A review of deep learning techniques for speech processing
The field of speech processing has undergone a transformative shift with the advent of deep
learning. The use of multiple processing layers has enabled the creation of models capable …
learning. The use of multiple processing layers has enabled the creation of models capable …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Adversarial attack and defense strategies of speaker recognition systems: A survey
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …
advances in deep learning have considerably boosted the development of speech signal …
Adversarial attack and defense strategies for deep speaker recognition systems
Robust speaker recognition, including in the presence of malicious attacks, is becoming
increasingly important and essential, especially due to the proliferation of smart speakers …
increasingly important and essential, especially due to the proliferation of smart speakers …
The attacker's perspective on automatic speaker verification: An overview
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …
Inaudible adversarial perturbations for targeted attack in speaker recognition
Speaker recognition is a popular topic in biometric authentication and many deep learning
approaches have achieved extraordinary performances. However, it has been shown in …
approaches have achieved extraordinary performances. However, it has been shown in …
Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
Adversarial defense for automatic speaker verification by cascaded self-supervised learning models
Automatic speaker verification (ASV) is one of the core technologies in biometric
identification. With the ubiquitous usage of ASV systems in safety-critical applications, more …
identification. With the ubiquitous usage of ASV systems in safety-critical applications, more …
Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Large language models (LLMs) have exhibited remarkable efficacy and proficiency in a
wide array of NLP endeavors. Nevertheless, concerns are growing rapidly regarding the …
wide array of NLP endeavors. Nevertheless, concerns are growing rapidly regarding the …
[HTML][HTML] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Speaker recognition has become very popular in many application scenarios, such as smart
homes and smart assistants, due to ease of use for remote control and economic-friendly …
homes and smart assistants, due to ease of use for remote control and economic-friendly …