ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2408.13849
  4. Cited By
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
v1v2 (latest)

Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition

Cluster Computing (CC), 2024
25 August 2024
Weida Xu
Yang Xu
Sicong Zhang
    FedMLAAML
ArXiv (abs)PDFHTMLGithub

Papers citing "Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition"

26 / 26 papers shown
Breaking Speaker Recognition with PaddingBack
Breaking Speaker Recognition with PaddingBackIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2023
Zhe Ye
Diqun Yan
Li Dong
Kailai Shen
AAML
274
7
0
08 Aug 2023
Revisiting Weighted Aggregation in Federated Learning with Neural
  Networks
Revisiting Weighted Aggregation in Federated Learning with Neural NetworksInternational Conference on Machine Learning (ICML), 2023
Zexi Li
Tao Lin
Xinyi Shang
Chao-Xiang Wu
FedML
427
114
0
14 Feb 2023
Robust Speech Recognition via Large-Scale Weak Supervision
Robust Speech Recognition via Large-Scale Weak SupervisionInternational Conference on Machine Learning (ICML), 2022
Alec Radford
Jong Wook Kim
Tao Xu
Greg Brockman
C. McLeavey
Ilya Sutskever
OffRL
1.4K
6,620
0
06 Dec 2022
Going In Style: Audio Backdoors Through Stylistic Transformations
Going In Style: Audio Backdoors Through Stylistic TransformationsIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022
Stefanos Koffas
Luca Pajola
S. Picek
Mauro Conti
386
35
0
06 Nov 2022
Neurotoxin: Durable Backdoors in Federated Learning
Neurotoxin: Durable Backdoors in Federated LearningInternational Conference on Machine Learning (ICML), 2022
Zhengming Zhang
Ashwinee Panda
Linyue Song
Yaoqing Yang
Michael W. Mahoney
Joseph E. Gonzalez
Kannan Ramchandran
Prateek Mittal
FedML
317
204
0
12 Jun 2022
Towards End-to-end Unsupervised Speech Recognition
Towards End-to-end Unsupervised Speech RecognitionSpoken Language Technology Workshop (SLT), 2022
Alexander H. Liu
Wei-Ning Hsu
Michael Auli
Alexei Baevski
SSL
265
85
0
05 Apr 2022
Poison Ink: Robust and Invisible Backdoor Attack
Poison Ink: Robust and Invisible Backdoor AttackIEEE Transactions on Image Processing (TIP), 2021
Jie Zhang
Dongdong Chen
Qidong Huang
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
AAML
412
118
0
05 Aug 2021
Backdoor Attack against Speaker Verification
Backdoor Attack against Speaker Verification
Tongqing Zhai
Yiming Li
Zi-Mou Zhang
Baoyuan Wu
Yong Jiang
Shutao Xia
AAML
298
122
0
22 Oct 2020
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural
  Networks
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks
A. Salem
Michael Backes
Yang Zhang
170
38
0
07 Oct 2020
Mitigating backdoor attacks in LSTM-based Text Classification Systems by
  Backdoor Keyword Identification
Mitigating backdoor attacks in LSTM-based Text Classification Systems by Backdoor Keyword IdentificationNeurocomputing (Neurocomputing), 2020
Chuanshuai Chen
Jiazhu Dai
SILM
309
157
0
11 Jul 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Jiabo He
James Bailey
Feng Lu
AAML
402
593
0
05 Jul 2020
Federated Learning with Differential Privacy: Algorithms and Performance
  Analysis
Federated Learning with Differential Privacy: Algorithms and Performance AnalysisIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2019
Kang Wei
Jun Li
Ming Ding
Chuan Ma
Heng Yang
Farokhi Farhad
Shi Jin
Tony Q.S. Quek
H. Vincent Poor
FedML
788
2,099
0
01 Nov 2019
Model Agnostic Defence against Backdoor Attacks in Machine Learning
Model Agnostic Defence against Backdoor Attacks in Machine LearningIEEE Transactions on Reliability (IEEE Trans. Reliab.), 2019
Sakshi Udeshi
Shanshan Peng
Gerald Woo
Lionell Loh
Louth Rawshan
Sudipta Chattopadhyay
AAML
411
124
0
06 Aug 2019
On the Convergence of FedAvg on Non-IID Data
On the Convergence of FedAvg on Non-IID DataInternational Conference on Learning Representations (ICLR), 2019
Xiang Li
Kaixuan Huang
Wenhao Yang
Shusen Wang
Zhihua Zhang
FedML
857
2,894
0
04 Jul 2019
Adversarial Audio: A New Information Hiding Method and Backdoor for
  DNN-based Speech Recognition Models
Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models
Yehao Kong
Jiliang Zhang
135
31
0
08 Apr 2019
Speaker Recognition from Raw Waveform with SincNet
Speaker Recognition from Raw Waveform with SincNet
Mirco Ravanelli
Yoshua Bengio
728
835
0
29 Jul 2018
AudioMNIST: Exploring Explainable Artificial Intelligence for Audio
  Analysis on a Simple Benchmark
AudioMNIST: Exploring Explainable Artificial Intelligence for Audio Analysis on a Simple Benchmark
Sören Becker
Johanna Vielhaben
M. Ackermann
Klaus-Robert Muller
Sebastian Lapuschkin
Wojciech Samek
XAI
439
156
0
09 Jul 2018
VoxCeleb2: Deep Speaker Recognition
VoxCeleb2: Deep Speaker Recognition
Joon Son Chung
Arsha Nagrani
Andrew Zisserman
812
2,678
0
14 Jun 2018
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Ali Shafahi
Wenjie Huang
Mahyar Najibi
Octavian Suciu
Christoph Studer
Tudor Dumitras
Tom Goldstein
AAML
840
1,244
0
03 Apr 2018
Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates
Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates
Dong Yin
Yudong Chen
Kannan Ramchandran
Peter L. Bartlett
OODFedML
781
2,070
0
05 Mar 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
Basel Alomair
AAMLSILM
981
2,182
0
15 Dec 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
808
2,158
0
22 Aug 2017
Deep Speaker: an End-to-End Neural Speaker Embedding System
Deep Speaker: an End-to-End Neural Speaker Embedding System
Chao Li
Xiaokong Ma
B. Jiang
Xiangang Li
Xuewei Zhang
Xiao-Chang Liu
Ying Cao
Ajay Kannan
Zhenyao Zhu
256
525
0
05 May 2017
Byzantine-Tolerant Machine Learning
Byzantine-Tolerant Machine Learning
Peva Blanchard
El-Mahdi El-Mhamdi
R. Guerraoui
J. Stainer
OODFedML
160
82
0
08 Mar 2017
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based
  Localization
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based LocalizationInternational Journal of Computer Vision (IJCV), 2016
Ramprasaath R. Selvaraju
Michael Cogswell
Abhishek Das
Ramakrishna Vedantam
Devi Parikh
Dhruv Batra
FAtt
1.1K
26,025
0
07 Oct 2016
Communication-Efficient Learning of Deep Networks from Decentralized
  Data
Communication-Efficient Learning of Deep Networks from Decentralized Data
H. B. McMahan
Eider Moore
Daniel Ramage
S. Hampson
Blaise Agüera y Arcas
FedML
1.8K
23,514
0
17 Feb 2016
1
Page 1 of 1