2022
DOI: 10.1145/3491220
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders

Abstract: Deep Neural Network (DNN) is gaining popularity thanks to its ability to attain high accuracy and performance in various security-crucial scenarios. However, recent research shows that DNN based Automatic Speech Recognition (ASR) systems are vulnerable to adversarial attacks. Specifically, these attacks mainly focus on formulating a process of adversarial example generation as iterative, optimization-based attacks. Although these attacks make significant progress, they still take large generation time to produ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…An example of black-box attack methods is the gradient-free Alzantot method [4] that uses genetic algorithm optimization. Gradient approximation is used to generate black-box audio adversarial examples in [20].…”
Section: A White-box and Black-box Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…An example of black-box attack methods is the gradient-free Alzantot method [4] that uses genetic algorithm optimization. Gradient approximation is used to generate black-box audio adversarial examples in [20].…”
Section: A White-box and Black-box Attacksmentioning
confidence: 99%
“…The chosen model architecture and hyperparameterisation mostly follows [17]. One change is to have a fixed input size as (31,20), corresponding to (#frames, #cepstral coefficients), throughout all experiments. Additionally our model has one single output for binary classification.…”
Section: B Detection Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Mainstream black-box attack methods include score-based [7,9,11,12], decisionbased [13][14][15], and substitute-based [16][17][18][19] approaches.…”
Section: Introductionmentioning
confidence: 99%