Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3560660
|View full text |Cite
|
Sign up to set email alerts
|

Specpatch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
24
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(26 citation statements)
references
References 21 publications
2
24
0
Order By: Relevance
“…Adversarial attack (Goodfellow, Shlens, and Szegedy 2014) is initially studied in the context of a classification problem, that a deep network can be fooled with small pixel-level changes. It has penetrated into many fields such as emotion recognition (Zhao et al 2021b), network intrusion detection (Chen et al 2023), speech recognition (Guo et al 2022), and edge computing (Zhao et al 2021a). Recent researchers have adopted a similar idea and turned it into a proactive defensive method against facial manipulations.…”
Section: Adversarial Attack Against Facial Manipulationmentioning
confidence: 99%
“…Adversarial attack (Goodfellow, Shlens, and Szegedy 2014) is initially studied in the context of a classification problem, that a deep network can be fooled with small pixel-level changes. It has penetrated into many fields such as emotion recognition (Zhao et al 2021b), network intrusion detection (Chen et al 2023), speech recognition (Guo et al 2022), and edge computing (Zhao et al 2021a). Recent researchers have adopted a similar idea and turned it into a proactive defensive method against facial manipulations.…”
Section: Adversarial Attack Against Facial Manipulationmentioning
confidence: 99%
“…The above works are the basis of speech recognition UAP research, which shows different degrees of attack capabilities in specific scenarios, but they have some shortcomings in terms of threat or imperceptibility. Li et al (2020b) and Guo et al (2022) are the latest developments related to UAP in ASR. The target model of Li et al (2020b) was speaker recognition model X-vectors and lightweight speech command recognition model Speech Command.…”
Section: Specific Adversarial Perturbationmentioning
confidence: 99%
“…The experimental results showed that their UAPs were hard to penetrate to distant speech inputs. Guo et al (2022) trained SpecPatch on the segmented phoneme level, achieving good generality and time independence. The method inserts silent frames to disrupt the original user semantics in normal audio.…”
Section: Specific Adversarial Perturbationmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, regarding another future direction of our methods, we intend to generalize and adopt them to more settings and applications, such as continual learning (Wang et al, 2022b), non-transferable learning , federate learning (Dong et al, 2022), audio signal processing (Zhai et al, 2021;Guo et al, 2022a;b), and visual object tracking . We will also evaluate our methods under other DNN structures (e.g., ViT (Tu et al, 2022) and GCN (Zhao et al, 2020b)…”
mentioning
confidence: 99%