Wild patterns reloaded: A survey of machine learning security against training data poisoning
The success of machine learning is fueled by the increasing availability of computing power
and large training datasets. The training data is used to learn new models or update existing …
and large training datasets. The training data is used to learn new models or update existing …
Backdoor learning: A survey
Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so
that the attacked models perform well on benign samples, whereas their predictions will be …
that the attacked models perform well on benign samples, whereas their predictions will be …
Backdoor attacks against voice recognition systems: A survey
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …
speaker recognition. They have been widely deployed in various real-world applications …
Flowmur: A stealthy and practical audio backdoor attack with limited knowledge
Speech recognition systems driven by Deep Neural Networks (DNNs) have revolutionized
human-computer interaction through voice interfaces, which significantly facilitate our daily …
human-computer interaction through voice interfaces, which significantly facilitate our daily …
Towards stealthy backdoor attacks against speech recognition via elements of sound
Deep neural networks (DNNs) have been widely and successfully adopted and deployed in
various applications of speech recognition. Recently, a few works revealed that these …
various applications of speech recognition. Recently, a few works revealed that these …
Opportunistic backdoor attacks: Exploring human-imperceptible vulnerabilities on speech recognition systems
Speech recognition systems, trained and updated based on large-scale audio data, are
vulnerable to backdoor attacks that inject dedicated triggers in system training. The used …
vulnerable to backdoor attacks that inject dedicated triggers in system training. The used …
Event trojan: Asynchronous event-based backdoor attacks
As asynchronous event data is more frequently engaged in various vision tasks, the risk of
backdoor attacks becomes more evident. However, research into the potential risk …
backdoor attacks becomes more evident. However, research into the potential risk …
Going in style: Audio backdoors through stylistic transformations
This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic
transformations of malicious samples through guitar effects. We first formalize stylistic …
transformations of malicious samples through guitar effects. We first formalize stylistic …
[HTML][HTML] Security and privacy problems in voice assistant applications: A survey
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …
Stealthy backdoor attack against speaker recognition using phase-injection hidden trigger
Deep learning has achieved significant breakthroughs in speaker recognition, driven by
continual advancements in foundation models. However, malicious third-party platforms …
continual advancements in foundation models. However, malicious third-party platforms …