A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Towards understanding and mitigating audio adversarial examples for speaker recognition
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …
adversarial attacks, raising significant security concerns. In this work, we systematically …
Adversarial attacks and defenses on cyber–physical systems: A survey
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …
vision with the camera as the main sensor source to obtain the input image or video data …
Defending against adversarial audio via diffusion model
Deep learning models have been widely used in commercial acoustic systems in recent
years. However, adversarial audio examples can cause abnormal behaviors for those …
years. However, adversarial audio examples can cause abnormal behaviors for those …
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems
DNN-based speaker recognition systems (SRSs) in smart cities suffer from adversarial
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …
[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …
attacks are often assessed using different SR models, recognition tasks and datasets, and …
MP3 compression to diminish adversarial noise in end-to-end speech recognition
I Andronic, L Kürzinger, ER Chavez Rosas… - Speech and Computer …, 2020 - Springer
Abstract Audio Adversarial Examples (AAE) represent purposefully designed inputs meant
to trick Automatic Speech Recognition (ASR) systems into misclassification. The present …
to trick Automatic Speech Recognition (ASR) systems into misclassification. The present …
[PDF][PDF] NRI-FGSM: An Efficient Transferable Adversarial Attack Method for Speaker Recognition System
Deep neural network (DNN), though widely applied in Speaker Recognition Systems (SRS),
is vulnerable to adversarial attacks which are hard to detect by humans. The black-box …
is vulnerable to adversarial attacks which are hard to detect by humans. The black-box …
Detecting and Defending Against Adversarial Attacks on Automatic Speech Recognition via Diffusion Models
NL Kühne, AHF Kitchen, MS Jensen… - arxiv preprint arxiv …, 2024 - arxiv.org
Automatic speech recognition (ASR) systems are known to be vulnerable to adversarial
attacks. This paper addresses detection and defence against targeted white-box attacks on …
attacks. This paper addresses detection and defence against targeted white-box attacks on …
A Robust CycleGAN-L2 Defense Method for Speaker Recognition System
L Yang, Y Xu, S Zhang, X Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid development of voice technology, speaker recognition is becoming
increasingly prevalent in our daily lives. However, with its increased usage, security issues …
increasingly prevalent in our daily lives. However, with its increased usage, security issues …