Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity

S Zhou, C Liu, D Ye, T Zhu, W Zhou, PS Yu - ACM Computing Surveys, 2022 - dl.acm.org
The outstanding performance of deep neural networks has promoted deep learning
applications in a broad set of domains. However, the potential risks caused by adversarial …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Aegis: Mitigating targeted bit-flip attacks against deep neural networks

J Wang, Z Zhang, M Wang, H Qiu, T Zhang… - 32nd USENIX Security …, 2023 - usenix.org
Bit-flip attacks (BFAs) have attracted substantial attention recently, in which an adversary
could tamper with a small number of model parameter bits to break the integrity of DNNs. To …

Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array

Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan… - Proceedings of the 2021 …, 2021 - dl.acm.org
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …

{KENKU}: Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems

X Wu, S Ma, C Shen, C Lin, Q Wang, Q Li… - 32nd USENIX Security …, 2023 - usenix.org
Prior researchers show that existing automatic speech recognition (ASR) systems are
vulnerable to adversarial examples. Most existing adversarial attacks against ASR systems …

Masterkey: Practical backdoor attack against speaker verification systems

H Guo, X Chen, J Guo, L Xiao, Q Yan - Proceedings of the 29th Annual …, 2023 - dl.acm.org
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …

Vsmask: Defending against voice synthesis attack via real-time predictive perturbation

Y Wang, H Guo, G Wang, B Chen, Q Yan - Proceedings of the 16th ACM …, 2023 - dl.acm.org
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …

Antifake: Using adversarial audio to prevent unauthorized speech synthesis

Z Yu, S Zhai, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …