Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Adversarial examples: attacks and defences on medical deep learning systems

MK Puttagunta, S Ravi… - Multimedia Tools and …, 2023 - Springer
In recent years, significant progress has been achieved using deep neural networks (DNNs)
in obtaining human-level performance on various long-standing tasks. With the increased …

Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things

A Yazdinejad, A Dehghantanha, G Srivastava… - Journal of Systems …, 2024 - Elsevier
While federated learning (FL) is a well-known privacy-preserving (PP) solution, recent
studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the …

Backdoor attacks against voice recognition systems: A survey

B Yan, J Lan, Z Yan - ACM Computing Surveys, 2024 - dl.acm.org
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …

A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation

Y Ren, H Peng, L Li, X Xue, Y Lan, Y Yang - Journal of Systems …, 2023 - Elsevier
Voice anti-spoofing is an important step for secure speaker verification in voice-enabled
Internet of Things (IoT) systems. Most voice spoofing detection methods require significant …

[PDF][PDF] Harmonycloak: Making music unlearnable for generative ai

SIA Meerza, J Liu, L Sun - 2025 IEEE Symposium on Security …, 2024 - mosis.eecs.utk.edu
Recent advances in generative AI have significantly expanded into the realms of art and
music. This development has opened up a vast realm of possibilities, pushing the …

Lmd: A learnable mask network to detect adversarial examples for speaker verification

X Chen, J Wang, XL Zhang… - … /ACM Transactions on …, 2023 - ieeexplore.ieee.org
Although the security of automatic speaker verification (ASV) is seriously threatened by
recently emerged adversarial attacks, there have been some countermeasures to alleviate …

Can Graph Neural Networks be Adequately Explained? A Survey

X Li, J Wang, Z Yan - ACM Computing Surveys, 2025 - dl.acm.org
To address the barrier caused by the black-box nature of Deep Learning (DL) for practical
deployment, eXplainable Artificial Intelligence (XAI) has emerged and is developing rapidly …

TTSlow: Slow Down Text-to-Speech with Efficiency Robustness Evaluations

X Gao, Y Chen, X Yue, Y Tsao, NF Chen - arXiv preprint arXiv:2407.01927, 2024 - arxiv.org
Text-to-speech (TTS) has been extensively studied for generating high-quality speech with
textual inputs, playing a crucial role in various real-time applications. For real-world …

ELAMD: An ensemble learning framework for adversarial malware defense

J Chen, C Yuan, J Li, D Tian, R Ma, X Jia - Journal of Information Security …, 2023 - Elsevier
Abstract Machine learning-based methods have been widely used in malware detection.
However, recent studies show that models based on machine learning (or deep learning) …