ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.00554
  4. Cited By
Did you hear that? Adversarial Examples Against Automatic Speech
  Recognition

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

2 January 2018
M. Alzantot
Bharathan Balaji
Mani B. Srivastava
    AAML
ArXivPDFHTML

Papers citing "Did you hear that? Adversarial Examples Against Automatic Speech Recognition"

44 / 44 papers shown
Title
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech
  Foundation Models
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models
Vyas Raina
Rao Ma
Charles G McGhee
Kate Knill
Mark Gales
AAML
33
5
0
09 May 2024
A Survey of Adversarial CAPTCHAs on its History, Classification and
  Generation
A Survey of Adversarial CAPTCHAs on its History, Classification and Generation
Zisheng Xu
Qiao Yan
Fei Yu
Victor C.M. Leung
AAML
29
1
0
22 Nov 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced
  Driver-Assistance System
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System
Jiwei Guan
Lei Pan
Chen Wang
Shui Yu
Longxiang Gao
Xi Zheng
AAML
19
3
0
30 May 2023
DistriBlock: Identifying adversarial audio samples by leveraging
  characteristics of the output distribution
DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías P. Pizarro
D. Kolossa
Asja Fischer
AAML
43
1
0
26 May 2023
Deep representation learning: Fundamentals, Perspectives, Applications,
  and Open Challenges
Deep representation learning: Fundamentals, Perspectives, Applications, and Open Challenges
K. T. Baghaei
Amirreza Payandeh
Pooya Fayyazsanavi
Shahram Rahimi
Zhiqian Chen
Somayeh Bakhtiari Ramezani
FaML
AI4TS
38
6
0
27 Nov 2022
Privacy against Real-Time Speech Emotion Detection via Acoustic
  Adversarial Evasion of Machine Learning
Privacy against Real-Time Speech Emotion Detection via Acoustic Adversarial Evasion of Machine Learning
Brian Testa
Yi Xiao
Harshit Sharma
Avery Gump
Asif Salekin
AAML
40
7
0
17 Nov 2022
Leveraging Domain Features for Detecting Adversarial Attacks Against
  Deep Speech Recognition in Noise
Leveraging Domain Features for Detecting Adversarial Attacks Against Deep Speech Recognition in Noise
Christian Heider Nielsen
Zheng-Hua Tan
AAML
19
1
0
03 Nov 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
26
1
0
17 Sep 2022
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on
  Automatic Speech Recognition Systems
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
H. Abdullah
Aditya Karlekar
S. Prasad
Muhammad Sajidur Rahman
Logan Blue
L. A. Bauer
Vincent Bindschaedler
Patrick Traynor
AAML
29
3
0
10 Mar 2022
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
Md. Imran Hossen
X. Hei
31
4
0
05 Mar 2022
Adversarial Attacks on Speech Recognition Systems for Mission-Critical
  Applications: A Survey
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey
Ngoc Dung Huynh
Mohamed Reda Bouadjenek
Imran Razzak
Kevin Lee
Chetan Arora
Ali Hassani
A. Zaslavsky
AAML
34
6
0
22 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
24
21
0
02 Dec 2021
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Joel Frank
Lea Schonherr
DiffM
129
125
0
04 Nov 2021
Generating Watermarked Adversarial Texts
Generating Watermarked Adversarial Texts
Mingjie Li
Hanzhou Wu
Xinpeng Zhang
AAML
WaLM
24
1
0
25 Oct 2021
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
25
12
0
04 Sep 2021
Improving the Adversarial Robustness for Speaker Verification by
  Self-Supervised Learning
Improving the Adversarial Robustness for Speaker Verification by Self-Supervised Learning
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
Helen Meng
Hung-yi Lee
AAML
SSL
50
29
0
01 Jun 2021
Grey-box Adversarial Attack And Defence For Sentiment Classification
Grey-box Adversarial Attack And Defence For Sentiment Classification
Ying Xu
Xu Zhong
Antonio Jimeno Yepes
Jey Han Lau
VLM
AAML
16
53
0
22 Mar 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
Shehzeen Samarah Hussain
Paarth Neekhara
Shlomo Dubnov
Julian McAuley
F. Koushanfar
AAML
30
71
0
04 Mar 2021
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale
  Black-Box Optimization
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization
HanQin Cai
Y. Lou
Daniel McKenzie
W. Yin
34
40
0
21 Feb 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
39
24
0
10 Feb 2021
Semantics and explanation: why counterfactual explanations produce
  adversarial examples in deep neural networks
Semantics and explanation: why counterfactual explanations produce adversarial examples in deep neural networks
Kieran Browne
Ben Swift
AAML
GAN
17
29
0
18 Dec 2020
MalFox: Camouflaged Adversarial Malware Example Generation Based on
  Conv-GANs Against Black-Box Detectors
MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors
Fangtian Zhong
Xiuzhen Cheng
Dongxiao Yu
Bei Gong
Shuaiwen Leon Song
Jiguo Yu
AAML
46
29
0
03 Nov 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
29
128
0
13 Jul 2020
Learning to fool the speaker recognition
Learning to fool the speaker recognition
Jiguo Li
Xinfeng Zhang
Jizheng Xu
Li Zhang
Y. Wang
Siwei Ma
Wen Gao
AAML
30
21
0
07 Apr 2020
Characterizing Speech Adversarial Examples Using Self-Attention U-Net
  Enhancement
Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement
Chao-Han Huck Yang
Jun Qi
Pin-Yu Chen
Xiaoli Ma
Chin-Hui Lee
AAML
32
53
0
31 Mar 2020
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
33
3
0
23 Jan 2020
Deep Representation Learning in Speech Processing: Challenges, Recent
  Advances, and Future Trends
Deep Representation Learning in Speech Processing: Challenges, Recent Advances, and Future Trends
S. Latif
R. Rana
Sara Khalifa
Raja Jurdak
Junaid Qadir
Björn W. Schuller
AI4TS
34
81
0
02 Jan 2020
Universal adversarial examples in speech command classification
Universal adversarial examples in speech command classification
Jon Vadillo
Roberto Santana
AAML
34
29
0
22 Nov 2019
Generate (non-software) Bugs to Fool Classifiers
Generate (non-software) Bugs to Fool Classifiers
Hiromu Yakura
Youhei Akimoto
Jun Sakuma
AAML
25
10
0
20 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
18
104
0
13 Nov 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
19
194
0
03 Nov 2019
Adversarial Example Detection by Classification for Deep Speech
  Recognition
Adversarial Example Detection by Classification for Deep Speech Recognition
Saeid Samizade
Zheng-Hua Tan
Chao Shen
X. Guan
AAML
18
35
0
22 Oct 2019
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object Detectors
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
143
162
0
10 Sep 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
25
51
0
08 Aug 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
54
63
0
05 Aug 2019
Perceptual Based Adversarial Audio Attacks
Perceptual Based Adversarial Audio Attacks
Joseph Szurley
J. Zico Kolter
AAML
24
25
0
14 Jun 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffM
AAML
36
36
0
26 Jan 2019
A Multiversion Programming Inspired Approach to Detecting Audio
  Adversarial Examples
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
Qiang Zeng
Jianhai Su
Chenglong Fu
Golam Kayas
Lannan Luo
AAML
27
46
0
26 Dec 2018
Protecting Voice Controlled Systems Using Sound Source Identification
  Based on Acoustic Cues
Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
Yuan Gong
C. Poellabauer
AAML
11
27
0
16 Nov 2018
Robust Audio Adversarial Example for a Physical Attack
Robust Audio Adversarial Example for a Physical Attack
Hiromu Yakura
Jun Sakuma
AAML
23
190
0
28 Oct 2018
Isolated and Ensemble Audio Preprocessing Methods for Detecting
  Adversarial Examples against Automatic Speech Recognition
Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition
K. Rajaratnam
Kunal Shah
Jugal Kalita
AAML
10
37
0
11 Sep 2018
An Overview of Vulnerabilities of Voice Controlled Systems
An Overview of Vulnerabilities of Voice Controlled Systems
Yuan Gong
C. Poellabauer
19
32
0
24 Mar 2018
L2-Nonexpansive Neural Networks
L2-Nonexpansive Neural Networks
Haifeng Qian
M. Wegman
25
74
0
22 Feb 2018
1