Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity
The outstanding performance of deep neural networks has promoted deep learning
applications in a broad set of domains. However, the potential risks caused by adversarial …
applications in a broad set of domains. However, the potential risks caused by adversarial …
Defense strategies for adversarial machine learning: A survey
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Aegis: Mitigating targeted bit-flip attacks against deep neural networks
Bit-flip attacks (BFAs) have attracted substantial attention recently, in which an adversary
could tamper with a small number of model parameter bits to break the integrity of DNNs. To …
could tamper with a small number of model parameter bits to break the integrity of DNNs. To …
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …
become an increasing public concern. Existing studies have designed a set of machine …
{KENKU}: Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems
Prior researchers show that existing automatic speech recognition (ASR) systems are
vulnerable to adversarial examples. Most existing adversarial attacks against ASR systems …
vulnerable to adversarial examples. Most existing adversarial attacks against ASR systems …
Masterkey: Practical backdoor attack against speaker verification systems
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
Vsmask: Defending against voice synthesis attack via real-time predictive perturbation
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …
realistic speech synthesis. While this technology has great potential to improve lives, it also …