{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:GKDWIWNKXILWW2JW6KKUU6LREI","short_pith_number":"pith:GKDWIWNK","schema_version":"1.0","canonical_sha256":"32876459aaba176b6936f2954a79712227003b77be7121a060639ed881b7857d","source":{"kind":"arxiv","id":"1901.06796","version":3},"attestation_state":"computed","paper":{"title":"Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CL","authors_text":"Ahoud Alhazmi, Chenliang Li, Quan Z. Sheng, Wei Emma Zhang","submitted_at":"2019-01-21T05:55:42Z","abstract_excerpt":"With the development of high computational devices, deep neural networks (DNNs), in recent years, have gained significant popularity in many Artificial Intelligence (AI) applications. However, previous efforts have shown that DNNs were vulnerable to strategically modified samples, named adversarial examples. These samples are generated with some imperceptible perturbations but can fool the DNNs to give false predictions. Inspired by the popularity of generating adversarial examples for image DNNs, research efforts on attacking DNNs for textual applications emerges in recent years. However, exi"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1901.06796","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CL","submitted_at":"2019-01-21T05:55:42Z","cross_cats_sorted":[],"title_canon_sha256":"ebee1919f582752b1c2f59bfc9b02b0174b631c9a40b93823913f575da664220","abstract_canon_sha256":"232f6ae29adbbf1898dec79defca91b17532c0b8d5e3e66beff1958556469b68"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:48:50.217535Z","signature_b64":"B5BLqJZIBBHsQKyu2K+WTfpPTX8JxwevK4Mu1YNBtfncdO7877tkr5/fwT7FQi4TynnstLcrkraQVXNs6odWBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"32876459aaba176b6936f2954a79712227003b77be7121a060639ed881b7857d","last_reissued_at":"2026-05-17T23:48:50.216870Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:48:50.216870Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CL","authors_text":"Ahoud Alhazmi, Chenliang Li, Quan Z. Sheng, Wei Emma Zhang","submitted_at":"2019-01-21T05:55:42Z","abstract_excerpt":"With the development of high computational devices, deep neural networks (DNNs), in recent years, have gained significant popularity in many Artificial Intelligence (AI) applications. However, previous efforts have shown that DNNs were vulnerable to strategically modified samples, named adversarial examples. These samples are generated with some imperceptible perturbations but can fool the DNNs to give false predictions. Inspired by the popularity of generating adversarial examples for image DNNs, research efforts on attacking DNNs for textual applications emerges in recent years. However, exi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.06796","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1901.06796","created_at":"2026-05-17T23:48:50.216967+00:00"},{"alias_kind":"arxiv_version","alias_value":"1901.06796v3","created_at":"2026-05-17T23:48:50.216967+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.06796","created_at":"2026-05-17T23:48:50.216967+00:00"},{"alias_kind":"pith_short_12","alias_value":"GKDWIWNKXILW","created_at":"2026-05-18T12:33:18.533446+00:00"},{"alias_kind":"pith_short_16","alias_value":"GKDWIWNKXILWW2JW","created_at":"2026-05-18T12:33:18.533446+00:00"},{"alias_kind":"pith_short_8","alias_value":"GKDWIWNK","created_at":"2026-05-18T12:33:18.533446+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI","json":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI.json","graph_json":"https://pith.science/api/pith-number/GKDWIWNKXILWW2JW6KKUU6LREI/graph.json","events_json":"https://pith.science/api/pith-number/GKDWIWNKXILWW2JW6KKUU6LREI/events.json","paper":"https://pith.science/paper/GKDWIWNK"},"agent_actions":{"view_html":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI","download_json":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI.json","view_paper":"https://pith.science/paper/GKDWIWNK","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1901.06796&json=true","fetch_graph":"https://pith.science/api/pith-number/GKDWIWNKXILWW2JW6KKUU6LREI/graph.json","fetch_events":"https://pith.science/api/pith-number/GKDWIWNKXILWW2JW6KKUU6LREI/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI/action/timestamp_anchor","attest_storage":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI/action/storage_attestation","attest_author":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI/action/author_attestation","sign_citation":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI/action/citation_signature","submit_replication":"https://pith.science/pith/GKDWIWNKXILWW2JW6KKUU6LREI/action/replication_record"}},"created_at":"2026-05-17T23:48:50.216967+00:00","updated_at":"2026-05-17T23:48:50.216967+00:00"}