Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

Asvspoof 2021: Towards spoofed and deepfake speech detection in the wild

X Liu, X Wang, M Sahidullah, J Patino… - … on Audio, Speech …, 2023 - ieeexplore.ieee.org
Benchmarking initiatives support the meaningful comparison of competing solutions to
prominent problems in speech and language processing. Successive benchmarking …

The defender's perspective on automatic speaker verification: An overview

H Wu, J Kang, L Meng, H Meng, H Lee - arXiv preprint arXiv:2305.12804, 2023 - arxiv.org
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments.
Regrettably, the reliability of ASV has been undermined by the emergence of spoofing …

Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems

S Joshi, J Villalba, P Żelasko… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems

H Tan, Z Gu, L Wang, H Zhang, BB Gupta… - Computers and Electrical …, 2022 - Elsevier
DNN-based speaker recognition systems (SRSs) in smart cities suffer from adversarial
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …

Improving the adversarial robustness for speaker verification by self-supervised learning

H Wu, X Li, AT Liu, Z Wu, H Meng… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Previous works have shown that automatic speaker verification (ASV) is seriously vulnerable
to malicious spoofing attacks, such as replay, synthetic speech, and recently emerged …

Voting for the right answer: Adversarial defense for speaker verification

H Wu, Y Zhang, Z Wu, D Wang, H Lee - arXiv preprint arXiv:2106.07868, 2021 - arxiv.org
Automatic speaker verification (ASV) is a well developed technology for biometric
identification, and has been ubiquitous implemented in security-critic applications, such as …

ESPnet-SPK: full pipeline speaker embedding toolkit with reproducible recipes, self-supervised front-ends, and off-the-shelf models

J Jung, W Zhang, J Shi, Z Aldeneh, T Higuchi… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper introduces ESPnet-SPK, a toolkit designed with several objectives for training
speaker embedding extractors. First, we provide an open-source platform for researchers in …

Adversarial sample detection for speaker verification by neural vocoders

H Wu, PC Hsu, J Gao, S Zhang… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Automatic speaker verification (ASV), one of the most important technology for biometric
identification, has been widely adopted in security-critical applications. However, ASV is …

PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition

M Chen, L Lu, Z Ba, K Ren - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
Voice has become a fundamental method for human-computer interactions and person
identification these days. Benefit from the rapid development of deep learning, speaker …