SlideShare a Scribd company logo
Paper information
1
• Title
ü Text Processing Like Humans Do: Visually Attacking and
Shielding NLP Systems
• URL
ü https://aclweb.org/anthology/papers/N/N19/N19-1165/
• Author
ü Steffen Eger, Gözde Gül Şahin, Andreas Rücklé, Ji-Ung Lee,
Claudia Schulz, Mohsen Mesgar, Krishnkant Swarnkar,
Edwin Simpson, Iryna Gurevych
• Conference
ü NAACL2019
Background: visual perturbations to text
2
• Visual perturbations to text are often used to
obfuscate offensive comments in social media
• Those perturbations are considered as a new type of
adversarial attack in NLP
1 4M JUST GO1NG TO K1LL YOU ƒv¢K !!
You are f**ck!ng !d!0t
Adversarial attack:
Make modifications to an input to fool the system, while
the original meaning is still understood by humans
Background:
Advantages of visual perturbations
3
1. They do not require any linguistic knowledge beyond the
character level
2. They are less damaging to human perception than syntax
errors or the insertion of nagations
3. They do not require knowledge of the attacked model
In summary, visual perturbations are easily
applicable to any languages, domains and tasks
Perturbed: 1 4M JUST GO1NG TO K1LL YOU ƒv¢K !!
⇅
Raw: I AM JUST GOING TO KILL YOU FUCK !!
Summary of this paper:
4
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks
Summary of this paper:
5
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks
Proposed visual perturbations
6
Proposed methods perturb input sentences by
replacing each character randomly based on:
• Image-based character embedding (ICES)
• Description-based character embedding (DCES)
• Easy-character embedding (ECES)
7
Image-based character embedding (ICES)
ü retrieve a 24*24 image of the character and convert it into
576 dimensional embedding vector
ü replace characters of the input sentences by their nearest
neighbors in the embedding space
Proposed visual perturbations:
Image-based
c
ć
Ҫ
ą
ă
a
embedding
space
8
Description-based character embedding (DCES)
ü retrieve the description of each Unicode character
ü replace characters by other ones whose description shares
many of the words of the target description
a - latin small letter “a”
à - latin small letter “a” with grave
description:
replace
Proposed visual perturbations:
Descriptions-based
9
Easy-character-based character embedding (ECES)
ü replace characters of the input sentences by manually
defined characters (targets are 52 characters: a-zA-Z)
a → â
b → ḃ
c → ĉ
:
rule: replace
Proposed visual perturbations:
Easy-character-based
manually
defined
• Ten nearest neighbors in different character spaces
• Examples of perturbed and original sentences
Proposed visual perturbations:
Easy-character-based
10
ECES-0.8
flipping probability of perturbations
Summary of this paper:
11
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual
perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks
12
To evaluate human performances, asked annotators to
recover the original sentences given perturbed text
ü calculate error rate by measuring the normalized edit distance
between the recovered sentence and the original one
Human annotation experiment against
visual perturbation
Flipping probability p
Errorratein%
Humans are very good at understanding visual perturbationsbetter
ECES
Summary of this paper:
13
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks
14
Evaluate the capabilities of SOTA NLP models for
below tasks to deal with visual attacks (by DCES)
• POS tagging (POS)
• Chunking (Chunk)
ü Dataset: CoNLL 2000
ü Model: Bi-LSTM with ELMo
• Grapheme-to-phoneme (G2P)
ü Dataset: Combilex pronunciation of American English
ü Model: Bi-LSTM
• Toxic comment classification (TC)
ü Dataset: Kaggle dataset
ü Model: Feed-forward network with ELMo
Computational experiment against
visual perturbation: settings
15
Show the relative performance s*(p) compared to
the performance of no perturbations s(0)
Computational experiment against
visual perturbation (no shielding)
better
= s*(p)
All systems degrade considerably compared
to the systems with no perturbations
p
Summary of this paper:
16
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks
17
Develop three shielding methods against visual attacks
• Adversarial training (AT)
ü Replace original training examples by perturbed data
• Visual character embedding (CE)
ü Use fixed ICEs to initialize the embeddings of the models
• Rule-based recovery (RBR)
ü Replace each non-standard character in the input with its
nearest standard neighbor in ICES (a-zA-Z + punctuation)
Proposed shielding methods against
visual perturbations
18
Show the performance improvements Δ between
shielding treatments σ(p)/s(0) and original scores s*(p)
Proposed shielding methods against
visual perturbations: results
better
ΔAT
ΔCE
ΔAT+CE
ΔRBR
p p
= (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
19
Proposed shielding methods against
visual perturbations: results
better
ΔAT
ΔCE
ΔAT+CE
ΔRBR
p p
All tasks other than G2P profit from AT
• AT did not perform well on G2P because missing
tokens are more problematic than other tasks
= (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
20
Proposed shielding methods against
visual perturbations: results
better
ΔAT
ΔCE
ΔAT+CE
ΔRBR
p p
TC and G2P profit from CE
• CE can restore tokens from those neighborhoods in the
embedding space
• CE did not perform well on POS and Chunk because ELMo
might weaken the effect of CE
= (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit>
21
Proposed shielding methods against
visual perturbations: results
better
ΔAT
ΔCE
ΔAT+CE
ΔRBR
p p
All tasks profit from AT with CE
• The combination of them can boost the effect of each other
= (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
22
Proposed shielding methods against
visual perturbations: results
better
ΔAT
ΔCE
ΔAT+CE
ΔRBR
p p
All tasks profit from RBR lower than AT + CE
• RBR may incorrectly replace input tokens that affect the
performances
= (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
23
Show examples of the prediction in TC (flipping prob. = 0.1)
Proposed shielding methods against
visual perturbations: example
ECES
DCES
ECES
DCES
• Perturbing specific words reduces the score of a non-shielded
approach, while perturbing useless words like ‘he’ has little effect
Answer Prediction
24
Show examples of the prediction in TC (flipping prob. = 0.1)
Proposed shielding methods against
visual perturbations: example
ECES
DCES
ECES
DCES
• Perturbing specific words reduces the score of a non-shielded
approach, while perturbing useless words like ‘he’ has little effect
• Overall, all the shielding approaches help in various degrees
Answer Prediction
Summary of this paper:
25
• Develop three methods for visual perturbations
• Confirm that humans are robust to visual perturbations
• Confirm that the performance of SOTA NLP models
drops when attacked by visual perturbations
• Develop three methods to shield from visual attacks

More Related Content

Similar to Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems

Colloquium talk on modal sense classification using a convolutional neural ne...
Colloquium talk on modal sense classification using a convolutional neural ne...Colloquium talk on modal sense classification using a convolutional neural ne...
Colloquium talk on modal sense classification using a convolutional neural ne...
Ana Marasović
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
Roelof Pieters
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
AI Summary
 
Natural language processing (Python)
Natural language processing (Python)Natural language processing (Python)
Natural language processing (Python)
Sumit Raj
 
AINL 2016: Eyecioglu
AINL 2016: EyeciogluAINL 2016: Eyecioglu
AINL 2016: Eyecioglu
Lidia Pivovarova
 
[Paper Reading] Unsupervised Learning of Sentence Embeddings using Compositi...
[Paper Reading]  Unsupervised Learning of Sentence Embeddings using Compositi...[Paper Reading]  Unsupervised Learning of Sentence Embeddings using Compositi...
[Paper Reading] Unsupervised Learning of Sentence Embeddings using Compositi...
Hiroki Shimanaka
 
Language models
Language modelsLanguage models
Language models
Maryam Khordad
 
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & OpportunitiesDeep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
Matthew Lease
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- Redux
Pierre Schaus
 
Robustness of compressed CNNs
Robustness of compressed CNNsRobustness of compressed CNNs
Robustness of compressed CNNs
Kaushalya Madhawa
 
Deep Generative Models
Deep Generative Models Deep Generative Models
Deep Generative Models
Chia-Wen Cheng
 
Engineering Intelligent NLP Applications Using Deep Learning – Part 2
Engineering Intelligent NLP Applications Using Deep Learning – Part 2 Engineering Intelligent NLP Applications Using Deep Learning – Part 2
Engineering Intelligent NLP Applications Using Deep Learning – Part 2
Saurabh Kaushik
 
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language UnderstandingBERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
Seonghyun Kim
 
Enhancing Entity Linking by Combining NER Models
Enhancing Entity Linking by Combining NER ModelsEnhancing Entity Linking by Combining NER Models
Enhancing Entity Linking by Combining NER Models
Julien PLU
 
Living with-spec
Living with-specLiving with-spec
Living with-spec
Simon Belak
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
Jure Leskovec
 
Language Is Not All You Need: Aligning Perception with Language Models
Language Is Not All You Need: Aligning Perception with Language ModelsLanguage Is Not All You Need: Aligning Perception with Language Models
Language Is Not All You Need: Aligning Perception with Language Models
Willy Marroquin (WillyDevNET)
 
[Mmlab seminar 2016] deep learning for human pose estimation
[Mmlab seminar 2016] deep learning for human pose estimation[Mmlab seminar 2016] deep learning for human pose estimation
[Mmlab seminar 2016] deep learning for human pose estimation
Wei Yang
 
How to Perform 21st Century Systems Engineering
How to Perform 21st Century Systems EngineeringHow to Perform 21st Century Systems Engineering
How to Perform 21st Century Systems Engineering
Elizabeth Steiner
 
Natural Language Understanding of Systems Engineering Artifacts
Natural Language Understanding of Systems Engineering ArtifactsNatural Language Understanding of Systems Engineering Artifacts
Natural Language Understanding of Systems Engineering Artifacts
Ákos Horváth
 

Similar to Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems (20)

Colloquium talk on modal sense classification using a convolutional neural ne...
Colloquium talk on modal sense classification using a convolutional neural ne...Colloquium talk on modal sense classification using a convolutional neural ne...
Colloquium talk on modal sense classification using a convolutional neural ne...
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
 
Introduction to Artificial Intelligence
Introduction to Artificial IntelligenceIntroduction to Artificial Intelligence
Introduction to Artificial Intelligence
 
Natural language processing (Python)
Natural language processing (Python)Natural language processing (Python)
Natural language processing (Python)
 
AINL 2016: Eyecioglu
AINL 2016: EyeciogluAINL 2016: Eyecioglu
AINL 2016: Eyecioglu
 
[Paper Reading] Unsupervised Learning of Sentence Embeddings using Compositi...
[Paper Reading]  Unsupervised Learning of Sentence Embeddings using Compositi...[Paper Reading]  Unsupervised Learning of Sentence Embeddings using Compositi...
[Paper Reading] Unsupervised Learning of Sentence Embeddings using Compositi...
 
Language models
Language modelsLanguage models
Language models
 
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & OpportunitiesDeep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
 
The Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- ReduxThe Concurrent Constraint Programming Research Programmes -- Redux
The Concurrent Constraint Programming Research Programmes -- Redux
 
Robustness of compressed CNNs
Robustness of compressed CNNsRobustness of compressed CNNs
Robustness of compressed CNNs
 
Deep Generative Models
Deep Generative Models Deep Generative Models
Deep Generative Models
 
Engineering Intelligent NLP Applications Using Deep Learning – Part 2
Engineering Intelligent NLP Applications Using Deep Learning – Part 2 Engineering Intelligent NLP Applications Using Deep Learning – Part 2
Engineering Intelligent NLP Applications Using Deep Learning – Part 2
 
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language UnderstandingBERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
 
Enhancing Entity Linking by Combining NER Models
Enhancing Entity Linking by Combining NER ModelsEnhancing Entity Linking by Combining NER Models
Enhancing Entity Linking by Combining NER Models
 
Living with-spec
Living with-specLiving with-spec
Living with-spec
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
 
Language Is Not All You Need: Aligning Perception with Language Models
Language Is Not All You Need: Aligning Perception with Language ModelsLanguage Is Not All You Need: Aligning Perception with Language Models
Language Is Not All You Need: Aligning Perception with Language Models
 
[Mmlab seminar 2016] deep learning for human pose estimation
[Mmlab seminar 2016] deep learning for human pose estimation[Mmlab seminar 2016] deep learning for human pose estimation
[Mmlab seminar 2016] deep learning for human pose estimation
 
How to Perform 21st Century Systems Engineering
How to Perform 21st Century Systems EngineeringHow to Perform 21st Century Systems Engineering
How to Perform 21st Century Systems Engineering
 
Natural Language Understanding of Systems Engineering Artifacts
Natural Language Understanding of Systems Engineering ArtifactsNatural Language Understanding of Systems Engineering Artifacts
Natural Language Understanding of Systems Engineering Artifacts
 

Recently uploaded

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems

  • 1. Paper information 1 • Title ü Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems • URL ü https://aclweb.org/anthology/papers/N/N19/N19-1165/ • Author ü Steffen Eger, Gözde Gül Şahin, Andreas Rücklé, Ji-Ung Lee, Claudia Schulz, Mohsen Mesgar, Krishnkant Swarnkar, Edwin Simpson, Iryna Gurevych • Conference ü NAACL2019
  • 2. Background: visual perturbations to text 2 • Visual perturbations to text are often used to obfuscate offensive comments in social media • Those perturbations are considered as a new type of adversarial attack in NLP 1 4M JUST GO1NG TO K1LL YOU ƒv¢K !! You are f**ck!ng !d!0t Adversarial attack: Make modifications to an input to fool the system, while the original meaning is still understood by humans
  • 3. Background: Advantages of visual perturbations 3 1. They do not require any linguistic knowledge beyond the character level 2. They are less damaging to human perception than syntax errors or the insertion of nagations 3. They do not require knowledge of the attacked model In summary, visual perturbations are easily applicable to any languages, domains and tasks Perturbed: 1 4M JUST GO1NG TO K1LL YOU ƒv¢K !! ⇅ Raw: I AM JUST GOING TO KILL YOU FUCK !!
  • 4. Summary of this paper: 4 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks
  • 5. Summary of this paper: 5 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks
  • 6. Proposed visual perturbations 6 Proposed methods perturb input sentences by replacing each character randomly based on: • Image-based character embedding (ICES) • Description-based character embedding (DCES) • Easy-character embedding (ECES)
  • 7. 7 Image-based character embedding (ICES) ü retrieve a 24*24 image of the character and convert it into 576 dimensional embedding vector ü replace characters of the input sentences by their nearest neighbors in the embedding space Proposed visual perturbations: Image-based c ć Ҫ ą ă a embedding space
  • 8. 8 Description-based character embedding (DCES) ü retrieve the description of each Unicode character ü replace characters by other ones whose description shares many of the words of the target description a - latin small letter “a” à - latin small letter “a” with grave description: replace Proposed visual perturbations: Descriptions-based
  • 9. 9 Easy-character-based character embedding (ECES) ü replace characters of the input sentences by manually defined characters (targets are 52 characters: a-zA-Z) a → â b → ḃ c → ĉ : rule: replace Proposed visual perturbations: Easy-character-based manually defined
  • 10. • Ten nearest neighbors in different character spaces • Examples of perturbed and original sentences Proposed visual perturbations: Easy-character-based 10 ECES-0.8 flipping probability of perturbations
  • 11. Summary of this paper: 11 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks
  • 12. 12 To evaluate human performances, asked annotators to recover the original sentences given perturbed text ü calculate error rate by measuring the normalized edit distance between the recovered sentence and the original one Human annotation experiment against visual perturbation Flipping probability p Errorratein% Humans are very good at understanding visual perturbationsbetter ECES
  • 13. Summary of this paper: 13 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks
  • 14. 14 Evaluate the capabilities of SOTA NLP models for below tasks to deal with visual attacks (by DCES) • POS tagging (POS) • Chunking (Chunk) ü Dataset: CoNLL 2000 ü Model: Bi-LSTM with ELMo • Grapheme-to-phoneme (G2P) ü Dataset: Combilex pronunciation of American English ü Model: Bi-LSTM • Toxic comment classification (TC) ü Dataset: Kaggle dataset ü Model: Feed-forward network with ELMo Computational experiment against visual perturbation: settings
  • 15. 15 Show the relative performance s*(p) compared to the performance of no perturbations s(0) Computational experiment against visual perturbation (no shielding) better = s*(p) All systems degrade considerably compared to the systems with no perturbations p
  • 16. Summary of this paper: 16 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks
  • 17. 17 Develop three shielding methods against visual attacks • Adversarial training (AT) ü Replace original training examples by perturbed data • Visual character embedding (CE) ü Use fixed ICEs to initialize the embeddings of the models • Rule-based recovery (RBR) ü Replace each non-standard character in the input with its nearest standard neighbor in ICES (a-zA-Z + punctuation) Proposed shielding methods against visual perturbations
  • 18. 18 Show the performance improvements Δ between shielding treatments σ(p)/s(0) and original scores s*(p) Proposed shielding methods against visual perturbations: results better ΔAT ΔCE ΔAT+CE ΔRBR p p = (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
  • 19. 19 Proposed shielding methods against visual perturbations: results better ΔAT ΔCE ΔAT+CE ΔRBR p p All tasks other than G2P profit from AT • AT did not perform well on G2P because missing tokens are more problematic than other tasks = (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
  • 20. 20 Proposed shielding methods against visual perturbations: results better ΔAT ΔCE ΔAT+CE ΔRBR p p TC and G2P profit from CE • CE can restore tokens from those neighborhoods in the embedding space • CE did not perform well on POS and Chunk because ELMo might weaken the effect of CE = (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">AAAChnichVFNS1tBFD0+q8b4FXUjuEkNSlyY3ieKRSiE6qJLv6KCkfDe6xgH3xdvJgEbui70D7hwVUFEpNv6A9z0D3ThTyguFdy48ObliVip3mFmzpy5586ZGTt0pdJEl21G+5uOzq5Ud7qnt69/IDM4tK6CWuSIkhO4QbRpW0q40hclLbUrNsNIWJ7tig17b6G5v1EXkZKBv6b3Q7HtWVVf7kjH0kxVMm/Li8LV1oeyklXPyoeT71SeJrNTWfWAK5kcFSiO7HNgJiCHJJaCzAnK+IwADmrwIOBDM3ZhQXHbgglCyNw2GsxFjGS8L/AVadbWOEtwhsXsHo9VXm0lrM/rZk0Vqx0+xeUesTKLcfpDp3RNv+mM/tLdf2s14hpNL/s82y2tCCsD30dWb19VeTxr7D6qXvSssYP3sVfJ3sOYad7CaenrXw6uV+dXxhsTdERX7P8HXdIF38Cv3zjHy2LlEGn+APPf534O1qcLJhXM5Zlc8WPyFSmMYgx5fu85FPEJSyjxud/wE79wbqSMgjFrzLVSjbZEM4wnYRTvAfXek4o=</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
  • 21. 21 Proposed shielding methods against visual perturbations: results better ΔAT ΔCE ΔAT+CE ΔRBR p p All tasks profit from AT with CE • The combination of them can boost the effect of each other = (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
  • 22. 22 Proposed shielding methods against visual perturbations: results better ΔAT ΔCE ΔAT+CE ΔRBR p p All tasks profit from RBR lower than AT + CE • RBR may incorrectly replace input tokens that affect the performances = (p)/s(0) s(p)/s(0)<latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit><latexit sha1_base64="y0dGgyoE1b/V7cP6jkz5sSEf7iE=">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</latexit>
  • 23. 23 Show examples of the prediction in TC (flipping prob. = 0.1) Proposed shielding methods against visual perturbations: example ECES DCES ECES DCES • Perturbing specific words reduces the score of a non-shielded approach, while perturbing useless words like ‘he’ has little effect Answer Prediction
  • 24. 24 Show examples of the prediction in TC (flipping prob. = 0.1) Proposed shielding methods against visual perturbations: example ECES DCES ECES DCES • Perturbing specific words reduces the score of a non-shielded approach, while perturbing useless words like ‘he’ has little effect • Overall, all the shielding approaches help in various degrees Answer Prediction
  • 25. Summary of this paper: 25 • Develop three methods for visual perturbations • Confirm that humans are robust to visual perturbations • Confirm that the performance of SOTA NLP models drops when attacked by visual perturbations • Develop three methods to shield from visual attacks