ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.08535
  4. Cited By
CommanderSong: A Systematic Approach for Practical Adversarial Voice
  Recognition
v1v2v3 (latest)

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

24 January 2018
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
    AAML
ArXiv (abs)PDFHTML

Papers citing "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"

50 / 119 papers shown
Title
ASRJam: Human-Friendly AI Speech Jamming to Prevent Automated Phone Scams
ASRJam: Human-Friendly AI Speech Jamming to Prevent Automated Phone Scams
Freddie Grabovski
Gilad Gressel
Yisroel Mirsky
15
0
0
10 Jun 2025
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
Guangke Chen
Fu Song
Zhe Zhao
Xiaojun Jia
Yang Liu
Yanchen Qiao
Weizhe Zhang
AuLLMAAML
91
1
0
20 May 2025
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Jinsheng Yuan
Yuhang Hao
Weisi Guo
Yun Wu
Chongyan Gu
AAMLFedML
50
0
0
09 May 2025
Selective Masking Adversarial Attack on Automatic Speech Recognition Systems
Selective Masking Adversarial Attack on Automatic Speech Recognition Systems
Zheng Fang
Shenyi Zhang
Tao Wang
Bowen Li
Lingchen Zhao
Zhangyi Wang
AAML
59
0
0
06 Apr 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks
Chang-rui Liu
Haolin Wu
Xi Yang
Kui Zhang
Cong Wu
Weinan Zhang
Nenghai Yu
Tianwei Zhang
Qing Guo
Jie Zhang
AAML
62
0
0
02 Mar 2025
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms
  using Linguistic Features
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Liwang Lu
Kui Ren
AAML
61
9
0
03 Aug 2024
Controlling Whisper: Universal Acoustic Adversarial Attacks to Control
  Speech Foundation Models
Controlling Whisper: Universal Acoustic Adversarial Attacks to Control Speech Foundation Models
Vyas Raina
Mark Gales
AAML
60
2
0
05 Jul 2024
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition
  Systems
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Q. Li
Chao Shen
Qian Wang
48
9
0
27 Jun 2024
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and
  Novel Class Identification
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification
Alvaro Lopez Pellicer
Kittipos Giatgong
Yi Li
N. Suri
Plamen Angelov
AAML
53
3
0
24 Jun 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions
  of Voice-Controlled Systems
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
130
3
0
27 May 2024
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech
  Foundation Models
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models
Vyas Raina
Rao Ma
Charles G McGhee
Kate Knill
Mark Gales
AAML
64
5
0
09 May 2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
AAML
23
2
0
18 Feb 2024
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
Zhengyao Song
Yongqiang Li
Danni Yuan
Li Liu
Shaokui Wei
Baoyuan Wu
AAML
79
4
0
24 Jan 2024
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited
  Knowledge
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
AAML
103
11
0
15 Dec 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How
  Vulnerable are Commercial Voice Control Systems?
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
48
4
0
10 Dec 2023
Detecting Voice Cloning Attacks via Timbre Watermarking
Detecting Voice Cloning Attacks via Timbre Watermarking
Chang-rui Liu
Jie Zhang
Tianwei Zhang
Xi Yang
Weiming Zhang
Neng H. Yu
93
38
0
06 Dec 2023
Acoustic Cybersecurity: Exploiting Voice-Activated Systems
Acoustic Cybersecurity: Exploiting Voice-Activated Systems
Forrest McKee
David Noever
AAML
236
1
0
23 Nov 2023
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker
  Verification
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Li Wang
Jiaqi Li
Yuhao Luo
Jiahao Zheng
Lei Wang
Hao Li
Ke Xu
Chengfang Fang
Jie Shi
Zhizheng Wu
AAML
76
4
0
09 Oct 2023
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio
  -- A Survey
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio -- A Survey
Yuchen Liu
Apu Kapadia
Donald Williamson
AAML
64
0
0
26 Sep 2023
AudioFool: Fast, Universal and synchronization-free Cross-Domain Attack
  on Speech Recognition
AudioFool: Fast, Universal and synchronization-free Cross-Domain Attack on Speech Recognition
Mohamad Fakih
R. Kanj
Fadi J. Kurdahi
M. Fouda
AAML
46
0
0
20 Sep 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
84
13
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via
  Split-Second Phoneme Injection
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
70
11
0
13 Sep 2023
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and
  Vulnerabilities
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities
Maximilian Mozes
Xuanli He
Bennett Kleinberg
Lewis D. Griffin
87
87
0
24 Aug 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum
  Reduction Attacks
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang
Kun Sun
Qi Li
AAML
50
0
0
18 Aug 2023
Inaudible Adversarial Perturbation: Manipulating the Recognition of User
  Speech in Real Time
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
AAML
90
9
0
02 Aug 2023
Group-based Robustness: A General Framework for Customized Robustness in
  the Real World
Group-based Robustness: A General Framework for Customized Robustness in the Real World
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
OODAAML
79
1
0
29 Jun 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via
  Adversarial Ultrasound
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
68
12
0
28 Jun 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced
  Driver-Assistance System
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System
Jiwei Guan
Lei Pan
Chen Wang
Shui Yu
Longxiang Gao
Xi Zheng
AAML
56
4
0
30 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition
  Systems
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
71
13
0
23 May 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time
  Predictive Perturbation
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
Hanqing Guo
Guangjing Wang
Bocheng Chen
Qiben Yan
AAML
55
18
0
09 May 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
54
4
0
20 Apr 2023
Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
56
2
0
18 Apr 2023
TransAudio: Towards the Transferable Adversarial Audio Attack via
  Learning Contextualized Perturbations
TransAudio: Towards the Transferable Adversarial Audio Attack via Learning Contextualized Perturbations
Qin Gege
YueFeng Chen
Xiaofeng Mao
Yao Zhu
Binyuan Hui
Xiaodan Li
Rong Zhang
Hui Xue
AAML
70
8
0
28 Mar 2023
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Domna Bilika
Nikoletta Michopoulou
E. Alepis
Constantinos Patsakis
69
10
0
20 Feb 2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
  through Physical Barriers
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Pa Walker
Tianfang Zhang
Cong Shi
Nitesh Saxena
Ying-Cong Chen
AAML
85
2
0
04 Feb 2023
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards
  Secure Industrial Internet of Things Analytics
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics
Onat Gungor
Tajana Simunic
Baris Aksanli
AAML
28
0
0
23 Jan 2023
SkillFence: A Systems Approach to Practically Mitigating Voice-Based
  Confusion Attacks
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Ashish Hooda
M. Wallace
Kushal Jhunjhunwalla
Earlence Fernandes
Kassem Fawaz
AAML
11
4
0
16 Dec 2022
Privacy-Utility Balanced Voice De-Identification Using Adversarial
  Examples
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Meng Chen
Liwang Lu
Jiadi Yu
Ying Chen
Zhongjie Ba
Feng Lin
Kui Ren
AAML
118
1
0
10 Nov 2022
Leveraging Domain Features for Detecting Adversarial Attacks Against
  Deep Speech Recognition in Noise
Leveraging Domain Features for Detecting Adversarial Attacks Against Deep Speech Recognition in Noise
Christian Heider Nielsen
Zheng-Hua Tan
AAML
130
1
0
03 Nov 2022
Isometric 3D Adversarial Examples in the Physical World
Isometric 3D Adversarial Examples in the Physical World
Yibo Miao
Yinpeng Dong
Junyi Zhu
Xiao-Shan Gao
101
32
0
27 Oct 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
57
1
0
17 Sep 2022
Adversarial Attacks on ASR Systems: An Overview
Adversarial Attacks on ASR Systems: An Overview
Xiao Zhang
Hao Tan
Xuan Huang
Denghui Zhang
Keke Tang
Zhaoquan Gu
AAML
21
3
0
03 Aug 2022
Perception-Aware Attack: Creating Adversarial Music via
  Reverse-Engineering Human Perception
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
49
6
0
26 Jul 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
110
40
0
07 Jun 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a
  Systematic View
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
AAML
68
20
0
10 May 2022
Disappeared Command: Spoofing Attack On Automatic Speech Recognition
  Systems with Sound Masking
Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking
Jinghui Xu
Jifeng Zhu
Yong-Liang Yang
27
1
0
19 Apr 2022
Defensive Patches for Robust Recognition in the Physical World
Defensive Patches for Robust Recognition in the Physical World
Jiakai Wang
Zixin Yin
Pengfei Hu
Aishan Liu
Renshuai Tao
Haotong Qin
Xianglong Liu
Dacheng Tao
AAML
73
30
0
13 Apr 2022
Defense against Adversarial Attacks on Hybrid Speech Recognition using
  Joint Adversarial Fine-tuning with Denoiser
Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Sonal Joshi
Saurabh Kataria
Yiwen Shao
Piotr Żelasko
Jesus Villalba
Sanjeev Khudanpur
Najim Dehak
AAML
42
4
0
08 Apr 2022
Hear No Evil: Towards Adversarial Robustness of Automatic Speech
  Recognition via Multi-Task Learning
Hear No Evil: Towards Adversarial Robustness of Automatic Speech Recognition via Multi-Task Learning
Nilaksh Das
Duen Horng Chau
AAML
75
0
0
05 Apr 2022
123
Next