ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.05665
  4. Cited By
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

16 August 2018
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
    AAML
ArXivPDFHTML

Papers citing "Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding"

44 / 44 papers shown
Title
"I am bad": Interpreting Stealthy, Universal and Robust Audio Jailbreaks in Audio-Language Models
"I am bad": Interpreting Stealthy, Universal and Robust Audio Jailbreaks in Audio-Language Models
Isha Gupta
David Khachaturov
Robert D. Mullins
AAML
AuLLM
67
2
0
02 Feb 2025
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech
  Foundation Models
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models
Vyas Raina
Rao Ma
Charles G McGhee
Kate Knill
Mark Gales
AAML
33
5
0
09 May 2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
AAML
13
2
0
18 Feb 2024
Vulnerability Analysis of Transformer-based Optical Character
  Recognition to Adversarial Attacks
Vulnerability Analysis of Transformer-based Optical Character Recognition to Adversarial Attacks
Lucas Beerens
D. Higham
36
1
0
28 Nov 2023
Group-based Robustness: A General Framework for Customized Robustness in
  the Real World
Group-based Robustness: A General Framework for Customized Robustness in the Real World
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
OOD
AAML
42
1
0
29 Jun 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced
  Driver-Assistance System
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System
Jiwei Guan
Lei Pan
Chen Wang
Shui Yu
Longxiang Gao
Xi Zheng
AAML
19
3
0
30 May 2023
DistriBlock: Identifying adversarial audio samples by leveraging
  characteristics of the output distribution
DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías P. Pizarro
D. Kolossa
Asja Fischer
AAML
43
1
0
26 May 2023
Deep Transfer Learning for Automatic Speech Recognition: Towards Better
  Generalization
Deep Transfer Learning for Automatic Speech Recognition: Towards Better Generalization
Hamza Kheddar
Yassine Himeur
S. Al-Maadeed
Abbes Amira
F. Bensaali
47
76
0
27 Apr 2023
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Domna Bilika
Nikoletta Michopoulou
E. Alepis
Constantinos Patsakis
33
8
0
20 Feb 2023
Leveraging Domain Features for Detecting Adversarial Attacks Against
  Deep Speech Recognition in Noise
Leveraging Domain Features for Detecting Adversarial Attacks Against Deep Speech Recognition in Noise
Christian Heider Nielsen
Zheng-Hua Tan
AAML
19
1
0
03 Nov 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
25
37
0
07 Jun 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A
  survey
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
24
23
0
27 May 2022
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot
  Learning
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot Learning
Mathias Lechner
Alexander Amini
Daniela Rus
T. Henzinger
AAML
29
9
0
15 Apr 2022
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on
  Automatic Speech Recognition Systems
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
H. Abdullah
Aditya Karlekar
S. Prasad
Muhammad Sajidur Rahman
Logan Blue
L. A. Bauer
Vincent Bindschaedler
Patrick Traynor
AAML
26
3
0
10 Mar 2022
Neural Population Geometry Reveals the Role of Stochasticity in Robust
  Perception
Neural Population Geometry Reveals the Role of Stochasticity in Robust Perception
Joel Dapello
J. Feather
Hang Le
Tiago Marques
David D. Cox
Josh H. McDermott
J. DiCarlo
SueYeon Chung
AAML
OOD
19
25
0
12 Nov 2021
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Joel Frank
Lea Schonherr
DiffM
129
123
0
04 Nov 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with
  Minimal Information
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
18
69
0
19 Oct 2021
On the Exploitability of Audio Machine Learning Pipelines to
  Surreptitious Adversarial Examples
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Adelin Travers
Lorna Licollari
Guanghan Wang
Varun Chandrasekaran
Adam Dziedzic
David Lie
Nicolas Papernot
AAML
28
3
0
03 Aug 2021
Localized Uncertainty Attacks
Localized Uncertainty Attacks
Ousmane Amadou Dia
Theofanis Karaletsos
C. Hazirbas
Cristian Canton Ferrer
I. Kabul
E. Meijer
AAML
24
2
0
17 Jun 2021
Voting for the right answer: Adversarial defense for speaker
  verification
Voting for the right answer: Adversarial defense for speaker verification
Haibin Wu
Yang Zhang
Zhiyong Wu
Dong Wang
Hung-yi Lee
AAML
30
25
0
15 Jun 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
WaveGuard: Understanding and Mitigating Audio Adversarial Examples
Shehzeen Samarah Hussain
Paarth Neekhara
Shlomo Dubnov
Julian McAuley
F. Koushanfar
AAML
30
71
0
04 Mar 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
39
24
0
10 Feb 2021
Class-Conditional Defense GAN Against End-to-End Speech Attacks
Class-Conditional Defense GAN Against End-to-End Speech Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
21
14
0
22 Oct 2020
Unacceptable, where is my privacy? Exploring Accidental Triggers of
  Smart Speakers
Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers
Lea Schonherr
Maximilian Golla
Thorsten Eisenhofer
Jan Wiele
D. Kolossa
Thorsten Holz
25
41
0
02 Aug 2020
Measuring the Effectiveness of Privacy Policies for Voice Assistant
  Applications
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications
Song Liao
Christin Wilson
Long Cheng
Hongxin Hu
Huixing Deng
13
65
0
29 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
29
128
0
13 Jul 2020
How benign is benign overfitting?
How benign is benign overfitting?
Amartya Sanyal
P. Dokania
Varun Kanade
Philip Torr
NoLa
AAML
23
57
0
08 Jul 2020
Subpopulation Data Poisoning Attacks
Subpopulation Data Poisoning Attacks
Matthew Jagielski
Giorgio Severi
Niklas Pousette Harger
Alina Oprea
AAML
SILM
24
112
0
24 Jun 2020
Inaudible Adversarial Perturbations for Targeted Attack in Speaker
  Recognition
Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition
Qing Wang
Pengcheng Guo
Lei Xie
AAML
24
57
0
21 May 2020
SINVAD: Search-based Image Space Navigation for DNN Image Classifier
  Test Input Generation
SINVAD: Search-based Image Space Navigation for DNN Image Classifier Test Input Generation
Sungmin Kang
R. Feldt
S. Yoo
AAML
26
32
0
19 May 2020
Learning to fool the speaker recognition
Learning to fool the speaker recognition
Jiguo Li
Xinfeng Zhang
Jizheng Xu
Li Zhang
Y. Wang
Siwei Ma
Wen Gao
AAML
30
21
0
07 Apr 2020
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
33
3
0
23 Jan 2020
Deep Representation Learning in Speech Processing: Challenges, Recent
  Advances, and Future Trends
Deep Representation Learning in Speech Processing: Challenges, Recent Advances, and Future Trends
S. Latif
R. Rana
Sara Khalifa
Raja Jurdak
Junaid Qadir
Björn W. Schuller
AI4TS
32
81
0
02 Jan 2020
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
AAML
31
66
0
19 Dec 2019
Generate (non-software) Bugs to Fool Classifiers
Generate (non-software) Bugs to Fool Classifiers
Hiromu Yakura
Youhei Akimoto
Jun Sakuma
AAML
25
10
0
20 Nov 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
19
193
0
03 Nov 2019
Perceptual Based Adversarial Audio Attacks
Perceptual Based Adversarial Audio Attacks
Joseph Szurley
J. Zico Kolter
AAML
24
25
0
14 Jun 2019
Securing Connected & Autonomous Vehicles: Challenges Posed by
  Adversarial Machine Learning and The Way Forward
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward
A. Qayyum
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
21
187
0
29 May 2019
The Audio Auditor: User-Level Membership Inference in Internet of Things
  Voice Services
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Yuantian Miao
Minhui Xue
Chao Chen
Lei Pan
Jinchao Zhang
Benjamin Zi Hao Zhao
Dali Kaafar
Yang Xiang
16
34
0
17 May 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
38
376
0
22 Mar 2019
Smart Home Personal Assistants: A Security and Privacy Review
Smart Home Personal Assistants: A Security and Privacy Review
Jide S. Edu
Jose Such
Guillermo Suarez-Tangil
6
92
0
13 Mar 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffM
AAML
36
36
0
26 Jan 2019
Robust Audio Adversarial Example for a Physical Attack
Robust Audio Adversarial Example for a Physical Attack
Hiromu Yakura
Jun Sakuma
AAML
17
190
0
28 Oct 2018
1