Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions

被引:12
作者
Alsmadi, Izzat [1 ]
Ahmad, Kashif [2 ]
Nazzal, Mahmoud [3 ]
Alam, Firoj [4 ]
Al-Fuqaha, Ala [5 ]
Khreishah, Abdallah [3 ]
Algosaibi, Abdulelah [6 ]
机构
[1] Texas A&M Univ, Dept Comp & Cyber Secur, San Antonio, TX 78224 USA
[2] Munster Technol Univ, Dept Comp Sci, Cork T12 P928, Ireland
[3] New Jersey Inst Technol, Newark Coll Engn, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[4] Hamad Bin Khalifa Univ, Qatar Comp Res Inst, Doha, Qatar
[5] Hamad Bin Khalifa Univ, Coll Sci & Engn CSE, Informat & Comp Technol ICT Div, Doha, Qatar
[6] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Hufuf 31982, Saudi Arabia
关键词
Social networking (online); Computational modeling; Text analysis; Hate speech; Fake news; Taxonomy; Security; Adversarial machine learning (AML); linguistics; machine learning (ML); natural language processing (NLP); natural languages; SENTIMENT ANALYSIS; MEDIA; CONTEXT;
D O I
10.1109/TCSS.2022.3218743
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growing use of media has led to the development of several machine learning (ML) and natural language processing (NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these ML and NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow adversaries to launch a diversified set of adversarial attacks on these algorithms in different applications of social media text processing. In this article, we provide a comprehensive review of the main approaches for adversarial attacks and defenses in the context of social media applications with a particular focus on key challenges and future research directions. In detail, we cover literature on six key applications: 1) rumors detection; 2) satires detection; 3) clickbaits and spams identification; 4) hate speech detection; 5) misinformation detection; and 6) sentiment analysis. We then highlight the concurrent and anticipated future research questions and provide recommendations and directions for future work.
引用
收藏
页码:3089 / 3108
页数:20
相关论文
共 184 条
[1]   Social media and satellites: Disaster event detection, linking and summarization [J].
Ahmad, Kashif ;
Pogorelov, Konstantin ;
Riegler, Michael ;
Conci, Nicola ;
Halvorsen, Pal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) :2837-2875
[2]   Sentiment Analysis Over Social Networks: An Overview [J].
Ahmed, Khaled ;
El Tazi, Neamat ;
Hossny, Ahmad Hany .
2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, :2174-2179
[3]  
Akiwowo, 2020, PROC 4 WORKSHOP ONLI, P1
[4]  
Alam F, 2021, FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EMNLP 2021, P611
[5]  
Alzantot M, 2018, 2018 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2018), P2890
[6]   GenAttack: Practical Black-box Attacks with Gradient-Free Optimization [J].
Alzantot, Moustafa ;
Sharma, Yash ;
Chakraborty, Supriyo ;
Zhang, Huan ;
Hsieh, Cho-Jui ;
Srivastava, Mani B. .
PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19), 2019, :1111-1119
[7]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[8]  
[Anonymous], 2017, 11 INT AAAI C WEB SO
[9]  
[Anonymous], 2009, arXiv preprint arXiv:1901.06543
[10]  
[Anonymous], 1947, The psychology of rumor