Interspeech 2019 2019
DOI: 10.21437/interspeech.2019-2420
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Black-Box Attacks on Automatic Speech Recognition Systems Using Multi-Objective Evolutionary Optimization

Abstract: Fooling deep neural networks with adversarial input have exposed a significant vulnerability in the current state-of-the-art systems in multiple domains. Both black-box and white-box approaches have been used to either replicate the model itself or to craft examples which cause the model to fail. In this work, we propose a framework which uses multi-objective evolutionary optimization to perform both targeted and un-targeted blackbox attacks on Automatic Speech Recognition (ASR) systems. We apply this framewor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(9 citation statements)
references
References 12 publications
(18 reference statements)
0
8
0
Order By: Relevance
“…Though the success of adversarial attack on image recognition systems has been ported to the speech recognition systems in both the white-box setting (e.g., [8], [9]) and black-box setting (e.g., [10], [11]), relatively little research has been done on SRSs. Essentially, the speech signal of an utterance consists of two major parts: the underlying text and the characteristics of the speaker.…”
Section: Introductionmentioning
confidence: 99%
“…Though the success of adversarial attack on image recognition systems has been ported to the speech recognition systems in both the white-box setting (e.g., [8], [9]) and black-box setting (e.g., [10], [11]), relatively little research has been done on SRSs. Essentially, the speech signal of an utterance consists of two major parts: the underlying text and the characteristics of the speaker.…”
Section: Introductionmentioning
confidence: 99%
“…This is the third class of hidden commands, the adversarial command. There have been extensive studies in the speech adversarial commands domain and we review representative works, including Iter'17 [35], Alzantot'18 [78], Carlini'18 [36], CommanderSong'18 [37], Taori'18 [79], Khare'19 [80], Schönherr'19 [9], Yakura'19 [81], Qin'19 [82], Szurley'19 [83], Imperio'19 [84], Yang'19 [85], Metamorph'20 [86], and AdvPulse'20 [87].…”
Section: B Hidden Voice Commandsmentioning
confidence: 99%
“…Khare'19 [80]: It proposes a new framework using multiobjective evolutionary optimization to generate adversarial commands for both nontargeted and targeted attacks on black-box ASRs. For the generation process, a set of original audio inputs is selected and random uniform noise is added to them as the initialization.…”
Section: B Hidden Voice Commandsmentioning
confidence: 99%
“…Recently, some adversarial example‐based test case generation approaches for black‐box speech recognition systems [20,21,24,25] have been proposed. However, these approaches still suffer from the following limitations: Most approaches focus on generating non‐targeted adversarial examples , which are incapable of generating adversarial examples for target text. Most of the studies use relatively monotonous experimental speech datasets composed of simple words and phrases .…”
Section: Introductionmentioning
confidence: 99%
“…In the sense of fully testing the performance of the system under the interference of targeted adversarial examples, these special adversarial examples generated for black-box speech recognition systems have more practical value. Recently, some adversarial example-based test case generation approaches for black-box speech recognition systems [20,21,24,25] have been proposed. However, these approaches still suffer from the following limitations:…”
mentioning
confidence: 99%