Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

The defender's perspective on automatic speaker verification: An overview

H Wu, J Kang, L Meng, H Meng, H Lee - arXiv preprint arXiv:2305.12804, 2023 - arxiv.org
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments.
Regrettably, the reliability of ASV has been undermined by the emergence of spoofing …

Lmd: A learnable mask network to detect adversarial examples for speaker verification

X Chen, J Wang, XL Zhang… - … /ACM Transactions on …, 2023 - ieeexplore.ieee.org
Although the security of automatic speaker verification (ASV) is seriously threatened by
recently emerged adversarial attacks, there have been some countermeasures to alleviate …

Time-domain speech super-resolution with gan based modeling for telephony speaker verification

S Kataria, J Villalba, L Moro-Velázquez… - … on Audio, Speech …, 2024 - ieeexplore.ieee.org
Automatic Speaker Verification (ASV) technology has become commonplace in virtual
assistants. However, its performance suffers when there is a mismatch between the train and …

Unraveling Adversarial Examples against Speaker Identification--Techniques for Attack Detection and Victim Model Classification

S Joshi, T Thebaud, J Villalba, N Dehak - arXiv preprint arXiv:2402.19355, 2024 - arxiv.org
Adversarial examples have proven to threaten speaker identification systems, and several
countermeasures against them have been proposed. In this paper, we propose a method to …

[PDF][PDF] VoiceDefense: Protecting Automatic Speaker Verification Models Against Black-box Adversarial Attacks

YK Kan, K Xu, H Li, J Shi - Proc. Interspeech 2024, 2024 - isca-archive.org
Abstract Automatic Speaker Verification (ASV) is extensively used in many security-sensitive
domains, but the increasing prevalence of adversarial attacks has seriously compromised …

From Attack to Defense: Strengthening DNN Text Classification Against Adversarial Examples

M Omar - Innovations, Securities, and Case Studies Across …, 2024 - igi-global.com
In recent academic discussions surrounding the textual domain, there has been significant
attention directed towards adversarial examples. Despite this focus, the area of detecting …

Building Trust in Deepfake Detection: A Survey of Adversarial and Anti-forensic Attacks and Defensive Strategies

H Ilyas, F Khalid, A Javed, KM Malik, A Irtaza - 2024 - papers.ssrn.com
As the technology behind deepfakes advances, detecting audiovisual deepfakes becomes
more and more crucial, and the rise of traditional and generative AI-based adversarial/anti …

Robust Speaker Recognition using Perceptual and Adversarial Speech Enhancement

S Kataria - 2023 - jscholarship.library.jhu.edu
Abstract In Automatic Speaker Verification (ASV), we determine whether the speaker in the
test utterance is identical to the previously enrolled speaker. Deep learning has significantly …

[PDF][PDF] Countermeasures against Adversarial Attacks on Speech Technologies

S Joshi - isca-students.org
With proliferation of speech technologies in everyday life, their security becomes of utmost
importance. Recently, researchers have found stealthy and almost human-imperceptible …