ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.10875
  4. Cited By
Characterizing Audio Adversarial Examples Using Temporal Dependency
v1v2 (latest)

Characterizing Audio Adversarial Examples Using Temporal Dependency

28 September 2018
Zhuolin Yang
Yue Liu
Pin-Yu Chen
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Characterizing Audio Adversarial Examples Using Temporal Dependency"

39 / 39 papers shown
Title
AI Maintenance: A Robustness Perspective
AI Maintenance: A Robustness Perspective
Pin-Yu Chen
Payel Das
82
14
0
08 Jan 2023
A Review of Speech-centric Trustworthy Machine Learning: Privacy,
  Safety, and Fairness
A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and Fairness
Tiantian Feng
Rajat Hebbar
Nicholas Mehlman
Xuan Shi
Aditya Kommineni
and Shrikanth Narayanan
108
34
0
18 Dec 2022
Leveraging Domain Features for Detecting Adversarial Attacks Against
  Deep Speech Recognition in Noise
Leveraging Domain Features for Detecting Adversarial Attacks Against Deep Speech Recognition in Noise
Christian Heider Nielsen
Zheng-Hua Tan
AAML
130
1
0
03 Nov 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
64
1
0
17 Sep 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
110
40
0
07 Jun 2022
Defense against Adversarial Attacks on Hybrid Speech Recognition using
  Joint Adversarial Fine-tuning with Denoiser
Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Sonal Joshi
Saurabh Kataria
Yiwen Shao
Piotr Żelasko
Jesus Villalba
Sanjeev Khudanpur
Najim Dehak
AAML
42
4
0
08 Apr 2022
AdvEst: Adversarial Perturbation Estimation to Classify and Detect
  Adversarial Attacks against Speaker Identification
AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Sonal Joshi
Saurabh Kataria
Jesus Villalba
Najim Dehak
AAML
86
7
0
08 Apr 2022
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
Md. Imran Hossen
X. Hei
56
5
0
05 Mar 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning Models
Pin-Yu Chen
Sijia Liu
AAML
100
16
0
15 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification
  Systems
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
AAML
54
8
0
11 Feb 2022
Adversarial GLUE: A Multi-Task Benchmark for Robustness Evaluation of
  Language Models
Adversarial GLUE: A Multi-Task Benchmark for Robustness Evaluation of Language Models
Wei Ping
Chejian Xu
Shuohang Wang
Zhe Gan
Yu Cheng
Jianfeng Gao
Ahmed Hassan Awadallah
Yangqiu Song
VLMELMAAML
78
226
0
04 Nov 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with
  Minimal Information
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
34
73
0
19 Oct 2021
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
70
12
0
04 Sep 2021
Adversarial Example Devastation and Detection on Speech Recognition
  System by Adding Random Noise
Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Mingyu Dong
Diqun Yan
Yongkang Gong
Rangding Wang
AAML
35
2
0
31 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
157
241
0
01 Aug 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
78
17
0
19 Mar 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
Shehzeen Samarah Hussain
Paarth Neekhara
Shlomo Dubnov
Julian McAuley
F. Koushanfar
AAML
90
74
0
04 Mar 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
85
25
0
10 Feb 2021
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
76
129
0
13 Jul 2020
Detecting Adversarial Examples for Speech Recognition via Uncertainty
  Quantification
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification
Sina Daubener
Lea Schonherr
Asja Fischer
D. Kolossa
AAML
71
18
0
24 May 2020
Towards Evaluating the Robustness of Chinese BERT Classifiers
Towards Evaluating the Robustness of Chinese BERT Classifiers
Wei Ping
Boyuan Pan
Xin Li
Yue Liu
AAML
77
8
0
07 Apr 2020
Characterizing Speech Adversarial Examples Using Self-Attention U-Net
  Enhancement
Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement
Chao-Han Huck Yang
Jun Qi
Pin-Yu Chen
Xiaoli Ma
Chin-Hui Lee
AAML
99
53
0
31 Mar 2020
RAB: Provable Robustness Against Backdoor Attacks
RAB: Provable Robustness Against Backdoor Attacks
Maurice Weber
Xiaojun Xu
Bojan Karlas
Ce Zhang
Yue Liu
AAML
120
164
0
19 Mar 2020
Anomalous Example Detection in Deep Learning: A Survey
Anomalous Example Detection in Deep Learning: A Survey
Saikiran Bulusu
B. Kailkhura
Yue Liu
P. Varshney
Basel Alomair
AAML
163
47
0
16 Mar 2020
On Adaptive Attacks to Adversarial Example Defenses
On Adaptive Attacks to Adversarial Example Defenses
Florian Tramèr
Nicholas Carlini
Wieland Brendel
Aleksander Madry
AAML
295
840
0
19 Feb 2020
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Victor Akinwande
C. Cintas
Skyler Speakman
Srihari Sridharan
AAML
73
17
0
13 Feb 2020
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
55
3
0
23 Jan 2020
Detecting Adversarial Attacks On Audiovisual Speech Recognition
Detecting Adversarial Attacks On Audiovisual Speech Recognition
Pingchuan Ma
Stavros Petridis
Maja Pantic
AAML
55
21
0
18 Dec 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
114
197
0
03 Nov 2019
Adversarial Example Detection by Classification for Deep Speech
  Recognition
Adversarial Example Detection by Classification for Deep Speech Recognition
Saeid Samizade
Zheng-Hua Tan
Chao Shen
X. Guan
AAML
79
35
0
22 Oct 2019
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against
  Physical Adversarial Attacks on Embedded Multimedia Applications
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications
Zirui Xu
Fuxun Yu
Xiang Chen
AAML
59
27
0
17 Oct 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box
  Attacks on Speech Recognition and Voice Identification Systems
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
H. Abdullah
Muhammad Sajidur Rahman
Washington Garcia
Logan Blue
Kevin Warren
Anurag Swarnim Yadav
T. Shrimpton
Patrick Traynor
AAML
75
88
0
11 Oct 2019
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments
Alesia Chernikova
Alina Oprea
AAML
110
40
0
23 Sep 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
130
65
0
05 Aug 2019
Sound source detection, localization and classification using
  consecutive ensemble of CRNN models
Sound source detection, localization and classification using consecutive ensemble of CRNN models
Slawomir Kapka
M. Lewandowski
111
66
0
02 Aug 2019
DoPa: A Comprehensive CNN Detection Methodology against Physical
  Adversarial Attacks
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks
Zirui Xu
Fuxun Yu
Xiang Chen
AAML
23
0
0
21 May 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffMAAML
51
36
0
26 Jan 2019
Stealing Neural Networks via Timing Side Channels
Stealing Neural Networks via Timing Side Channels
Vasisht Duddu
D. Samanta
D. V. Rao
V. Balas
AAMLMLAUFedML
89
135
0
31 Dec 2018
Effects of Loss Functions And Target Representations on Adversarial
  Robustness
Effects of Loss Functions And Target Representations on Adversarial Robustness
Sean Saito
S. Roy
AAML
72
7
0
01 Dec 2018
1