Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Mm-bd: Post-training detection of backdoor attacks with arbitrary backdoor pattern types using a maximum margin statistic
Backdoor attacks are an important type of adversarial threat against deep neural network
classifiers, wherein test samples from one or more source classes will be (mis) classified to …
classifiers, wherein test samples from one or more source classes will be (mis) classified to …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Wavefake: A data set to facilitate audio deepfake detection
J Frank, L Schönherr - arXiv preprint arXiv:2111.02813, 2021 - arxiv.org
Deep generative modeling has the potential to cause significant harm to society.
Recognizing this threat, a magnitude of research into detecting so-called" Deepfakes" has …
Recognizing this threat, a magnitude of research into detecting so-called" Deepfakes" has …
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
Adversarial attack and defense strategies of speaker recognition systems: A survey
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …
advances in deep learning have considerably boosted the development of speech signal …
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …
such tools can be extremely useful in applications where people consent to their voices …
Towards understanding and mitigating audio adversarial examples for speaker recognition
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …
adversarial attacks, raising significant security concerns. In this work, we systematically …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …