ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.03078
  4. Cited By
Adversarial Attacks on GMM i-vector based Speaker Verification Systems

Adversarial Attacks on GMM i-vector based Speaker Verification Systems

8 November 2019
Xu Li
Jinghua Zhong
Xixin Wu
Jianwei Yu
Xunying Liu
Helen Meng
    AAML
ArXivPDFHTML

Papers citing "Adversarial Attacks on GMM i-vector based Speaker Verification Systems"

19 / 19 papers shown
Title
Diffusion-Based Adversarial Purification for Speaker Verification
Diffusion-Based Adversarial Purification for Speaker Verification
Yibo Bai
Ju Liu
Xuelong Li
DiffM
36
2
0
22 Oct 2023
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial
  Attack in Speaker Identification
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Ziqian Wang
Pengcheng Guo
Linfu Xie
AAML
32
1
0
30 May 2023
The defender's perspective on automatic speaker verification: An
  overview
The defender's perspective on automatic speaker verification: An overview
Haibin Wu
Jiawen Kang
Lingwei Meng
Helen Meng
Hung-yi Lee
AAML
24
15
0
22 May 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
32
1
0
21 Feb 2023
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker
  Verification
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xingqi Chen
Jie Wang
Xiaoli Zhang
Weiqiang Zhang
Kunde Yang
AAML
26
7
0
02 Nov 2022
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Jiadi Yao
Xing Chen
Xiao-Lei Zhang
Weiqiang Zhang
Kunde Yang
AAML
31
8
0
30 Oct 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
25
37
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
35
18
0
07 Jun 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A
  survey
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
24
23
0
27 May 2022
Dictionary Attacks on Speaker Verification
Dictionary Attacks on Speaker Verification
Mirko Marras
Pawel Korus
Anubhav Jain
N. Memon
AAML
34
9
0
24 Apr 2022
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
25
12
0
04 Sep 2021
Channel-wise Gated Res2Net: Towards Robust Detection of Synthetic Speech
  Attacks
Channel-wise Gated Res2Net: Towards Robust Detection of Synthetic Speech Attacks
Xu Li
Xixin Wu
Hui Lu
Xunying Liu
Helen Meng
32
57
0
19 Jul 2021
Adversarial Sample Detection for Speaker Verification by Neural Vocoders
Adversarial Sample Detection for Speaker Verification by Neural Vocoders
Haibin Wu
Po-Chun Hsu
Ji Gao
Shanshan Zhang
Shen Huang
Jian Kang
Zhiyong Wu
Helen Meng
Hung-yi Lee
AAML
27
20
0
01 Jul 2021
Voting for the right answer: Adversarial defense for speaker
  verification
Voting for the right answer: Adversarial defense for speaker verification
Haibin Wu
Yang Zhang
Zhiyong Wu
Dong Wang
Hung-yi Lee
AAML
30
25
0
15 Jun 2021
Improving the Adversarial Robustness for Speaker Verification by
  Self-Supervised Learning
Improving the Adversarial Robustness for Speaker Verification by Self-Supervised Learning
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
Helen Meng
Hung-yi Lee
AAML
SSL
50
29
0
01 Jun 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
Adversarial defense for automatic speaker verification by cascaded
  self-supervised learning models
Adversarial defense for automatic speaker verification by cascaded self-supervised learning models
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
Helen Meng
Hung-yi Lee
AAML
29
40
0
14 Feb 2021
The Attacker's Perspective on Automatic Speaker Verification: An
  Overview
The Attacker's Perspective on Automatic Speaker Verification: An Overview
Rohan Kumar Das
Xiaohai Tian
Tomi Kinnunen
Haizhou Li
AAML
20
81
0
19 Apr 2020
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
296
3,113
0
04 Nov 2016
1