Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1911.01840
Cited By
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
3 November 2019
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems"
50 / 81 papers shown
Title
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
52
0
0
01 Apr 2025
Are Deep Speech Denoising Models Robust to Adversarial Noise?
Will Schwarzer
Philip S. Thomas
Andrea Fanelli
Xiaoyu Liu
52
0
0
14 Mar 2025
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks
Chang-rui Liu
Haolin Wu
Xi Yang
Kui Zhang
Cong Wu
W. Zhang
Nenghai Yu
Tianwei Zhang
Qing-Wu Guo
Jie Zhang
AAML
29
0
0
02 Mar 2025
Verification of Bit-Flip Attacks against Quantized Neural Networks
Yedi Zhang
Lei Huang
Pengfei Gao
Fu Song
Jun Sun
Jin Song Dong
AAML
44
0
0
22 Feb 2025
Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models
Hailin Li
Raghavendra Ramachandra
Mohamed Ragab
Soumik Mondal
Yong Kiam Tan
Khin Mi Mi Aung
AAML
DiffM
22
0
0
27 Sep 2024
Model-Enhanced LLM-Driven VUI Testing of VPA Apps
Suwan Li
Lei Bu
Guangdong Bai
Fuman Xie
Kai Chen
Chang Yue
27
0
0
03 Jul 2024
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
19
1
0
26 Jun 2024
Improving Adversarial Robustness via Decoupled Visual Representation Masking
Decheng Liu
Tao Chen
Chunlei Peng
Nannan Wang
Ruimin Hu
Xinbo Gao
AAML
38
1
0
16 Jun 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
28
2
0
27 May 2024
Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Sonal Joshi
Thomas Thebaud
Jesús Villalba
Najim Dehak
AAML
21
1
0
29 Feb 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
32
3
0
21 Feb 2024
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition
Yi Chang
Zhao Ren
Zixing Zhang
Xin Jing
Kun Qian
Xi Shao
Bin Hu
Tanja Schultz
Björn W. Schuller
AAML
33
4
0
02 Feb 2024
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
AAML
19
10
0
15 Dec 2023
Scalable Ensemble-based Detection Method against Adversarial Attacks for speaker verification
Haibin Wu
Heng-Cheng Kuo
Yu Tsao
Hung-yi Lee
AAML
24
1
0
14 Dec 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
11
2
0
10 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
55
3
0
20 Nov 2023
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Li Wang
Jiaqi Li
Yuhao Luo
Jiahao Zheng
Lei Wang
Hao Li
Ke Xu
Chengfang Fang
Jie Shi
Zhizheng Wu
AAML
26
3
0
09 Oct 2023
An Initial Investigation of Neural Replay Simulator for Over-the-Air Adversarial Perturbations to Automatic Speaker Verification
Jiaqi Li
Li Wang
Liumeng Xue
Lei Wang
Zhizheng Wu
AAML
20
3
0
09 Oct 2023
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio -- A Survey
Yuchen Liu
Apu Kapadia
Donald Williamson
AAML
28
0
0
26 Sep 2023
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Fu Song
25
3
0
14 Sep 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
18
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
26
9
0
13 Sep 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
Song Liao
Long Cheng
Haipeng Cai
Linke Guo
Hongxin Hu
ELM
13
5
0
11 Sep 2023
Timbre-reserved Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Li Lyna Zhang
Pengcheng Guo
Linfu Xie
AAML
19
4
0
02 Sep 2023
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
AAML
24
7
0
02 Aug 2023
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks
Ye Tao
Wanwei Liu
Fu Song
Zhen Liang
J. Wang
Hongxu Zhu
24
1
0
29 Jul 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
22
8
0
23 Jul 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
23
11
0
28 Jun 2023
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Ziqian Wang
Pengcheng Guo
Linfu Xie
AAML
19
1
0
30 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
27
11
0
23 May 2023
The defender's perspective on automatic speaker verification: An overview
Haibin Wu
Jiawen Kang
Lingwei Meng
H. Meng
Hung-yi Lee
AAML
24
14
0
22 May 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
Hanqing Guo
Guangjing Wang
Bocheng Chen
Qiben Yan
AAML
25
17
0
09 May 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
8
3
0
20 Apr 2023
Security and Privacy Problems in Voice Assistant Applications: A Survey
Jingjin Li
Chao Chen
Lei Pan
M. R. Azghadi
Hossein Ghodosi
Jinchao Zhang
11
16
0
19 Apr 2023
Defending against Adversarial Audio via Diffusion Model
Shutong Wu
Jiong Wang
Wei Ping
Weili Nie
Chaowei Xiao
DiffM
27
25
0
02 Mar 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
16
1
0
21 Feb 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
27
75
0
29 Dec 2022
A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and Fairness
Tiantian Feng
Rajat Hebbar
Nicholas Mehlman
Xuan Shi
Aditya Kommineni
and Shrikanth Narayanan
35
31
0
18 Dec 2022
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks
Yedi Zhang
Zhe Zhao
Fu Song
M. Zhang
Tao Chen
Jun Sun
28
17
0
10 Dec 2022
QEBVerif: Quantization Error Bound Verification of Neural Networks
Yedi Zhang
Fu Song
Jun Sun
MQ
18
11
0
06 Dec 2022
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Meng Chen
Liwang Lu
Jiadi Yu
Ying Chen
Zhongjie Ba
Feng Lin
Kui Ren
AAML
12
1
0
10 Nov 2022
Adversarial Attack on Radar-based Environment Perception Systems
Amira Guesmi
Ihsen Alouani
AAML
33
2
0
02 Nov 2022
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xingqi Chen
Jie Wang
Xiaoli Zhang
Weiqiang Zhang
Kunde Yang
AAML
21
7
0
02 Nov 2022
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Jiadi Yao
Xing Chen
Xiao-Lei Zhang
Weiqiang Zhang
Kunde Yang
AAML
15
8
0
30 Oct 2022
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Jiangyi Deng
Fei Teng
Yanjiao Chen
Xiaofu Chen
Zhaohui Wang
Wenyuan Xu
11
11
0
27 Oct 2022
MVNet: Memory Assistance and Vocal Reinforcement Network for Speech Enhancement
Jianrong Wang
Xiaomin Li
Xuewei Li
Mei Yu
Qiang Fang
Li Liu
23
0
0
15 Sep 2022
Defend Data Poisoning Attacks on Voice Authentication
Ke Li
Cameron Baird
D. Lin
AAML
25
9
0
09 Sep 2022
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
21
5
0
26 Jul 2022
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
20
36
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
25
18
0
07 Jun 2022
1
2
Next