Vsmask: Defending against voice synthesis attack via real-time predictive perturbation
Deep learning based voice synthesis technology generates artificial human-like speeches,
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
which has been used in deepfakes or identity theft attacks. Existing defense mechanisms …
Voiceblock: Privacy through real-time adversarial attacks with audio-to-audio models
As governments and corporations adopt deep learning systems to collect and analyze user-
generated audio data, concerns about security and privacy naturally emerge in areas such …
generated audio data, concerns about security and privacy naturally emerge in areas such …
Uniap: Protecting speech privacy with non-targeted universal adversarial perturbations
Ubiquitous microphones on smart devices considerably raise users' concerns about speech
privacy. Since the microphones are primarily controlled by hardware/software developers …
privacy. Since the microphones are primarily controlled by hardware/software developers …
Adversarial examples in the physical world: A survey
Deep neural networks (DNNs) have demonstrated high vulnerability to adversarial
examples, raising broad security concerns about their applications. Besides the attacks in …
examples, raising broad security concerns about their applications. Besides the attacks in …
Push the limit of adversarial example attack on speaker recognition in physical domain
The integration of deep learning on Speaker Recognition (SR) advances its development
and wide deployment, but also introduces the emerging threat of adversarial examples …
and wide deployment, but also introduces the emerging threat of adversarial examples …
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
The emergence of Artificial Intelligence (AI)-driven audio attacks has revealed new security
vulnerabilities in voice control systems. While researchers have introduced a multitude of …
vulnerabilities in voice control systems. While researchers have introduced a multitude of …
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
In light of the widespread application of Automatic Speech Recognition (ASR) systems, their
security concerns have received much more attention than ever before, primarily due to the …
security concerns have received much more attention than ever before, primarily due to the …
DynamicPAE: Generating Scene-Aware Physical Adversarial Examples in Real-Time
Physical adversarial examples (PAEs) are regarded as" whistle-blowers" of real-world risks
in deep-learning applications. However, current PAE generation studies show limited …
in deep-learning applications. However, current PAE generation studies show limited …
Universal Fourier Attack for Time Series
E Coda, B Clymer, C DeSmet… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
A wide variety of adversarial attacks have been proposed and explored using image and
audio data. These attacks are notoriously easy to generate digitally when the attacker can …
audio data. These attacks are notoriously easy to generate digitally when the attacker can …
Harmonizing Audio and Human Interaction: Enhancement, Analysis, and Application of Audio Signals via Machine Learning Approaches
R Xu - 2024 - search.proquest.com
In this thesis, we tackle key challenges in processing audio signals, specifically focusing on
speech and music. These signals are crucial for human interaction with both the …
speech and music. These signals are crucial for human interaction with both the …