Artificial intelligence security: Threats and countermeasures

Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao… - ACM Computing …, 2021 - dl.acm.org
In recent years, with rapid technological advancement in both computing hardware and
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …

A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Deep transfer learning for automatic speech recognition: Towards better generalization

H Kheddar, Y Himeur, S Al-Maadeed, A Amira… - Knowledge-Based …, 2023 - Elsevier
Automatic speech recognition (ASR) has recently become an important challenge when
using deep learning (DL). It requires large-scale training datasets and high computational …

Far-field automatic speech recognition

R Haeb-Umbach, J Heymann, L Drude… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The machine recognition of speech spoken at a distance from the microphones, known as
far-field automatic speech recognition (ASR), has received a significant increase in attention …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Rethinking evaluation in asr: Are our models robust enough?

T Likhomanenko, Q Xu, V Pratap, P Tomasello… - ar** artificial learning systems that can understand and generate natural language
has been one of the long-standing goals of artificial intelligence. Recent decades have …

Generating adversarial examples for holding robustness of source code processing models

H Zhang, Z Li, G Li, L Ma, Y Liu, Z ** - Proceedings of the AAAI …, 2020 - ojs.aaai.org
Automated processing, analysis, and generation of source code are among the key activities
in software and system lifecycle. To this end, while deep learning (DL) exhibits a certain …

Beyond pixel norm-balls: Parametric adversaries using an analytically differentiable renderer

HTD Liu, M Tao, CL Li, D Nowrouzezahrai… - arxiv preprint arxiv …, 2018 - arxiv.org
Many machine learning image classifiers are vulnerable to adversarial attacks, inputs with
perturbations designed to intentionally trigger misclassification. Current adversarial methods …

Towards robustness of deep program processing models—detection, estimation, and enhancement

H Zhang, Z Fu, G Li, L Ma, Z Zhao, H Yang… - ACM Transactions on …, 2022 - dl.acm.org
Deep learning (DL) has recently been widely applied to diverse source code processing
tasks in the software engineering (SE) community, which achieves competitive performance …