Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency

J Guo, Y Li, X Chen, H Guo, L Sun, C Liu - arXiv preprint arXiv:2302.03251, 2023 - arxiv.org
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries
embed a hidden backdoor trigger during the training process for malicious prediction …

Zero-query adversarial attack on black-box automatic speech recognition systems

Z Fang, T Wang, L Zhao, S Zhang, B Li, Y Ge… - Proceedings of the …, 2024 - dl.acm.org
In recent years, extensive research has been conducted on the vulnerability of ASR systems,
revealing that black-box adversarial example attacks pose significant threats to real-world …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Masterkey: Practical backdoor attack against speaker verification systems

H Guo, X Chen, J Guo, L Xiao, Q Yan - Proceedings of the 29th Annual …, 2023 - dl.acm.org
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …

Vsmask: Defending against voice synthesis attack via real-time predictive perturbation

Y Wang, H Guo, G Wang, B Chen, Q Yan - Proceedings of the 16th ACM …, 2023 - dl.acm.org
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …

Antifake: Using adversarial audio to prevent unauthorized speech synthesis

Z Yu, S Zhai, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …

Echoattack: Practical inaudible attacks to smart earbuds

G Li, Z Cao, T Li - Proceedings of the 21st Annual International …, 2023 - dl.acm.org
Recent years have shown substantial interest in revealing vulnerability issues of voice-
controllable systems on smartphones and smart speakers. While significant prior works have …

Adversarial attacks on automatic speech recognition (ASR): A survey

AR Bhanushali, H Mun, J Yun - IEEE Access, 2024 - ieeexplore.ieee.org
Automatic Speech Recognition (ASR) systems have improved and eased how humans
interact with devices. ASR system converts an acoustic waveform into the relevant text form …

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

H Guo, G Wang, Y Wang, B Chen, Q Yan… - Proceedings of the 26th …, 2023 - dl.acm.org
In this paper, we propose PhantomSound, a query-efficient black-box attack toward voice
assistants. Existing black-box adversarial attacks on voice assistants either apply …

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception

M Chen, L Lu, J Yu, Z Ba, F Lin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As one of the most representative applications built on deep learning, audio systems,
including keyword spotting, automatic speech recognition, and speaker identification, have …