Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries
embed a hidden backdoor trigger during the training process for malicious prediction …
embed a hidden backdoor trigger during the training process for malicious prediction …
Zero-query adversarial attack on black-box automatic speech recognition systems
In recent years, extensive research has been conducted on the vulnerability of ASR systems,
revealing that black-box adversarial example attacks pose significant threats to real-world …
revealing that black-box adversarial example attacks pose significant threats to real-world …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Masterkey: Practical backdoor attack against speaker verification systems
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
Vsmask: Defending against voice synthesis attack via real-time predictive perturbation
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …
realistic speech synthesis. While this technology has great potential to improve lives, it also …
Echoattack: Practical inaudible attacks to smart earbuds
Recent years have shown substantial interest in revealing vulnerability issues of voice-
controllable systems on smartphones and smart speakers. While significant prior works have …
controllable systems on smartphones and smart speakers. While significant prior works have …
Adversarial attacks on automatic speech recognition (ASR): A survey
AR Bhanushali, H Mun, J Yun - IEEE Access, 2024 - ieeexplore.ieee.org
Automatic Speech Recognition (ASR) systems have improved and eased how humans
interact with devices. ASR system converts an acoustic waveform into the relevant text form …
interact with devices. ASR system converts an acoustic waveform into the relevant text form …
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
In this paper, we propose PhantomSound, a query-efficient black-box attack toward voice
assistants. Existing black-box adversarial attacks on voice assistants either apply …
assistants. Existing black-box adversarial attacks on voice assistants either apply …
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception
As one of the most representative applications built on deep learning, audio systems,
including keyword spotting, automatic speech recognition, and speaker identification, have …
including keyword spotting, automatic speech recognition, and speaker identification, have …