Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey

VT Hoang, YA Ergu, VL Nguyen, RG Chang - Journal of Network and …, 2024 - Elsevier
The advent of sixth-generation (6G) networks is expected to start a new era in mobile
networks, characterized by unprecedented high demands on dense connectivity, ultra …

Adversarial attacks on automatic speech recognition (ASR): A survey

AR Bhanushali, H Mun, J Yun - IEEE Access, 2024 - ieeexplore.ieee.org
Automatic Speech Recognition (ASR) systems have improved and eased how humans
interact with devices. ASR system converts an acoustic waveform into the relevant text form …

[PDF][PDF] SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers

G Chen, Y Zhang - CoRR, vol. abs/2401.17133, 2024 - researchgate.net
Singing voice conversion (SVC) automates song covers by converting a source singing
voice from a source singer into a new singing voice with the same lyrics and melody as the …

The Asynchronous Real-Time Universal Adversarial Perturbation Generation Method for Practical Speaker Recognition Systems

Y Lv, H Xia, R Zhang, S Xu - Available at SSRN 4822082 - papers.ssrn.com
Existing adversarial attacks against practical speaker recognition systems require attackers
to possess extensive relevant prior knowledge to generate a large number of adversarial …

Attacking Speaker Recognition Models Using Universal Perturbations in a Black-Box Scenario

Y Lv, H Xia, R Zhang, S Xu - Available at SSRN 4958804 - papers.ssrn.com
Speaker recognition models are now widely used in daily life, with their precise recognition
capabilities being applied extensively in identity recognition tasks. Recent studies have …