Universal and transferable adversarial attacks on aligned language models

A Zou, Z Wang, JZ Kolter, M Fredrikson - arXiv preprint arXiv:2307.15043, 2023 - arxiv.org
Because" out-of-the-box" large language models are capable of generating a great deal of
objectionable content, recent work has focused on aligning these models in an attempt to …

A survey on transferability of adversarial examples across deep neural networks

J Gu, X Jia, P de Jorge, W Yu, X Liu, A Ma… - arXiv preprint arXiv …, 2023 - arxiv.org
The emergence of Deep Neural Networks (DNNs) has revolutionized various domains,
enabling the resolution of complex tasks spanning image recognition, natural language …

{QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems

G Chen, Y Zhang, Z Zhao, F Song - 32nd USENIX Security Symposium …, 2023 - usenix.org
Current adversarial attacks against speaker recognition systems (SRSs) require either white-
box access or heavy black-box queries to the target SRS, thus still falling behind practical …

Recent improvements of asr models in the face of adversarial attacks

R Olivier, B Raj - arXiv preprint arXiv:2203.16536, 2022 - arxiv.org
Like many other tasks involving neural networks, Speech Recognition models are
vulnerable to adversarial attacks. However recent research has pointed out differences …

Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization

Y Liu, C Yang, D Li, J Ding… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Abstract The task of No-Reference Image Quality Assessment (NR-IQA) is to estimate the
quality score of an input image without additional information. NR-IQA models play a crucial …

Transferable adversarial examples based on global smooth perturbations

Y Liu, M Jiang, T Jiang - Computers & Security, 2022 - Elsevier
Although the attack rate and the imperceptibility of perturbations are two main concerns of
adversarial attacks, the transferability of adversarial examples is an emerging topic due to …

Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation

U Patel, S Bhilare, A Hati - Pattern Analysis and Applications, 2024 - Springer
Speaker recognition system (SRS) serves as the gatekeeper for secure access, using the
unique vocal characteristics of individuals for identification and verification. SRS can be …

Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks

O Jayawardena, D Caldera, S Jayawardena… - Proceedings of the 19th …, 2024 - dl.acm.org
Automatic Speech Recognition (ASR) systems take audio signals as inputs and output the
corresponding text transcriptions. The text is then used to execute commands and perform …

Enhancing transferability of adversarial audio in speaker recognition systems

U Patel, S Bhilare, A Hati - Iberian Conference on Pattern Recognition and …, 2023 - Springer
Although deep neural networks have demonstrated state-of-the-art performance in several
tasks such as speaker recognition among others, they are highly vulnerable to adversarial …

SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms

M Jabbeen, V Kumar, R Sen - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
IoT devices (eg, voice assistants) that execute real-time speech commands are proliferating
fast in our daily lives. In such a device, detecting the correct keyword spoken as a command …