Vsmask: Defending against voice synthesis attack via real-time predictive perturbation

Y Wang, H Guo, G Wang, B Chen, Q Yan - Proceedings of the 16th ACM …, 2023 - dl.acm.org
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …

Voiceblock: Privacy through real-time adversarial attacks with audio-to-audio models

P O'Reilly, A Bugler, K Bhandari… - Advances in Neural …, 2022 - proceedings.neurips.cc
As governments and corporations adopt deep learning systems to collect and analyze user-
generated audio data, concerns about security and privacy naturally emerge in areas such …

Uniap: Protecting speech privacy with non-targeted universal adversarial perturbations

P Cheng, Y Wu, Y Hong, Z Ba, F Lin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Ubiquitous microphones on smart devices considerably raise users' concerns about speech
privacy. Since the microphones are primarily controlled by hardware/software developers …

Adversarial examples in the physical world: A survey

J Wang, X Liu, J Hu, D Wang, S Wu, T Jiang… - arxiv preprint arxiv …, 2023 - arxiv.org
Deep neural networks (DNNs) have demonstrated high vulnerability to adversarial
examples, raising broad security concerns about their applications. Besides the attacks in …

Push the limit of adversarial example attack on speaker recognition in physical domain

Q Chen, M Chen, L Lu, J Yu, Y Chen, Z Wang… - Proceedings of the 20th …, 2022 - dl.acm.org
The integration of deep learning on Speaker Recognition (SR) advances its development
and wide deployment, but also introduces the emerging threat of adversarial examples …

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Y Wang, Q Yan, N Ivanov, X Chen - arxiv preprint arxiv:2312.06010, 2023 - arxiv.org
The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security
vulnerabilities in voice control systems. While researchers have introduced a multitude of …

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer

W **, Y Cao, J Su, Q Shen, K Ye, D Wang… - Proceedings of the 2nd …, 2024 - dl.acm.org
In light of the widespread application of Automatic Speech Recognition (ASR) systems, their
security concerns have received much more attention than ever before, primarily due to the …

DynamicPAE: Generating Scene-Aware Physical Adversarial Examples in Real-Time

J Hu, X Liu, J Wang, J Zhang, X Yang, H Qin… - arxiv preprint arxiv …, 2024 - arxiv.org
Physical adversarial examples (PAEs) are regarded as" whistle-blowers" of real-world risks
in deep-learning applications. However, current PAE generation studies show limited …

Universal Fourier Attack for Time Series

E Coda, B Clymer, C DeSmet… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
A wide variety of adversarial attacks have been proposed and explored using image and
audio data. These attacks are notoriously easy to generate digitally when the attacker can …

Harmonizing Audio and Human Interaction: Enhancement, Analysis, and Application of Audio Signals via Machine Learning Approaches

R Xu - 2024 - search.proquest.com
In this thesis, we tackle key challenges in processing audio signals, specifically focusing on
speech and music. These signals are crucial for human interaction with both the …