Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense

被引:1
作者
Huang, Jiacheng [1 ,2 ]
Chen, Long [1 ,2 ,3 ]
Yi, Xiaoyin [1 ,2 ]
Yu, Ning [1 ,2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Minist Educ, Key Lab Cyberspace Big Data Intelligent Secur, Chongqing 400065, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
关键词
Quantum probability; Natural language processing; Adversarial examples; Inter-sentence semantic interactions;
D O I
10.1007/s40747-024-01733-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. Meanwhile, quantum theory-inspired models that represent word composition as a quantum mixture of words have modeled the non-linear semantic interaction. However, modeling without considering the non-linear semantic interaction between sentences in the current literature does not exploit the potential of the quantum probabilistic description for improving the robustness in adversarial settings. In the present study, a novel quantum theory-inspired inter-sentence semantic interaction model is proposed for enhancing adversarial robustness via fusing contextual semantics. More specifically, it is analyzed why humans are able to understand textual adversarial examples, and a crucial point is observed that humans are adept at associating information from the context to comprehend a paragraph. Guided by this insight, the input text is segmented into subsentences, with the model simulating contextual comprehension by representing each subsentence as a particle within a mixture system, utilizing a density matrix to model inter-sentence interactions. A loss function integrating cross-entropy and orthogonality losses is employed to encourage the orthogonality of measurement states. Comprehensive experiments are conducted to validate the efficacy of proposed methodology, and the results underscore its superiority over baseline models even commercial applications based on large language models in terms of accuracy across diverse adversarial attack scenarios, showing the potential of proposed approach in enhancing the robustness of neural networks under adversarial attacks.
引用
收藏
页数:16
相关论文
共 43 条
[1]   Effect of Text Augmentation and Adversarial Training on Fake News Detection [J].
Ahmed, Hadeer ;
Traore, Issa ;
Saad, Sherif ;
Mamun, Mohammad .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (04) :4775-4789
[2]   Revisiting Born's Rule through Uhlhorn's and Gleason's Theorems [J].
Auffeves, Alexia ;
Grangier, Philippe .
ENTROPY, 2022, 24 (02)
[3]   Quantum cognition: a new theoretical approach to psychology [J].
Bruza, Peter D. ;
Wang, Zheng ;
Busemeyer, Jerome R. .
TRENDS IN COGNITIVE SCIENCES, 2015, 19 (07) :383-393
[4]   Quantum Language Model With Entanglement Embedding for Question Answering [J].
Chen, Yiwei ;
Pan, Yu ;
Dong, Daoyi .
IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (06) :3467-3478
[5]   Understanding and improving adversarial transferability of vision transformers and convolutional neural networks [J].
Chen, Zhiyu ;
Xu, Chi ;
Lv, Huanhuan ;
Liu, Shangdong ;
Ji, Yimu .
INFORMATION SCIENCES, 2023, 648
[6]   Correlations of Cross-Entropy Loss in Machine Learning [J].
Connor, Richard ;
Dearle, Alan ;
Claydon, Ben ;
Vadicamo, Lucia .
ENTROPY, 2024, 26 (06)
[7]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[8]   Popular geopolitics and audience dispositions: James Bond and the Internet Movie Database (IMDb) [J].
Dodds, K .
TRANSACTIONS OF THE INSTITUTE OF BRITISH GEOGRAPHERS, 2006, 31 (02) :116-130
[9]   A sentence-level text adversarial attack algorithm against IIoT based smart grid [J].
Dong, Jialiang ;
Guan, Zhitao ;
Wu, Longfei ;
Du, Xiaojiang ;
Guizani, Mohsen .
COMPUTER NETWORKS, 2021, 190
[10]  
Eger S, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P1634