Zero-query adversarial attack on black-box automatic speech recognition systems

Z Fang, T Wang, L Zhao, S Zhang, B Li, Y Ge… - Proceedings of the …, 2024 - dl.acm.org
In recent years, extensive research has been conducted on the vulnerability of ASR systems,
revealing that black-box adversarial example attacks pose significant threats to real-world …

Can I hear your face? pervasive attack on voice authentication systems with a single face image

N Jiang, B Sun, T Sim, J Han - 33rd USENIX Security Symposium …, 2024 - usenix.org
We present Foice, a novel deepfake attack against voice authentication systems. Foice
generates a synthetic voice of the victim from just a single image of the victim's face, without …

Adversarial attacks on autonomous driving systems in the physical world: a survey

L Chi, M Msahli, Q Zhang, H Qiu… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Autonomous Driving Systems (ADS) represent a revolutionary advancement in
transportation and offer unprecedented safety and convenience. Real-world physical attacks …

Adversarial attacks on automatic speech recognition (ASR): A survey

AR Bhanushali, H Mun, J Yun - IEEE Access, 2024 - ieeexplore.ieee.org
Automatic Speech Recognition (ASR) systems have improved and eased how humans
interact with devices. ASR system converts an acoustic waveform into the relevant text form …

Transferable adversarial attacks against asr

X Gao, Z Li, Y Chen, C Liu, H Li - IEEE Signal Processing …, 2024 - ieeexplore.ieee.org
Given the extensive research and real-world applications of automatic speech recognition
(ASR), ensuring the robustness of ASR models against minor input perturbations becomes a …

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception

M Chen, L Lu, J Yu, Z Ba, F Lin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As one of the most representative applications built on deep learning, audio systems,
including keyword spotting, automatic speech recognition, and speaker identification, have …

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer

W **, Y Cao, J Su, Q Shen, K Ye, D Wang… - Proceedings of the 2nd …, 2024 - dl.acm.org
In light of the widespread application of Automatic Speech Recognition (ASR) systems, their
security concerns have received much more attention than ever before, primarily due to the …

Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems

X Yuan, J Zhang, K Chen, C Wei, R Li, Z Ma… - ACM Transactions on …, 2024 - dl.acm.org
The attacker can generate adversarial examples (AEs) to stealthily mislead automatic
speech recognition (ASR) models, raising significant concerns about the security of …

Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit

N Park, J Kim - ACM Transactions on Privacy and Security, 2024 - dl.acm.org
Automatic speech recognition (ASR) systems are vulnerable to audio adversarial examples,
which aim to deceive ASR systems by adding perturbations to benign speech signals. These …

GWO-GEA: A Black-box Method for Generating Audio Adversarial Examples

Z Wang, X Xu, X Wang, H Zhou - 2024 9th International …, 2024 - ieeexplore.ieee.org
In the context of launching adversarial assaults on Automatic Speech Recognition (ASR)
systems, the intricacies of the target model, including its architecture and parameters, remain …