Chen et al., 2021 - Google Patents
Who is real bob? adversarial attacks on speaker recognition systemsChen et al., 2021
View PDF- Document ID
- 8049094196660891512
- Author
- Chen G
- Chenb S
- Fan L
- Du X
- Zhao Z
- Song F
- Liu Y
- Publication year
- Publication venue
- 2021 IEEE Symposium on Security and Privacy (SP)
External Links
Snippet
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or identification mechanism. The popularity of SR brings in serious security concerns, as demonstrated by recent adversarial attacks. However, the impacts of such threats in the …
- 235000000332 black box 0 abstract description 29
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Who is real bob? adversarial attacks on speaker recognition systems | |
Abdullah et al. | Practical hidden voice attacks against speech and speaker recognition systems | |
Abdullah et al. | Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems | |
Li et al. | Adversarial attacks on GMM i-vector based speaker verification systems | |
Kamble et al. | Advances in anti-spoofing: from the perspective of ASVspoof challenges | |
Chen et al. | Towards understanding and mitigating audio adversarial examples for speaker recognition | |
Zhang et al. | Voiceprint mimicry attack towards speaker verification system in smart home | |
Gałka et al. | Playback attack detection for text-dependent speaker verification over telephone channels | |
Zhang et al. | Attack on practical speaker verification system using universal adversarial perturbations | |
Sriskandaraja et al. | Front-end for antispoofing countermeasures in speaker verification: Scattering spectral decomposition | |
Qian et al. | Voicemask: Anonymize and sanitize voice input on mobile devices | |
Marras et al. | Adversarial Optimization for Dictionary Attacks on Speaker Verification. | |
Huang et al. | Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices | |
Chen et al. | {QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems | |
Ren et al. | Replay attack detection based on distortion by loudspeaker for voice authentication | |
Jiang et al. | Securing liveness detection for voice authentication via pop noises | |
Cai et al. | Identifying source speakers for voice conversion based spoofing attacks on speaker verification systems | |
Kassis et al. | Practical attacks on voice spoofing countermeasures | |
Han et al. | Accuth $^+ $+: Accelerometer-Based Anti-Spoofing Voice Authentication on Wrist-Worn Wearables | |
Yasur et al. | Deepfake captcha: A method for preventing fake calls | |
Zhang et al. | Volere: Leakage resilient user authentication based on personal voice challenges | |
Shang et al. | Srvoice: A robust sparse representation-based liveness detection system | |
Park et al. | User authentication method via speaker recognition and speech synthesis detection | |
Nagakrishnan et al. | Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models | |
Cao et al. | LiveProbe: Exploring continuous voice liveness detection via phonemic energy response patterns |