Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1801.08535
Cited By
v1
v2
v3 (latest)
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
24 January 2018
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"
50 / 119 papers shown
Title
ASRJam: Human-Friendly AI Speech Jamming to Prevent Automated Phone Scams
Freddie Grabovski
Gilad Gressel
Yisroel Mirsky
15
0
0
10 Jun 2025
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
Guangke Chen
Fu Song
Zhe Zhao
Xiaojun Jia
Yang Liu
Yanchen Qiao
Weizhe Zhang
AuLLM
AAML
91
1
0
20 May 2025
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Jinsheng Yuan
Yuhang Hao
Weisi Guo
Yun Wu
Chongyan Gu
AAML
FedML
50
0
0
09 May 2025
Selective Masking Adversarial Attack on Automatic Speech Recognition Systems
Zheng Fang
Shenyi Zhang
Tao Wang
Bowen Li
Lingchen Zhao
Zhangyi Wang
AAML
59
0
0
06 Apr 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks
Chang-rui Liu
Haolin Wu
Xi Yang
Kui Zhang
Cong Wu
Weinan Zhang
Nenghai Yu
Tianwei Zhang
Qing Guo
Jie Zhang
AAML
62
0
0
02 Mar 2025
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Liwang Lu
Kui Ren
AAML
61
9
0
03 Aug 2024
Controlling Whisper: Universal Acoustic Adversarial Attacks to Control Speech Foundation Models
Vyas Raina
Mark Gales
AAML
60
2
0
05 Jul 2024
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Q. Li
Chao Shen
Qian Wang
48
9
0
27 Jun 2024
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification
Alvaro Lopez Pellicer
Kittipos Giatgong
Yi Li
N. Suri
Plamen Angelov
AAML
53
3
0
24 Jun 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
130
3
0
27 May 2024
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models
Vyas Raina
Rao Ma
Charles G McGhee
Kate Knill
Mark Gales
AAML
64
5
0
09 May 2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
AAML
23
2
0
18 Feb 2024
WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition
Zhengyao Song
Yongqiang Li
Danni Yuan
Li Liu
Shaokui Wei
Baoyuan Wu
AAML
79
4
0
24 Jan 2024
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
AAML
103
11
0
15 Dec 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
48
4
0
10 Dec 2023
Detecting Voice Cloning Attacks via Timbre Watermarking
Chang-rui Liu
Jie Zhang
Tianwei Zhang
Xi Yang
Weiming Zhang
Neng H. Yu
93
38
0
06 Dec 2023
Acoustic Cybersecurity: Exploiting Voice-Activated Systems
Forrest McKee
David Noever
AAML
236
1
0
23 Nov 2023
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Li Wang
Jiaqi Li
Yuhao Luo
Jiahao Zheng
Lei Wang
Hao Li
Ke Xu
Chengfang Fang
Jie Shi
Zhizheng Wu
AAML
76
4
0
09 Oct 2023
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio -- A Survey
Yuchen Liu
Apu Kapadia
Donald Williamson
AAML
64
0
0
26 Sep 2023
AudioFool: Fast, Universal and synchronization-free Cross-Domain Attack on Speech Recognition
Mohamad Fakih
R. Kanj
Fadi J. Kurdahi
M. Fouda
AAML
46
0
0
20 Sep 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
84
13
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
70
11
0
13 Sep 2023
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities
Maximilian Mozes
Xuanli He
Bennett Kleinberg
Lewis D. Griffin
87
87
0
24 Aug 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang
Kun Sun
Qi Li
AAML
50
0
0
18 Aug 2023
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
AAML
90
9
0
02 Aug 2023
Group-based Robustness: A General Framework for Customized Robustness in the Real World
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
OOD
AAML
79
1
0
29 Jun 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
68
12
0
28 Jun 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System
Jiwei Guan
Lei Pan
Chen Wang
Shui Yu
Longxiang Gao
Xi Zheng
AAML
56
4
0
30 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
71
13
0
23 May 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
Hanqing Guo
Guangjing Wang
Bocheng Chen
Qiben Yan
AAML
55
18
0
09 May 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
54
4
0
20 Apr 2023
Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
56
2
0
18 Apr 2023
TransAudio: Towards the Transferable Adversarial Audio Attack via Learning Contextualized Perturbations
Qin Gege
YueFeng Chen
Xiaofeng Mao
Yao Zhu
Binyuan Hui
Xiaodan Li
Rong Zhang
Hui Xue
AAML
70
8
0
28 Mar 2023
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Domna Bilika
Nikoletta Michopoulou
E. Alepis
Constantinos Patsakis
69
10
0
20 Feb 2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Pa Walker
Tianfang Zhang
Cong Shi
Nitesh Saxena
Ying-Cong Chen
AAML
85
2
0
04 Feb 2023
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics
Onat Gungor
Tajana Simunic
Baris Aksanli
AAML
28
0
0
23 Jan 2023
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Ashish Hooda
M. Wallace
Kushal Jhunjhunwalla
Earlence Fernandes
Kassem Fawaz
AAML
11
4
0
16 Dec 2022
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Meng Chen
Liwang Lu
Jiadi Yu
Ying Chen
Zhongjie Ba
Feng Lin
Kui Ren
AAML
118
1
0
10 Nov 2022
Leveraging Domain Features for Detecting Adversarial Attacks Against Deep Speech Recognition in Noise
Christian Heider Nielsen
Zheng-Hua Tan
AAML
130
1
0
03 Nov 2022
Isometric 3D Adversarial Examples in the Physical World
Yibo Miao
Yinpeng Dong
Junyi Zhu
Xiao-Shan Gao
101
32
0
27 Oct 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
57
1
0
17 Sep 2022
Adversarial Attacks on ASR Systems: An Overview
Xiao Zhang
Hao Tan
Xuan Huang
Denghui Zhang
Keke Tang
Zhaoquan Gu
AAML
21
3
0
03 Aug 2022
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
49
6
0
26 Jul 2022
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
110
40
0
07 Jun 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
AAML
68
20
0
10 May 2022
Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking
Jinghui Xu
Jifeng Zhu
Yong-Liang Yang
27
1
0
19 Apr 2022
Defensive Patches for Robust Recognition in the Physical World
Jiakai Wang
Zixin Yin
Pengfei Hu
Aishan Liu
Renshuai Tao
Haotong Qin
Xianglong Liu
Dacheng Tao
AAML
73
30
0
13 Apr 2022
Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Sonal Joshi
Saurabh Kataria
Yiwen Shao
Piotr Żelasko
Jesus Villalba
Sanjeev Khudanpur
Najim Dehak
AAML
42
4
0
08 Apr 2022
Hear No Evil: Towards Adversarial Robustness of Automatic Speech Recognition via Multi-Task Learning
Nilaksh Das
Duen Horng Chau
AAML
75
0
0
05 Apr 2022
1
2
3
Next