Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1911.01840
Cited By
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
3 November 2019
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems"
31 / 81 papers shown
Title
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
22
23
0
27 May 2022
Dictionary Attacks on Speaker Verification
Mirko Marras
Pawel Korus
Anubhav Jain
N. Memon
AAML
26
9
0
24 Apr 2022
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
Sergio Esposito
D. Sgandurra
G. Bella
26
14
0
17 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
AAML
16
8
0
11 Feb 2022
A Survey of PPG's Application in Authentication
Lin Li
Chao Chen
Lei Pan
Leo Yu Zhang
Zhifeng Wang
Jun Zhang
Yang Xiang
23
13
0
27 Jan 2022
AequeVox: Automated Fairness Testing of Speech Recognition Systems
Sai Sathiesh Rajan
Sakshi Udeshi
Sudipta Chattopadhyay
7
15
0
19 Oct 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
13
69
0
19 Oct 2021
Impact of Channel Variation on One-Class Learning for Spoof Detection
Rohit Arora
Anmol Arora
Rohit Singh Rathore
14
0
0
30 Sep 2021
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger
Max Bronckers
Christian Cianfarani
Jenna Cryan
Angela Sha
Haitao Zheng
Ben Y. Zhao
AAML
29
39
0
20 Sep 2021
Adversarial Bone Length Attack on Action Recognition
Nariki Tanaka
Hiroshi Kera
K. Kawamoto
AAML
27
13
0
13 Sep 2021
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
9
12
0
04 Sep 2021
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Adelin Travers
Lorna Licollari
Guanghan Wang
Varun Chandrasekaran
Adam Dziedzic
David Lie
Nicolas Papernot
AAML
20
3
0
03 Aug 2021
Practical Attacks on Voice Spoofing Countermeasures
Andre Kassis
Urs Hengartner
AAML
17
14
0
30 Jul 2021
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems
Shangyu Xie
Han Wang
Yu Kong
Yuan Hong
AAML
11
25
0
09 Jul 2021
Voting for the right answer: Adversarial defense for speaker verification
Haibin Wu
Yang Zhang
Zhiyong Wu
Dong Wang
Hung-yi Lee
AAML
25
25
0
15 Jun 2021
Improving the Adversarial Robustness for Speaker Verification by Self-Supervised Learning
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
H. Meng
Hung-yi Lee
AAML
SSL
42
29
0
01 Jun 2021
Attack on practical speaker verification system using universal adversarial perturbations
Weiyi Zhang
Shuning Zhao
Le Liu
Jianmin Li
Xingliang Cheng
T. Zheng
Xiaolin Hu
AAML
20
45
0
19 May 2021
Adversarial Attacks and Defenses for Speech Recognition Systems
Piotr Żelasko
Sonal Joshi
Yiwen Shao
Jesus Villalba
J. Trmal
Najim Dehak
Sanjeev Khudanpur
AAML
8
28
0
31 Mar 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
Shanqing Guo
AAML
30
15
0
19 Mar 2021
Practical Speech Re-use Prevention in Voice-driven Services
Yangyong Zhang
Maliheh Shirvanian
Sunpreet S. Arora
Jianwei Huang
G. Gu
6
2
0
12 Jan 2021
Adversarial Attack and Defense Strategies for Deep Speaker Recognition Systems
Arindam Jati
Chin-Cheng Hsu
Monisankha Pal
Raghuveer Peri
Wael AbdAlmageed
Shrikanth Narayanan
AAML
19
65
0
18 Aug 2020
Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Wenjie Wan
Zhaodi Zhang
Yiwei Zhu
Min Zhang
Fu Song
AAML
8
8
0
16 Jul 2020
Investigating Robustness of Adversarial Samples Detection for Automatic Speaker Verification
Xu Li
Na Li
Jinghua Zhong
Xixin Wu
Xunying Liu
Dan Su
Dong Yu
H. Meng
AAML
15
37
0
11 Jun 2020
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Ruitao Feng
Sen Chen
Xiaofei Xie
Guozhu Meng
Shang-Wei Lin
Yang Liu
25
102
0
11 May 2020
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model
Yi Xie
Zhuohang Li
Cong Shi
Jian-Dong Liu
Yingying Chen
Bo Yuan
AAML
10
66
0
26 Apr 2020
Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Bozhi Wu
Sen Chen
Cuiyun Gao
Lingling Fan
Yang Liu
W. Wen
Michael R. Lyu
31
54
0
24 Apr 2020
The Attacker's Perspective on Automatic Speaker Verification: An Overview
Rohan Kumar Das
Xiaohai Tian
Tomi Kinnunen
Haizhou Li
AAML
10
81
0
19 Apr 2020
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Yusi Lei
Sen Chen
Lingling Fan
Fu Song
Yang Liu
AAML
28
50
0
15 Apr 2020
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
18
18
0
19 May 2019
VoxCeleb2: Deep Speaker Recognition
Joon Son Chung
Arsha Nagrani
Andrew Zisserman
214
2,233
0
14 Jun 2018
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
254
5,833
0
08 Jul 2016
Previous
1
2