ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1901.07846
  4. Cited By

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems

23 January 2019
Tianyu Du
S. Ji
Jinfeng Li
Qinchen Gu
Ting Wang
R. Beyah
    AAML
ArXivPDFHTML

Papers citing "SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems"

22 / 22 papers shown
Title
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
Jialei Song
Xingquan Zuo
Feiyang Wang
Hai Huang
Tianle Zhang
AAML
172
0
0
16 Apr 2025
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech
  Foundation Models
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models
Vyas Raina
Rao Ma
Charles G McGhee
Kate Knill
Mark Gales
AAML
39
5
0
09 May 2024
DistriBlock: Identifying adversarial audio samples by leveraging
  characteristics of the output distribution
DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías P. Pizarro
D. Kolossa
Asja Fischer
AAML
45
1
0
26 May 2023
The defender's perspective on automatic speaker verification: An
  overview
The defender's perspective on automatic speaker verification: An overview
Haibin Wu
Jiawen Kang
Lingwei Meng
Helen Meng
Hung-yi Lee
AAML
24
15
0
22 May 2023
Generative Extraction of Audio Classifiers for Speaker Identification
Generative Extraction of Audio Classifiers for Speaker Identification
Tejumade Afonja
Lucas Bourtoule
Varun Chandrasekaran
Sageev Oore
Nicolas Papernot
AAML
15
1
0
26 Jul 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
25
37
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
42
18
0
07 Jun 2022
Transferability of Adversarial Attacks on Synthetic Speech Detection
Transferability of Adversarial Attacks on Synthetic Speech Detection
Yueyun Shang
Shunyi Chen
Li Dong
Diqun Yan
Rangding Wang
AAML
24
0
0
16 May 2022
AEON: A Method for Automatic Evaluation of NLP Test Cases
AEON: A Method for Automatic Evaluation of NLP Test Cases
Jen-tse Huang
Jianping Zhang
Wenxuan Wang
Pinjia He
Yuxin Su
Michael R. Lyu
45
23
0
13 May 2022
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
Md. Imran Hossen
X. Hei
31
4
0
05 Mar 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
24
21
0
02 Dec 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with
  Minimal Information
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
18
69
0
19 Oct 2021
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
30
12
0
04 Sep 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
42
15
0
19 Mar 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
39
24
0
10 Feb 2021
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
33
3
0
23 Jan 2020
Cross-Representation Transferability of Adversarial Attacks: From
  Spectrograms to Audio Waveforms
Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms
K. M. Koerich
M. Esmailpour
Sajjad Abdoli
A. Britto
Alessandro Lameiras Koerich
AAML
38
1
0
22 Oct 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
25
51
0
08 Aug 2019
Structure-Invariant Testing for Machine Translation
Structure-Invariant Testing for Machine Translation
Pinjia He
Clara Meister
Z. Su
27
104
0
19 Jul 2019
The Audio Auditor: User-Level Membership Inference in Internet of Things
  Voice Services
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Yuantian Miao
Minhui Xue
Chao Chen
Lei Pan
Jinchao Zhang
Benjamin Zi Hao Zhao
Dali Kaafar
Yang Xiang
21
34
0
17 May 2019
Model-Reuse Attacks on Deep Learning Systems
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
136
186
0
02 Dec 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
326
5,849
0
08 Jul 2016
1