2018
DOI: 10.48550/arxiv.1812.10199
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…2) The privacy of smart home Although manufacturers have deployed various measurements of their platforms, some papers still found flaws leaking users' privacy on various platforms [28]- [31]. There have been many papers showing how to compromise a user's privacy via the flaws of cloud [32]- [35], protocols, voice interface [36], or even traffic analysis. Yoshigoe et al proposed the Synthetic Packet Injection to hide the real traffic between devices and the cloud [37].…”
Section: ) Iot Securitymentioning
confidence: 99%
“…2) The privacy of smart home Although manufacturers have deployed various measurements of their platforms, some papers still found flaws leaking users' privacy on various platforms [28]- [31]. There have been many papers showing how to compromise a user's privacy via the flaws of cloud [32]- [35], protocols, voice interface [36], or even traffic analysis. Yoshigoe et al proposed the Synthetic Packet Injection to hide the real traffic between devices and the cloud [37].…”
Section: ) Iot Securitymentioning
confidence: 99%
“…Finally, a lexicon and language model is applied to obtain the recognition result "open". When Several works have been proposed to detect and defend such adversarial attacks [3,4,10]. Zeng et al leveraged multiple Automatic Speech Recognition (ASR) systems to detect audio physical adversarial attack based on a cross-verification methodology [4].…”
Section: Audio Physical Adversarial Attack Defensementioning
confidence: 99%
“…When Several works have been proposed to detect and defend such adversarial attacks [3,4,10]. Zeng et al leveraged multiple Automatic Speech Recognition (ASR) systems to detect audio physical adversarial attack based on a cross-verification methodology [4]. However, their method lacks certain versatility which cannot detect the adversarial attacks with model transferability.…”
Section: Audio Physical Adversarial Attack Defensementioning
confidence: 99%
See 2 more Smart Citations