A review of deep learning techniques for speech processing

A Mehrish, N Majumder, R Bharadwaj, R Mihalcea… - Information …, 2023 - Elsevier
The field of speech processing has undergone a transformative shift with the advent of deep
learning. The use of multiple processing layers has enabled the creation of models capable …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

[HTML][HTML] Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

Adversarial attack and defense strategies for deep speaker recognition systems

A Jati, CC Hsu, M Pal, R Peri, W AbdAlmageed… - Computer Speech & …, 2021 - Elsevier
Robust speaker recognition, including in the presence of malicious attacks, is becoming
increasingly important and essential, especially due to the proliferation of smart speakers …

The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …

Inaudible adversarial perturbations for targeted attack in speaker recognition

Q Wang, P Guo, L Xie - arXiv preprint arXiv:2005.10637, 2020 - arxiv.org
Speaker recognition is a popular topic in biometric authentication and many deep learning
approaches have achieved extraordinary performances. However, it has been shown in …

Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems

S Joshi, J Villalba, P Żelasko… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …

Adversarial defense for automatic speaker verification by cascaded self-supervised learning models

H Wu, X Li, AT Liu, Z Wu, H Meng… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
Automatic speaker verification (ASV) is one of the core technologies in biometric
identification. With the ubiquitous usage of ASV systems in safety-critical applications, more …

[HTML][HTML] Adversarial attacks and defenses in Speaker Recognition Systems: A survey

J Lan, R Zhang, Z Yan, J Wang, Y Chen… - Journal of Systems …, 2022 - Elsevier
Speaker recognition has become very popular in many application scenarios, such as smart
homes and smart assistants, due to ease of use for remote control and economic-friendly …

Improving the adversarial robustness for speaker verification by self-supervised learning

H Wu, X Li, AT Liu, Z Wu, H Meng… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Previous works have shown that automatic speaker verification (ASV) is seriously vulnerable
to malicious spoofing attacks, such as replay, synthetic speech, and recently emerged …