Wild patterns reloaded: A survey of machine learning security against training data poisoning

AE Cinà, K Grosse, A Demontis, S Vascon… - ACM Computing …, 2023 - dl.acm.org
The success of machine learning is fueled by the increasing availability of computing power
and large training datasets. The training data is used to learn new models or update existing …

Backdoor learning: A survey

Y Li, Y Jiang, Z Li, ST **a - IEEE Transactions on Neural …, 2022 - ieeexplore.ieee.org
Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so
that the attacked models perform well on benign samples, whereas their predictions will be …

Backdoor attacks against voice recognition systems: A survey

B Yan, J Lan, Z Yan - ACM Computing Surveys, 2024 - dl.acm.org
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …

Flowmur: A stealthy and practical audio backdoor attack with limited knowledge

J Lan, J Wang, B Yan, Z Yan… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Speech recognition systems driven by Deep Neural Networks (DNNs) have revolutionized
human-computer interaction through voice interfaces, which significantly facilitate our daily …

Towards stealthy backdoor attacks against speech recognition via elements of sound

H Cai, P Zhang, H Dong, Y **ao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been widely and successfully adopted and deployed in
various applications of speech recognition. Recently, a few works revealed that these …

Opportunistic backdoor attacks: Exploring human-imperceptible vulnerabilities on speech recognition systems

Q Liu, T Zhou, Z Cai, Y Tang - Proceedings of the 30th ACM International …, 2022 - dl.acm.org
Speech recognition systems, trained and updated based on large-scale audio data, are
vulnerable to backdoor attacks that inject dedicated triggers in system training. The used …

Event trojan: Asynchronous event-based backdoor attacks

R Wang, Q Guo, H Li, R Wan - European Conference on Computer Vision, 2024 - Springer
As asynchronous event data is more frequently engaged in various vision tasks, the risk of
backdoor attacks becomes more evident. However, research into the potential risk …

Going in style: Audio backdoors through stylistic transformations

S Koffas, L Pajola, S Picek… - ICASSP 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic
transformations of malicious samples through guitar effects. We first formalize stylistic …

[HTML][HTML] Security and privacy problems in voice assistant applications: A survey

J Li, C Chen, MR Azghadi, H Ghodosi, L Pan… - Computers & …, 2023 - Elsevier
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …

Stealthy backdoor attack against speaker recognition using phase-injection hidden trigger

Z Ye, D Yan, L Dong, J Deng… - IEEE Signal Processing …, 2023 - ieeexplore.ieee.org
Deep learning has achieved significant breakthroughs in speaker recognition, driven by
continual advancements in foundation models. However, malicious third-party platforms …