Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

The defender's perspective on automatic speaker verification: An overview

H Wu, J Kang, L Meng, H Meng, H Lee - arXiv preprint arXiv:2305.12804, 2023 - arxiv.org
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments.
Regrettably, the reliability of ASV has been undermined by the emergence of spoofing …

Advest: Adversarial perturbation estimation to classify and detect adversarial attacks against speaker identification

S Joshi, S Kataria, J Villalba, N Dehak - arXiv preprint arXiv:2204.03848, 2022 - arxiv.org
Adversarial attacks pose a severe security threat to the state-of-the-art speaker identification
systems, thereby making it vital to propose countermeasures against them. Building on our …

Masking speech feature to detect adversarial examples for speaker verification

X Chen, J Yao, XL Zhang - 2022 Asia-Pacific Signal and …, 2022 - ieeexplore.ieee.org
Adversarial examples of speaker verification (SV) systems are the clean audio recordings
added with imperceptible perturbation. They are generated to manipulate the decision of SV …

Advsv: An over-the-air adversarial attack dataset for speaker verification

L Wang, J Li, Y Luo, J Zheng, L Wang… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
It is known that deep neural networks are vulnerable to adversarial attacks. Although
Automatic Speaker Verification (ASV) built on top of deep neural networks exhibits robust …

On the detection of adaptive adversarial attacks in speaker verification systems

Z Chen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Speaker verification (SV) systems have been widely used in smartphones and Internet of
Things devices to identify legitimate users. In recent work, it has been shown that adversarial …

Defending against fakebob adversarial attacks in speaker verification systems with noise-adding

Z Chen, LC Chang, C Chen, G Wang, Z Bi - Algorithms, 2022 - mdpi.com
Speaker verification systems use human voices as an important biometric to identify
legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart …

Unraveling Adversarial Examples against Speaker Identification--Techniques for Attack Detection and Victim Model Classification

S Joshi, T Thebaud, J Villalba, N Dehak - arXiv preprint arXiv:2402.19355, 2024 - arxiv.org
Adversarial examples have proven to threaten speaker identification systems, and several
countermeasures against them have been proposed. In this paper, we propose a method to …

[PDF][PDF] VoiceDefense: Protecting Automatic Speaker Verification Models Against Black-box Adversarial Attacks

YK Kan, K Xu, H Li, J Shi - Proc. Interspeech 2024, 2024 - isca-archive.org
Abstract Automatic Speaker Verification (ASV) is extensively used in many security-sensitive
domains, but the increasing prevalence of adversarial attacks has seriously compromised …

Adversarial audio detection method based on transformer

Y Li, D Luo - … Conference on Machine Learning and Intelligent …, 2022 - ieeexplore.ieee.org
Speech recognition technology has been applied to all aspects of our daily life, but it faces
many security issues. One of the major threats is the adversarial audio examples, which may …