ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.01840
  4. Cited By
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

3 November 2019
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
    AAML
ArXivPDFHTML

Papers citing "Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems"

50 / 81 papers shown
Title
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
52
0
0
01 Apr 2025
Are Deep Speech Denoising Models Robust to Adversarial Noise?
Will Schwarzer
Philip S. Thomas
Andrea Fanelli
Xiaoyu Liu
52
0
0
14 Mar 2025
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks
Chang-rui Liu
Haolin Wu
Xi Yang
Kui Zhang
Cong Wu
W. Zhang
Nenghai Yu
Tianwei Zhang
Qing-Wu Guo
Jie Zhang
AAML
29
0
0
02 Mar 2025
Verification of Bit-Flip Attacks against Quantized Neural Networks
Verification of Bit-Flip Attacks against Quantized Neural Networks
Yedi Zhang
Lei Huang
Pengfei Gao
Fu Song
Jun Sun
Jin Song Dong
AAML
44
0
0
22 Feb 2025
Unsupervised Fingerphoto Presentation Attack Detection With Diffusion
  Models
Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models
Hailin Li
Raghavendra Ramachandra
Mohamed Ragab
Soumik Mondal
Yong Kiam Tan
Khin Mi Mi Aung
AAML
DiffM
22
0
0
27 Sep 2024
Model-Enhanced LLM-Driven VUI Testing of VPA Apps
Model-Enhanced LLM-Driven VUI Testing of VPA Apps
Suwan Li
Lei Bu
Guangdong Bai
Fuman Xie
Kai Chen
Chang Yue
27
0
0
03 Jul 2024
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
19
1
0
26 Jun 2024
Improving Adversarial Robustness via Decoupled Visual Representation
  Masking
Improving Adversarial Robustness via Decoupled Visual Representation Masking
Decheng Liu
Tao Chen
Chunlei Peng
Nannan Wang
Ruimin Hu
Xinbo Gao
AAML
38
1
0
16 Jun 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions
  of Voice-Controlled Systems
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
28
2
0
27 May 2024
Unraveling Adversarial Examples against Speaker Identification --
  Techniques for Attack Detection and Victim Model Classification
Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Sonal Joshi
Thomas Thebaud
Jesús Villalba
Najim Dehak
AAML
21
1
0
29 Feb 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement
  Learning
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
32
3
0
21 Feb 2024
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech
  Emotion Recognition
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition
Yi Chang
Zhao Ren
Zixing Zhang
Xin Jing
Kun Qian
Xi Shao
Bin Hu
Tanja Schultz
Björn W. Schuller
AAML
33
4
0
02 Feb 2024
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited
  Knowledge
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
AAML
19
10
0
15 Dec 2023
Scalable Ensemble-based Detection Method against Adversarial Attacks for
  speaker verification
Scalable Ensemble-based Detection Method against Adversarial Attacks for speaker verification
Haibin Wu
Heng-Cheng Kuo
Yu Tsao
Hung-yi Lee
AAML
24
1
0
14 Dec 2023
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How
  Vulnerable are Commercial Voice Control Systems?
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
11
2
0
10 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
55
3
0
20 Nov 2023
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker
  Verification
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Li Wang
Jiaqi Li
Yuhao Luo
Jiahao Zheng
Lei Wang
Hao Li
Ke Xu
Chengfang Fang
Jie Shi
Zhizheng Wu
AAML
26
3
0
09 Oct 2023
An Initial Investigation of Neural Replay Simulator for Over-the-Air
  Adversarial Perturbations to Automatic Speaker Verification
An Initial Investigation of Neural Replay Simulator for Over-the-Air Adversarial Perturbations to Automatic Speaker Verification
Jiaqi Li
Li Wang
Liumeng Xue
Lei Wang
Zhizheng Wu
AAML
20
3
0
09 Oct 2023
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio
  -- A Survey
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio -- A Survey
Yuchen Liu
Apu Kapadia
Donald Williamson
AAML
28
0
0
26 Sep 2023
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker
  Recognition Systems
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Fu Song
25
3
0
14 Sep 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
18
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via
  Split-Second Phoneme Injection
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
26
9
0
13 Sep 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through
  Static Analysis at the Development Phase
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
Song Liao
Long Cheng
Haipeng Cai
Linke Guo
Hongxin Hu
ELM
13
5
0
11 Sep 2023
Timbre-reserved Adversarial Attack in Speaker Identification
Timbre-reserved Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Li Lyna Zhang
Pengcheng Guo
Linfu Xie
AAML
19
4
0
02 Sep 2023
Inaudible Adversarial Perturbation: Manipulating the Recognition of User
  Speech in Real Time
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
AAML
24
7
0
02 Aug 2023
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks
Ye Tao
Wanwei Liu
Fu Song
Zhen Liang
J. Wang
Hongxu Zhu
24
1
0
29 Jul 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
22
8
0
23 Jul 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via
  Adversarial Ultrasound
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
23
11
0
28 Jun 2023
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial
  Attack in Speaker Identification
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Ziqian Wang
Pengcheng Guo
Linfu Xie
AAML
19
1
0
30 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition
  Systems
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
27
11
0
23 May 2023
The defender's perspective on automatic speaker verification: An
  overview
The defender's perspective on automatic speaker verification: An overview
Haibin Wu
Jiawen Kang
Lingwei Meng
H. Meng
Hung-yi Lee
AAML
24
14
0
22 May 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time
  Predictive Perturbation
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
Hanqing Guo
Guangjing Wang
Bocheng Chen
Qiben Yan
AAML
25
17
0
09 May 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
8
3
0
20 Apr 2023
Security and Privacy Problems in Voice Assistant Applications: A Survey
Security and Privacy Problems in Voice Assistant Applications: A Survey
Jingjin Li
Chao Chen
Lei Pan
M. R. Azghadi
Hossein Ghodosi
Jinchao Zhang
11
16
0
19 Apr 2023
Defending against Adversarial Audio via Diffusion Model
Defending against Adversarial Audio via Diffusion Model
Shutong Wu
Jiong Wang
Wei Ping
Weili Nie
Chaowei Xiao
DiffM
27
25
0
02 Mar 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
16
1
0
21 Feb 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
27
75
0
29 Dec 2022
A Review of Speech-centric Trustworthy Machine Learning: Privacy,
  Safety, and Fairness
A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and Fairness
Tiantian Feng
Rajat Hebbar
Nicholas Mehlman
Xuan Shi
Aditya Kommineni
and Shrikanth Narayanan
35
31
0
18 Dec 2022
QVIP: An ILP-based Formal Verification Approach for Quantized Neural
  Networks
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks
Yedi Zhang
Zhe Zhao
Fu Song
M. Zhang
Tao Chen
Jun Sun
28
17
0
10 Dec 2022
QEBVerif: Quantization Error Bound Verification of Neural Networks
QEBVerif: Quantization Error Bound Verification of Neural Networks
Yedi Zhang
Fu Song
Jun Sun
MQ
18
11
0
06 Dec 2022
Privacy-Utility Balanced Voice De-Identification Using Adversarial
  Examples
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Meng Chen
Liwang Lu
Jiadi Yu
Ying Chen
Zhongjie Ba
Feng Lin
Kui Ren
AAML
12
1
0
10 Nov 2022
Adversarial Attack on Radar-based Environment Perception Systems
Adversarial Attack on Radar-based Environment Perception Systems
Amira Guesmi
Ihsen Alouani
AAML
33
2
0
02 Nov 2022
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker
  Verification
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xingqi Chen
Jie Wang
Xiaoli Zhang
Weiqiang Zhang
Kunde Yang
AAML
21
7
0
02 Nov 2022
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Jiadi Yao
Xing Chen
Xiao-Lei Zhang
Weiqiang Zhang
Kunde Yang
AAML
15
8
0
30 Oct 2022
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time
  Voice Anonymization
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Jiangyi Deng
Fei Teng
Yanjiao Chen
Xiaofu Chen
Zhaohui Wang
Wenyuan Xu
11
11
0
27 Oct 2022
MVNet: Memory Assistance and Vocal Reinforcement Network for Speech
  Enhancement
MVNet: Memory Assistance and Vocal Reinforcement Network for Speech Enhancement
Jianrong Wang
Xiaomin Li
Xuewei Li
Mei Yu
Qiang Fang
Li Liu
23
0
0
15 Sep 2022
Defend Data Poisoning Attacks on Voice Authentication
Defend Data Poisoning Attacks on Voice Authentication
Ke Li
Cameron Baird
D. Lin
AAML
25
9
0
09 Sep 2022
Perception-Aware Attack: Creating Adversarial Music via
  Reverse-Engineering Human Perception
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
21
5
0
26 Jul 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
20
36
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
25
18
0
07 Jun 2022
12
Next