Assuring the machine learning lifecycle: Desiderata, methods, and challenges

R Ashmore, R Calinescu, C Paterson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Machine learning has evolved into an enabling technology for a wide range of highly
successful applications. The potential for this success to continue and accelerate has placed …

Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

Imperceptible, robust, and targeted adversarial examples for automatic speech recognition

Y Qin, N Carlini, G Cottrell… - … on machine learning, 2019 - proceedings.mlr.press
Adversarial examples are inputs to machine learning models designed by an adversary to
cause an incorrect output. So far, adversarial examples have been studied most extensively …

Who is real bob? adversarial attacks on speaker recognition systems

G Chen, S Chenb, L Fan, X Du, Z Zhao… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …

Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions

SK Khan, N Shiwakoti, P Stasinopoulos… - Accident Analysis & …, 2020 - Elsevier
Abstract Modern-day Connected and Autonomous Vehicles (CAVs) with more than 100
million code lines, running up-to a hundred Electronic Control Units (ECUs) will create and …

Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems

T Sugawara, B Cyr, S Rampazzi, D Genkin… - 29th USENIX Security …, 2020 - usenix.org
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …

Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding

L Schönherr, K Kohls, S Zeiler, T Holz… - arXiv preprint arXiv …, 2018 - arxiv.org
Voice interfaces are becoming accepted widely as input methods for a diverse set of
devices. This development is driven by rapid improvements in automatic speech recognition …

Attacking deep reinforcement learning with decoupled adversarial policy

K Mo, W Tang, J Li, X Yuan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
While Deep Reinforcement Learning (DRL) has achieved outstanding performance in
extensive applications, exploiting its vulnerability with adversarial attacks is essential …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

A review on speaker recognition: Technology and challenges

RM Hanifa, K Isa, S Mohamad - Computers & Electrical Engineering, 2021 - Elsevier
Voice is a behavioral biometric that conveys information related to a person's traits, such as
the speaker's ethnicity, age, gender, and feeling. Speaker recognition deals with recognizing …