{"id":"https://openalex.org/W4400582255","doi":"https://doi.org/10.1145/3660808","title":"Evolutionary Multi-objective Optimization for Contextual Adversarial Example Generation","display_name":"Evolutionary Multi-objective Optimization for Contextual Adversarial Example Generation","publication_year":2024,"publication_date":"2024-07-12","ids":{"openalex":"https://openalex.org/W4400582255","doi":"https://doi.org/10.1145/3660808"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660808","pdf_url":null,"source":{"id":"https://openalex.org/S4404663975","display_name":"Proceedings of the ACM on software engineering.","issn_l":"2994-970X","issn":["2994-970X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009000198","display_name":"Shasha Zhou","orcid":"https://orcid.org/0000-0001-5972-5290"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Shasha Zhou","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China / University of Exeter, Exeter, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China / University of Exeter, Exeter, United Kingdom","institution_ids":["https://openalex.org/I150229711","https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103036649","display_name":"Mingyu Huang","orcid":"https://orcid.org/0000-0003-2829-8673"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyu Huang","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102359076","display_name":"Yanan Sun","orcid":"https://orcid.org/0000-0001-8991-7592"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanan Sun","raw_affiliation_strings":["Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343450","display_name":"Ke Li","orcid":"https://orcid.org/0000-0001-7200-4244"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ke Li","raw_affiliation_strings":["University of Exeter, Exeter, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Exeter, Exeter, United Kingdom","institution_ids":["https://openalex.org/I23923803"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":"1","issue":"FSE","first_page":"2285","last_page":"2308"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9883,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/snippet","display_name":"Snippet","score":0.59413713},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.45342565}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8247719},{"id":"https://openalex.org/C2777822670","wikidata":"https://www.wikidata.org/wiki/Q1120538","display_name":"Snippet","level":2,"score":0.59413713},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5646291},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.55665636},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.53330016},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.53276485},{"id":"https://openalex.org/C134537474","wikidata":"https://www.wikidata.org/wiki/Q17144832","display_name":"Naturalness","level":2,"score":0.484271},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.4820631},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47556466},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.471781},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.45342565},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33253348},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.32629347},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660808","pdf_url":null,"source":{"id":"https://openalex.org/S4404663975","display_name":"Proceedings of the ACM on software engineering.","issn_l":"2994-970X","issn":["2994-970X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47,"display_name":"Quality education","id":"https://metadata.un.org/sdg/4"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1662894842","https://openalex.org/W2022485595","https://openalex.org/W2056760934","https://openalex.org/W2108968575","https://openalex.org/W2143381319","https://openalex.org/W2343601797","https://openalex.org/W2962700793","https://openalex.org/W2963178695","https://openalex.org/W3034397670","https://openalex.org/W3042471545","https://openalex.org/W3098605233","https://openalex.org/W3104208618","https://openalex.org/W3109966548","https://openalex.org/W3131641316","https://openalex.org/W3166095789","https://openalex.org/W3196001856","https://openalex.org/W4210499321","https://openalex.org/W4210772589","https://openalex.org/W4226040778","https://openalex.org/W4246464108","https://openalex.org/W4285490465","https://openalex.org/W4288089799","https://openalex.org/W4388117872","https://openalex.org/W4389158416"],"related_works":["https://openalex.org/W4385571091","https://openalex.org/W4384811727","https://openalex.org/W4312090193","https://openalex.org/W4308641625","https://openalex.org/W3165080709","https://openalex.org/W3089357417","https://openalex.org/W2945105049","https://openalex.org/W2029561777","https://openalex.org/W172797710","https://openalex.org/W1607713096"],"abstract_inverted_index":{"The":[0],"emergence":[1],"of":[2,67,83,89,116,149,163,177,199],"the":[3,19,41,65,75,90,114,150,189,196],"'code":[4],"naturalness'":[5],"concept,":[6],"which":[7,48],"suggests":[8],"that":[9,169],"software":[10,27],"code":[11,82,152,158],"shares":[12],"statistical":[13],"properties":[14],"with":[15,113,139,160,180],"natural":[16,71],"language,":[17],"paves":[18],"way":[20],"for":[21,80,188],"deep":[22],"neural":[23],"networks":[24],"(DNNs)":[25],"in":[26,40,64,86],"engineering":[28],"(SE).":[29],"However,":[30],"DNNs":[31],"can":[32,110,172],"be":[33,111],"vulnerable":[34],"to":[35,51,61,141],"certain":[36],"human":[37],"imperceptible":[38],"variations":[39],"input,":[42],"known":[43],"as":[44],"adversarial":[45,124],"examples":[46],"(AEs),":[47],"could":[49],"lead":[50],"adverse":[52],"model":[53],"performance.":[54],"Numerous":[55],"attack":[56,125],"strategies":[57],"have":[58],"been":[59],"proposed":[60],"generate":[62,142,173],"AEs":[63,144,179],"context":[66],"computer":[68],"vision":[69],"and":[70,100,109],"language":[72],"processing,":[73],"but":[74],"same":[76],"is":[77,92],"less":[78],"true":[79],"source":[81,157],"programming":[84,166],"languages":[85,167],"SE.":[87],"One":[88],"challenges":[91],"derived":[93],"from":[94],"various":[95],"constraints":[96],"including":[97],"syntactic,":[98],"semantics":[99],"minimal":[101],"modification":[102],"ratio.":[103],"These":[104],"constraints,":[105],"however,":[106],"are":[107],"subjective":[108],"conflicting":[112],"purpose":[115],"fooling":[117],"DNNs.":[118],"This":[119],"paper":[120],"develops":[121],"a":[122,129,132,174],"multi-objective":[123,135],"method":[126],"(dubbed":[127],"MOAA),":[128],"tailored":[130],"NSGA-II,":[131],"powerful":[133],"evolutionary":[134],"(EMO)":[136],"algorithm,":[137],"integrated":[138],"CodeT5":[140],"high-quality":[143,178],"based":[145],"on":[146,155],"contextual":[147],"information":[148],"original":[151],"snippet.":[153],"Experiments":[154],"5":[156],"tasks":[159],"10":[161],"datasets":[162],"6":[164],"different":[165],"show":[168],"our":[170,186],"approach":[171],"diverse":[175],"set":[176],"promising":[181],"transferability.":[182],"In":[183],"addition,":[184],"using":[185],"AEs,":[187],"first":[190],"time,":[191],"we":[192],"provide":[193],"insights":[194],"into":[195],"internal":[197],"behavior":[198],"pre-trained":[200],"models.":[201]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4400582255","counts_by_year":[],"updated_date":"2024-12-10T10:19:56.169611","created_date":"2024-07-13"}