PivotAttack: Rethinking the Search Trajectory in Hard-Label Text Attacks via Pivot Words
arXiv cs.CL / 3/12/2026
📰 NewsIdeas & Deep AnalysisModels & Research
Key Points
- PivotAttack introduces an inside-out, query-efficient attack framework that uses a Multi-Armed Bandit to identify Pivot Sets—combinatorial token groups that anchor predictions—and perturb them to induce label flips.
- The approach captures inter-word dependencies and significantly reduces query costs compared to traditional outside-in methods.
- Experiments show PivotAttack achieves higher attack success rates and better query efficiency across traditional models and Large Language Models, beating state-of-the-art baselines.
- The work provides a scalable method for evaluating robustness and has implications for NLP security research and defense design.
Related Articles
The Honest Guide to AI Writing Tools in 2026 (What Actually Works)
Dev.to
Next-Generation LLM Inference Technology: From Flash-MoE to Gemini Flash-Lite, and Local GPU Utilization
Dev.to
The Wave of Open-Source AI and Investment in Security: Trends from Qwen, MS, and Google
Dev.to
How I built a 4-product AI income stack in 4 months (the honest version)
Dev.to
I stopped writing AI prompts from scratch. Here is the system I built instead.
Dev.to