A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Towards understanding and mitigating audio adversarial examples for speaker recognition

G Chen, Z Zhao, F Song, S Chen, L Fan… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …

Adversarial attacks and defenses on cyber–physical systems: A survey

J Li, Y Liu, T Chen, Z **ao, Z Li… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …

Defending against adversarial audio via diffusion model

S Wu, J Wang, W **, W Nie, C **ao - arxiv preprint arxiv:2303.01507, 2023 - arxiv.org
Deep learning models have been widely used in commercial acoustic systems in recent
years. However, adversarial audio examples can cause abnormal behaviors for those …

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems

H Tan, Z Gu, L Wang, H Zhang, BB Gupta… - Computers and Electrical …, 2022 - Elsevier
DNN-based speaker recognition systems (SRSs) in smart cities suffer from adversarial
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …

[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition

G Chen, Z Zhao, F Song, S Chen, L Fan… - arxiv preprint arxiv …, 2021 - academia.edu
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …

MP3 compression to diminish adversarial noise in end-to-end speech recognition

I Andronic, L Kürzinger, ER Chavez Rosas… - Speech and Computer …, 2020 - Springer
Abstract Audio Adversarial Examples (AAE) represent purposefully designed inputs meant
to trick Automatic Speech Recognition (ASR) systems into misclassification. The present …

[PDF][PDF] NRI-FGSM: An Efficient Transferable Adversarial Attack Method for Speaker Recognition System

H Tan, J Zhang, H Zhang, L Wang… - Proceedings of the 23st …, 2022 - isca-archive.org
Deep neural network (DNN), though widely applied in Speaker Recognition Systems (SRS),
is vulnerable to adversarial attacks which are hard to detect by humans. The black-box …

Detecting and Defending Against Adversarial Attacks on Automatic Speech Recognition via Diffusion Models

NL Kühne, AHF Kitchen, MS Jensen… - arxiv preprint arxiv …, 2024 - arxiv.org
Automatic speech recognition (ASR) systems are known to be vulnerable to adversarial
attacks. This paper addresses detection and defence against targeted white-box attacks on …

A Robust CycleGAN-L2 Defense Method for Speaker Recognition System

L Yang, Y Xu, S Zhang, X Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid development of voice technology, speaker recognition is becoming
increasingly prevalent in our daily lives. However, with its increased usage, security issues …