Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3423348
|View full text |Cite
|
Sign up to set email alerts
|

AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(70 citation statements)
references
References 19 publications
1
66
0
Order By: Relevance
“…Over-the-air transmission requires more detailed and computationally intensive optimization to avoid losing its adversarial properties during physical playing. Consequently, previous studies [28], [34], [35] were mainly conducted with white-box attacks. However, black-box attacks are difficult to perform because of lack of information.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Over-the-air transmission requires more detailed and computationally intensive optimization to avoid losing its adversarial properties during physical playing. Consequently, previous studies [28], [34], [35] were mainly conducted with white-box attacks. However, black-box attacks are difficult to perform because of lack of information.…”
Section: Discussionmentioning
confidence: 99%
“…Audio adversarial examples refer to adversarial examples that target auditory models such as automatic speech recognition. Developed from adversarial images, adversarial audios use the auditory characteristics [25]- [27] and attempt to retain adversarial properties when the audio is physical played [28], [29].…”
Section: B Adversarial Example On Audiomentioning
confidence: 99%
See 1 more Smart Citation
“…Adversarial examples are maliciously crafted audio waves that are intended to cause mistranscriptions by the ASR systems [8,34,36]. Most attacks are aimed at producing the targeted malicious sentences; they are a severe security threat [9,20]. For example, an attacker may open a door by submitting adversarial examples that are perceived as "hello world" to the human hearing system (Figure 1).…”
Section: Related Work 31 Adversarial Attacks In Asrmentioning
confidence: 99%
“…However, spoofing countermeasures are not considered in [30]. AdvPulse [44] is concerned with the physical access scenario and proposes a penalty-based approach combined with noise modeling to generate universal over-the-air adversarials. For a broader discussion of adversarial attacks on ASVs, we refer to Abdullah et al [18].…”
Section: Related Workmentioning
confidence: 99%