M. Alzantot, Y. Sharma, A. Elgohary, B. Ho, M. Srivastava et al., Generating natural language adversarial examples, Proc. of EMNLP 2018, pp.2890-2896, 2018.

E. Cabrio and S. Villata, Five years of argument mining: a data-driven analysis, Proc. of IJCAI, pp.5427-5433, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01876495

J. Devlin, M. Chang, K. Lee, and K. Toutanova, BERT: Pre-training of deep bidirectional transformers for language understanding, Proc. of NAACL-HLT 2019, pp.4171-4186, 2019.

I. J. Goodfellow, J. Shlens, and C. Szegedy, Explaining and harnessing adversarial examples, Proc. of ICLR 2015, 2015.

Y. Hsieh, M. Cheng, D. Juan, W. Wei, W. Hsu et al., On the robustness of selfattentive models, Proc. of ACL 2019, pp.1520-1529, 2019.

M. Iyyer, J. Wieting, K. Gimpel, and L. Zettlemoyer, Adversarial example generation with syntactically controlled paraphrase networks, Proc. of NAACL 2018, pp.1875-1885, 2018.

R. Jia and P. Liang, Adversarial examples for evaluating reading comprehension systems, Proc. of EMNLP 2017, pp.2021-2031, 2017.

J. Lawrence and C. Reed, Argument mining: A survey, Computational Linguistics, vol.45, issue.4, pp.765-818, 2019.

M. Lippi and P. Torroni, Argumentation mining: State of the art and emerging trends, ACM Trans. Internet Techn, vol.16, issue.2, p.10, 2016.

T. Mayer, Enriching language models with semantics, Proc. of ECAI 2020, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02879286

N. Papernot, P. Mcdaniel, I. Goodfellow, S. Jha, Z. B. Celik et al., Practical black-box attacks against machine learning, Proc. of ACM AsiaCCS, pp.506-519, 2017.

C. Raffel, N. Shazeer, A. Roberts, K. Lee, S. Narang et al., Exploring the limits of transfer learning with a unified text-to-text transformer, 2019.

N. Reimers, B. Schiller, T. Beck, J. Daxenberger, C. Stab et al., Classification and clustering of arguments with contextualized word embeddings, Proc. of ACL 2019, pp.567-578, 2019.

E. Shnarch, C. Alzate, L. Dankin, M. Gleize, Y. Hou et al., Will it blend? blending weak and strong labeled data in a neural network for argumentation mining, Proc. of ACL 2018, pp.599-605, 2018.

C. Stab, T. Miller, B. Schiller, P. Rai, and I. Gurevych, Cross-topic argument mining from heterogeneous sources, Proc. of EMNLP 2018, pp.3664-3674, 2018.

C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan et al., Intriguing properties of neural networks, Proc. of ICLR 2014, 2014.

E. F. Tjong-kim-sang and F. Meulder, Introduction to the CoNLL-2003 shared task: Languageindependent named entity recognition, 2003.

X. Yuan, P. He, Q. Zhu, R. R. Bhat, and X. Li, Adversarial examples: Attacks and defenses for deep learning, 2017.

R. Zellers, A. Holtzman, Y. Bisk, A. Farhadi, and Y. Choi, HellaSwag: Can a machine really finish your sentence?, Proc. of ACL 2019, pp.4791-4800, 2019.

W. E. Zhang, Q. Z. Sheng, A. Alhazmi, and C. Li, Adversarial attacks on deep-learning models in natural language processing: A survey, ACM Transactions on Intelligent Systems and Technology (TIST), vol.11, issue.3, pp.1-41, 2020.