope this work can raise the awareness of such a critical security risk hidden in the embedding layers of NLP models. Our code is available at https://github.com/lancopku/Embedding-Poisoning.
Related benchmarks
| Task | Dataset | Result | Rank | |
|---|---|---|---|---|
| Backdoor Attack Classification | HSOL | ASR100 | 26 | |
| Text Classification | HSOL | CACC95.65 | 26 | |
| Text Classification | SST-2 (test) | CACC90.77 | 17 | |
| Text Classification | IMDB → SST-2 (test) | ASR100 | 6 | |
| Backdoor Trigger Quality Assessment | HSOL | APPL208.5 | 6 | |
| Cross-dataset Backdoor Attack Classification | OffensEval from HSOL | ASR100 | 6 | |
| Text Classification | SST-2 → IMDB (test) | ASR20.18 | 6 |