PivotAttack: Rethinking the Search Trajectory in Hard-Label Text Attacks via Pivot Words
About
Existing hard-label text attacks often rely on inefficient "outside-in" strategies that traverse vast search spaces. We propose PivotAttack, a query-efficient "inside-out" framework. It employs a Multi-Armed Bandit algorithm to identify Pivot Sets-combinatorial token groups acting as prediction anchors-and strategically perturbs them to induce label flips. This approach captures inter-word dependencies and minimizes query costs. Extensive experiments across traditional models and Large Language Models demonstrate that PivotAttack consistently outperforms state-of-the-art baselines in both Attack Success Rate and query efficiency.
Yuzhi Liang, Shiliang Xiao, Jingsong Wei, Qiliang Lin, Xia Li• 2026
Related benchmarks
| Task | Dataset | Result | Rank | |
|---|---|---|---|---|
| Adversarial Attack | Yelp | ASR39.8 | 49 | |
| Adversarial Attack | Yahoo | ASR93.5 | 22 | |
| Adversarial Attack | MR | ASR62.2 | 22 | |
| Adversarial Attack | AMAZON | ASR34.9 | 22 | |
| Adversarial Attack | SST-2 | Attack Success Rate (ASR)54.6 | 22 | |
| Textual Entailment | SNLI | ASR25.8 | 8 | |
| Textual Entailment | MNLI-m | ASR47.7 | 8 | |
| Textual Entailment | MNLI mm | ASR54.8 | 8 |
Showing 8 of 8 rows