Our new X account is live! Follow @wizwand_team for updates
WorkDL logo mark

Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution

About

Recent studies show that neural natural language processing (NLP) models are vulnerable to backdoor attacks. Injected with backdoors, models perform normally on benign examples but produce attacker-specified predictions when the backdoor is activated, presenting serious security threats to real-world applications. Since existing textual backdoor attacks pay little attention to the invisibility of backdoors, they can be easily detected and blocked. In this work, we present invisible backdoors that are activated by a learnable combination of word substitution. We show that NLP models can be injected with backdoors that lead to a nearly 100% attack success rate, whereas being highly invisible to existing defense strategies and even human inspections. The results raise a serious alarm to the security of NLP models, which requires further research to be resolved. All the data and code of this paper are released at https://github.com/thunlp/BkdAtk-LWS.

Fanchao Qi, Yuan Yao, Sophia Xu, Zhiyuan Liu, Maosong Sun• 2021

Related benchmarks

TaskDatasetResultRank
Text ClassificationHSOL
CACC95.49
26
Backdoor Attack ClassificationHSOL
ASR97.26
26
Text ClassificationSST-2 (test)
CACC91.6
17
Text ClassificationSST-2 → IMDB (test)
ASR77.08
6
Text ClassificationIMDB → SST-2 (test)
ASR94.41
6
Backdoor Trigger Quality AssessmentHSOL
APPL172.9
6
Cross-dataset Backdoor Attack ClassificationOffensEval from HSOL
ASR97.42
6
Showing 7 of 7 rows

Other info

Follow for update