Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …
personal assistants to telephony surveillance and biometric authentication. The wide …
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Deep Neural Networks have recently gained lots of success after enabling several
breakthroughs in notoriously challenging problems. Training these networks is …
breakthroughs in notoriously challenging problems. Training these networks is …
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …
speaker verification (ASV). This paper describes the third in a series of bi-annual …
Who is real bob? adversarial attacks on speaker recognition systems
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …
identification mechanism. The popularity of SR brings in serious security concerns, as …
Toward understanding and boosting adversarial transferability from a distribution perspective
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad
attention in recent years. An adversarial example can be crafted by a surrogate model and …
attention in recent years. An adversarial example can be crafted by a surrogate model and …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations
Existing efforts in audio adversarial attacks only focus on the scenarios where an adversary
has prior knowledge of the entire speech input so as to generate an adversarial example by …
has prior knowledge of the entire speech input so as to generate an adversarial example by …
Black-box adversarial attacks on commercial speech platforms with minimal information
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …
APIs and voice control devices, have received little attention until recent years. Constructing …
Characterizing audio adversarial examples using temporal dependency
Recent studies have highlighted adversarial examples as a ubiquitous threat to different
neural network models and many downstream applications. Nonetheless, as unique data …
neural network models and many downstream applications. Nonetheless, as unique data …