ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.08535
  4. Cited By
CommanderSong: A Systematic Approach for Practical Adversarial Voice
  Recognition
v1v2v3 (latest)

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

24 January 2018
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
    AAML
ArXiv (abs)PDFHTML

Papers citing "CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"

50 / 119 papers shown
Title
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on
  Automatic Speech Recognition Systems
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
H. Abdullah
Aditya Karlekar
S. Prasad
Muhammad Sajidur Rahman
Logan Blue
L. A. Bauer
Vincent Bindschaedler
Patrick Traynor
AAML
52
3
0
10 Mar 2022
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
Md. Imran Hossen
X. Hei
48
5
0
05 Mar 2022
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice
  Commands
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
Sergio Esposito
D. Sgandurra
G. Bella
63
15
0
17 Feb 2022
FAAG: Fast Adversarial Audio Generation through Interactive Attack
  Optimisation
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation
Yuantian Miao
Chao Chen
Lei Pan
Jun Zhang
Yang Xiang
AAML
99
2
0
11 Feb 2022
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial
  Examples Against Traffic Sign Recognition Systems
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems
Wei Jia
Zhaojun Lu
Haichun Zhang
Zhenglin Liu
Jie Wang
Gang Qu
AAML
71
54
0
17 Jan 2022
Detecting Audio Adversarial Examples with Logit Noising
Detecting Audio Adversarial Examples with Logit Noising
N. Park
Sangwoo Ji
Jong Kim
AAML
85
5
0
13 Dec 2021
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech
  Recognition using Frequency Masking
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking
Xiao-lan Wu
A. Rajan
AAML
90
5
0
03 Dec 2021
Sequential Randomized Smoothing for Adversarially Robust Speech
  Recognition
Sequential Randomized Smoothing for Adversarially Robust Speech Recognition
R. Olivier
Bhiksha Raj
AAML
110
11
0
05 Nov 2021
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Joel Frank
Lea Schonherr
DiffM
204
131
0
04 Nov 2021
Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against
  ASRs
Beyond LpL_pLp​ clipping: Equalization-based Psychoacoustic Attacks against ASRs
H. Abdullah
Muhammad Sajidur Rahman
Christian Peeters
Cassidy Gibson
Washington Garcia
Vincent Bindschaedler
T. Shrimpton
Patrick Traynor
AAML
43
10
0
25 Oct 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with
  Minimal Information
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
34
73
0
19 Oct 2021
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice
  Assistants
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Yanjiao Chen
Yijie Bai
Richard Mitev
Kaibo Wang
A. Sadeghi
Wenyuan Xu
AAML
72
21
0
21 Sep 2021
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
70
12
0
04 Sep 2021
Adversarial Example Devastation and Detection on Speech Recognition
  System by Adding Random Noise
Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Mingyu Dong
Diqun Yan
Yongkang Gong
Rangding Wang
AAML
35
2
0
31 Aug 2021
On the Exploitability of Audio Machine Learning Pipelines to
  Surreptitious Adversarial Examples
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Adelin Travers
Lorna Licollari
Guanghan Wang
Varun Chandrasekaran
Adam Dziedzic
David Lie
Nicolas Papernot
AAML
60
3
0
03 Aug 2021
A Tandem Framework Balancing Privacy and Security for Voice User
  Interfaces
A Tandem Framework Balancing Privacy and Security for Voice User Interfaces
Ranya Aloufi
Hamed Haddadi
David E. Boyle
83
3
0
21 Jul 2021
Open, Sesame! Introducing Access Control to Voice Services
Open, Sesame! Introducing Access Control to Voice Services
Dominika Woszczyk
Alvin Lee
Soteris Demetriou
AAML
28
1
0
27 Jun 2021
Voting for the right answer: Adversarial defense for speaker
  verification
Voting for the right answer: Adversarial defense for speaker verification
Haibin Wu
Yang Zhang
Zhiyong Wu
Dong Wang
Hung-yi Lee
AAML
76
25
0
15 Jun 2021
Improving the Adversarial Robustness for Speaker Verification by
  Self-Supervised Learning
Improving the Adversarial Robustness for Speaker Verification by Self-Supervised Learning
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
Helen Meng
Hung-yi Lee
AAMLSSL
102
30
0
01 Jun 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Zhiyuan Yu
Zack Kaplan
Qiben Yan
Ning Zhang
44
32
0
27 May 2021
Robust Sensor Fusion Algorithms Against Voice Command Attacks in
  Autonomous Vehicles
Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles
Jiwei Guan
Xi Zheng
Chen Wang
Yipeng Zhou
A. Jolfaei
AAML
38
5
0
20 Apr 2021
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Neal Mangaokar
Jiameng Pu
P. Bhattacharya
Chandan K. Reddy
Bimal Viswanath
AAMLMedIm
45
27
0
05 Apr 2021
Two Truths and a Lie: Exploring Soft Moderation of COVID-19
  Misinformation with Amazon Alexa
Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa
Donald Gover
Filipo Sharevski
24
7
0
01 Apr 2021
Adversarial Attacks and Defenses for Speech Recognition Systems
Adversarial Attacks and Defenses for Speech Recognition Systems
Piotr Żelasko
Sonal Joshi
Yiwen Shao
Jesus Villalba
J. Trmal
Najim Dehak
Sanjeev Khudanpur
AAML
55
29
0
31 Mar 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
78
17
0
19 Mar 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
Shehzeen Samarah Hussain
Paarth Neekhara
Shlomo Dubnov
Julian McAuley
F. Koushanfar
AAML
90
74
0
04 Mar 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
85
25
0
10 Feb 2021
FenceBox: A Platform for Defeating Adversarial Examples with Data
  Augmentation Techniques
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Han Qiu
Yi Zeng
Tianwei Zhang
Yong Jiang
Meikang Qiu
AAML
44
15
0
03 Dec 2020
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial
  Perturbations
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Yael Mathov
Tal Senior
A. Shabtai
Yuval Elovici
48
5
0
24 Oct 2020
Towards Resistant Audio Adversarial Examples
Towards Resistant Audio Adversarial Examples
Tom Dörr
Karla Markert
Nicolas Müller
Konstantin Böttinger
AAML
29
7
0
14 Oct 2020
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data
  over Telephony
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony
Zhengxian He
M. Rajput
M. Ahamad
13
0
0
21 Sep 2020
When the Differences in Frequency Domain are Compensated: Understanding
  and Defeating Modulated Replay Attacks on Automatic Speech Recognition
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
Shu Wang
Jiahao Cao
Xu He
Kun Sun
Qi Li
AAML
43
28
0
01 Sep 2020
Measuring the Effectiveness of Privacy Policies for Voice Assistant
  Applications
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications
Song Liao
Christin Wilson
Long Cheng
Hongxin Hu
Huixing Deng
38
66
0
29 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
73
129
0
13 Jul 2020
LeakyPick: IoT Audio Spy Detector
LeakyPick: IoT Audio Spy Detector
Richard Mitev
A. Pazii
Markus Miettinen
William Enck
A. Sadeghi
35
27
0
01 Jul 2020
Light Commands: Laser-Based Audio Injection Attacks on
  Voice-Controllable Systems
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Takeshi Sugawara
Benjamin Cyr
Sara Rampazzi
Daniel Genkin
Kevin Fu
AAML
70
167
0
22 Jun 2020
Mitigating Advanced Adversarial Attacks with More Advanced Gradient
  Obfuscation Techniques
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques
Han Qiu
Yi Zeng
Qinkai Zheng
Tianwei Zhang
Meikang Qiu
G. Memmi
AAML
69
14
0
27 May 2020
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep
  Learning
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
Chenggang Wang
Sean Kennedy
Haipeng Li
King Hudson
G. Atluri
Xuetao Wei
Wenhai Sun
Boyang Wang
54
44
0
20 May 2020
Enabling Fast and Universal Audio Adversarial Attack Using Generative
  Model
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model
Yi Xie
Zhuohang Li
Cong Shi
Jian-Dong Liu
Yingying Chen
Bo Yuan
AAML
84
69
0
26 Apr 2020
Extending Adversarial Attacks to Produce Adversarial Class Probability
  Distributions
Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions
Jon Vadillo
Roberto Santana
Jose A. Lozano
AAML
33
0
0
14 Apr 2020
Learning to fool the speaker recognition
Learning to fool the speaker recognition
Jiguo Li
Xinfeng Zhang
Jizheng Xu
Li Zhang
Y. Wang
Siwei Ma
Wen Gao
AAML
49
21
0
07 Apr 2020
Real-time, Universal, and Robust Adversarial Attacks Against Speaker
  Recognition Systems
Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems
Yi Xie
Cong Shi
Zhuohang Li
Jian-Dong Liu
Yingying Chen
Bo Yuan
AAML
138
98
0
04 Mar 2020
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
55
3
0
23 Jan 2020
Security Vetting Process of Smart-home Assistant Applications: A First
  Look and Case Studies
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies
Hang Hu
Limin Yang
Shihan Lin
Gang Wang
26
9
0
13 Jan 2020
Towards Security Threats of Deep Learning Systems: A Survey
Towards Security Threats of Deep Learning Systems: A Survey
Yingzhe He
Guozhu Meng
Kai Chen
Xingbo Hu
Jinwen He
AAMLELM
56
14
0
28 Nov 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
114
197
0
03 Nov 2019
Adversarial Example Detection by Classification for Deep Speech
  Recognition
Adversarial Example Detection by Classification for Deep Speech Recognition
Saeid Samizade
Zheng-Hua Tan
Chao Shen
X. Guan
AAML
79
35
0
22 Oct 2019
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against
  Physical Adversarial Attacks on Embedded Multimedia Applications
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications
Zirui Xu
Fuxun Yu
Xiang Chen
AAML
51
27
0
17 Oct 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box
  Attacks on Speech Recognition and Voice Identification Systems
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
H. Abdullah
Muhammad Sajidur Rahman
Washington Garcia
Logan Blue
Kevin Warren
Anurag Swarnim Yadav
T. Shrimpton
Patrick Traynor
AAML
75
88
0
11 Oct 2019
Lower Bounds on Adversarial Robustness from Optimal Transport
Lower Bounds on Adversarial Robustness from Optimal Transport
A. Bhagoji
Daniel Cullina
Prateek Mittal
OODOTAAML
70
94
0
26 Sep 2019
Previous
123
Next