Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward

A Qayyum, M Usama, J Qadir… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) will form the backbone of future next-
generation intelligent transportation systems (ITS) providing travel comfort, road safety …

Imperceptible, robust, and targeted adversarial examples for automatic speech recognition

Y Qin, N Carlini, G Cottrell… - … on machine learning, 2019 - proceedings.mlr.press
Adversarial examples are inputs to machine learning models designed by an adversary to
cause an incorrect output. So far, adversarial examples have been studied most extensively …

Deep transfer learning for automatic speech recognition: Towards better generalization

H Kheddar, Y Himeur, S Al-Maadeed, A Amira… - Knowledge-Based …, 2023 - Elsevier
Automatic speech recognition (ASR) has recently become an important challenge when
using deep learning (DL). It requires large-scale training datasets and high computational …

Stable neural ode with lyapunov-stable equilibrium points for defending against adversarial attacks

Q Kang, Y Song, Q Ding… - Advances in Neural …, 2021 - proceedings.neurips.cc
Deep neural networks (DNNs) are well-known to be vulnerable to adversarial attacks, where
malicious human-imperceptible perturbations are included in the input to the deep network …

Who is real bob? adversarial attacks on speaker recognition systems

G Chen, S Chenb, L Fan, X Du, Z Zhao… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …

Speech technology for healthcare: Opportunities, challenges, and state of the art

S Latif, J Qadir, A Qayyum, M Usama… - IEEE Reviews in …, 2020 - ieeexplore.ieee.org
Speech technology is not appropriately explored even though modern advances in speech
technology—especially those driven by deep learning (DL) technology—offer …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations

Z Li, Y Wu, J Liu, Y Chen, B Yuan - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Existing efforts in audio adversarial attacks only focus on the scenarios where an adversary
has prior knowledge of the entire speech input so as to generate an adversarial example by …

Black-box adversarial attacks on commercial speech platforms with minimal information

B Zheng, P Jiang, Q Wang, Q Li, C Shen… - Proceedings of the …, 2021 - dl.acm.org
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …