Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Preventing Text Stream Sequence Transformation Attack

A text flow and sequence technology, applied in the field of artificial intelligence, can solve problems such as sequential attacks, destroying sequence information, and reducing model effectiveness, achieving the best performance, strong scalability, and good portability

Active Publication Date: 2022-05-31
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the self-attention mechanism cannot capture the order information in the sequence alone, so it is necessary to add position encoding to fully represent the sequence
However, such position encoding is only a trigonometric function combined with order information, so it only needs to destroy the linearity of the trigonometric function in the position encoding, and it can effectively destroy the order information in the text to reduce the effectiveness of the model.
[0003] Therefore, the current mainstream natural language processing models based on transformer improvements need to use the linearity of trigonometric functions to obtain order information, but such encodings are subject to order attacks, and through research and experiments, we have found that Several methods for generating adversarial examples for sequential encoding. Such adversarial examples can effectively reduce the effectiveness of the model and are not easily detected by humans. The conclusion is that a means of preventing such attacks is currently needed to enhance the security of the model , which is of great significance to the security issues of the mainstream natural language processing model application
[0004] As mentioned above, the current mainstream natural language processing has added sequence coding that utilizes the linearity of trigonometric functions. Attacking sequence coding can easily reduce the accuracy of natural language processing models, but there is no complete targeting of flow sequence. How to defend against attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Preventing Text Stream Sequence Transformation Attack
  • A Method of Preventing Text Stream Sequence Transformation Attack
  • A Method of Preventing Text Stream Sequence Transformation Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The method includes the following parts and processes:

[0029] Generate a randomization sequence key: generate a randomization sequence key through the mixture Gaussian distribution learned by EM, and

[0034] The data we use mainly include two kinds, one is the ordinary text translation training data, and the other is the natural language

[0038] In order to make the randomization sequence have the best effect against attacks, we use the EM algorithm to randomize the sequence probability.

[0041]

[0042]

[0043] That is, the part of f(pos) in formulas 5.1 and 5.2 is not the normal order, but the position represented by the key. Likewise, in

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention realizes a method for preventing text flow sequence transformation attack through the method in the field of artificial intelligence. The method has three steps: learning the randomized sequence probability distribution based on the EM algorithm; generating the randomized sequence key; the training and deployment of the method needs to build an operating environment including pytorch and dependent libraries. The optimal sequence probability distribution for resisting attacks is learned through the EM algorithm, and finally the adversarial samples against flow sequence attacks cannot be accurately encoded in the attack sequence, achieving the effect of preventing text flow sequence attacks. The method of the invention has the best performance in resisting attacks, and also has the technical effect of weakening the attack strength of other text attacks.

Description

A method to prevent text flow order transformation attack technical field [0001] The present invention relates to the field of artificial intelligence, and in particular, to a method for preventing text flow order transformation attacks. Background technique [0002] Now natural language processing has been widely used in real life, such as machine translation, automatic summarization, question answering System and so on. The current mainstream natural language processing models such as Bert (Bidirectional Encoder Representation from Transformers) and its variants, etc., are improved based on the Transformer model, It mainly relies on its efficient self-attention mechanism and long-dependency alignment ability. However, the self-attention mechanism alone cannot capture the sequence The order information in the column, so it is necessary to add positional coding to fully characterize the sequence. But such a positional encoding is only It is the trigonometric funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/33G06F21/60G06F40/126G06F40/44G06F40/58
CPCG06F16/3344G06F16/3346G06F21/602G06F40/126G06F40/44G06F40/58
Inventor 李建欣周号益张帅何铭睿陈天宇
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products