2022
DOI: 10.48550/arxiv.2206.03393
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

Abstract: Speaker recognition systems (SRSs) have recently been shown to be vulnerable to adversarial attacks, raising significant security concerns. In this work, we systematically investigate transformation and adversarial training based defenses for securing SRSs. According to the characteristic of SRSs, we present 22 diverse transformations and thoroughly evaluate them using 7 recent promising adversarial attacks (4 white-box and 3 black-box) on speaker recognition. With careful regard for best practices in defense … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 63 publications
0
0
0
Order By: Relevance
“…Operations on audio data such as reading data from a file and retrieving MFCC were implemented using the torchaudio library [36]. In order to allow evaluation of the discussed approach, we have chosen to integrate the AudioMnist dataset [5], which has been already widely used in that research area [37,38].…”
Section: Figure 1 the Architecture Of The Pytorch-dnn-evolutionmentioning
confidence: 99%
“…Operations on audio data such as reading data from a file and retrieving MFCC were implemented using the torchaudio library [36]. In order to allow evaluation of the discussed approach, we have chosen to integrate the AudioMnist dataset [5], which has been already widely used in that research area [37,38].…”
Section: Figure 1 the Architecture Of The Pytorch-dnn-evolutionmentioning
confidence: 99%