PivotAttack: Rethinking the Search Trajectory in Hard-Label Text Attacks via Pivot Words

📅 2026-03-11
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the inefficiency of existing hard-label text attack methods, which typically employ an “outside-in” strategy characterized by large search spaces and high query costs. To overcome these limitations, the authors propose PivotAttack, a novel “inside-out” attack framework that introduces pivot sets—combinatorial phrases serving as predictive anchors—to guide adversarial perturbations. By leveraging inter-word dependencies to reconstruct attack trajectories and employing a multi-armed bandit algorithm to efficiently identify and perturb critical pivot sets, PivotAttack effectively induces label flips. Extensive experiments demonstrate that this approach substantially outperforms state-of-the-art methods across both traditional models and large language models, achieving significant improvements in both attack success rate and query efficiency.

Technology Category

Application Category

📝 Abstract
Existing hard-label text attacks often rely on inefficient "outside-in" strategies that traverse vast search spaces. We propose PivotAttack, a query-efficient "inside-out" framework. It employs a Multi-Armed Bandit algorithm to identify Pivot Sets-combinatorial token groups acting as prediction anchors-and strategically perturbs them to induce label flips. This approach captures inter-word dependencies and minimizes query costs. Extensive experiments across traditional models and Large Language Models demonstrate that PivotAttack consistently outperforms state-of-the-art baselines in both Attack Success Rate and query efficiency.
Problem

Research questions and friction points this paper is trying to address.

hard-label text attacks
search trajectory
query efficiency
adversarial attacks
text perturbation
Innovation

Methods, ideas, or system contributions that make the work stand out.

PivotAttack
hard-label attack
Multi-Armed Bandit
Pivot Sets
query efficiency
🔎 Similar Papers
No similar papers found.
Y
Yuzhi Liang
Guangdong University of Foreign Studies, China
S
Shiliang Xiao
Guangdong University of Foreign Studies, China
J
Jingsong Wei
Guangdong University of Foreign Studies, China
Q
Qiliang Lin
Guangdong University of Foreign Studies, China
Xia Li
Xia Li
Professor at School of Geographic Sciences, East China Normal University
GIScienceGeographical Information ScienceSpatial optimizationCellular automataAgent-based modelling