2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2019
DOI: 10.1109/dsn.2019.00019
|View full text |Cite
|
Sign up to set email alerts
|

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Abstract: Adversarial examples (AEs) are crafted by adding human-imperceptible perturbations to inputs such that a machine-learning based classifier incorrectly labels them. They have become a severe threat to the trustworthiness of machine learning. While AEs in the image domain have been well studied, audio AEs are less investigated. Recently, multiple techniques are proposed to generate audio AEs, which makes countermeasures against them urgent. Our experiments show that, given an audio AE, the transcription results … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…HAWatcher [75] proposes a novel semantics-aware approach that utilizes semantic information, such as automation rules and device relations, to mine correlations from event logs for precise and explainable anomaly and attack detection. Security issues related to voice assistants draw great attention [76], [77], [78]. For example, MVP-Ears [78] presents a highly accurate (accuracy > 99.8%) audio adversarial example (AE) detection method inspired by multiversion programming, and it can proactively handle transferable audio AEs.…”
Section: A Smart Home Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…HAWatcher [75] proposes a novel semantics-aware approach that utilizes semantic information, such as automation rules and device relations, to mine correlations from event logs for precise and explainable anomaly and attack detection. Security issues related to voice assistants draw great attention [76], [77], [78]. For example, MVP-Ears [78] presents a highly accurate (accuracy > 99.8%) audio adversarial example (AE) detection method inspired by multiversion programming, and it can proactively handle transferable audio AEs.…”
Section: A Smart Home Securitymentioning
confidence: 99%
“…Security issues related to voice assistants draw great attention [76], [77], [78]. For example, MVP-Ears [78] presents a highly accurate (accuracy > 99.8%) audio adversarial example (AE) detection method inspired by multiversion programming, and it can proactively handle transferable audio AEs. This work is concerned with the rich privacy-sensitive data generated by IoT devices.…”
Section: A Smart Home Securitymentioning
confidence: 99%
“…Also, recent studies show that adversarial examples can be applied to the real worlds, such as object recognition system [41], controllable voice system [24] and traffic sign recognition system [25]. Zeng et al proposed a novel audio detection approach to determine whether audio is an adversarial example [26]. Xiao et al designed a malware detection scheme with Q-learning for a mobile device to derive the optimal offloading rate.…”
Section: Related Work a Adversarial Examplesmentioning
confidence: 99%
“…Although manufacturers have deployed various measurements of their platforms, some papers still found flaws leaking users' privacy on various platforms [18]- [21]. There have been many papers showing how to compromise a user's privacy via the flaws of cloud [22]- [25], protocols, voice interface [26], or even traffic analysis. These efforts cover the privacy breaches that can be caused to users by various platforms in a smart home environment.…”
Section: F Related Workmentioning
confidence: 99%