A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Ensemble deep learning in speech signal tasks: a review

M Tanveer, A Rastogi, V Paliwal, MA Ganaie, AK Malik… - Neurocomputing, 2023 - Elsevier
Abstract Machine learning methods are extensively used for processing and analysing
speech signals by virtue of their performance gains over multiple domains. Deep learning …

Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

Attack on practical speaker verification system using universal adversarial perturbations

W Zhang, S Zhao, L Liu, J Li, X Cheng… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
In authentication scenarios, applications of practical speaker verification systems usually
require a person to read a dynamic authentication text. Previous studies played an audio …

Speech and speaker recognition using raw waveform modeling for adult and children's speech: A comprehensive review

K Radha, M Bansal, RB Pachori - Engineering Applications of Artificial …, 2024 - Elsevier
Conventionally, the extraction of hand-crafted acoustic features has been separated from the
task of establishing robust machine-learning models in speech processing. The manual …

[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition

G Chen, Z Zhao, F Song, S Chen, L Fan… - arXiv preprint arXiv …, 2021 - academia.edu
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …

Symmetric saliency-based adversarial attack to speaker identification

J Yao, X Chen, XL Zhang, WQ Zhang… - IEEE Signal Processing …, 2023 - ieeexplore.ieee.org
Adversarial attack approaches to speaker identification either need high computational cost
or are not very effective, to our knowledge. To address this issue, in this letter, we propose a …

A geometrical approach to evaluate the adversarial robustness of deep neural networks

Y Wang, B Dong, K Xu, H Piao, Y Ding, B Yin… - ACM Transactions on …, 2023 - dl.acm.org
Deep neural networks (DNNs) are widely used for computer vision tasks. However, it has
been shown that deep models are vulnerable to adversarial attacks—that is, their …

[PDF][PDF] Speaker-Specific Utterance Ensemble based Transfer Attack on Speaker Identification.

CX Zuo, JY Leng, WJ Li - INTERSPEECH, 2022 - isca-archive.org
While speaker identification (SI) systems based on deep neural network (DNN) have been
widely applied in securityrelated practical tasks, more and more attention has been attracted …

Exploring the effect of high-frequency components in gans training

Z Li, P Xia, X Rui, B Li - ACM Transactions on Multimedia Computing …, 2023 - dl.acm.org
Generative Adversarial Networks (GANs) have the ability to generate images that are
visually indistinguishable from real images. However, recent studies have revealed that …