ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.01840
  4. Cited By
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
v1v2 (latest)

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

3 November 2019
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
    AAML
ArXiv (abs)PDFHTML

Papers citing "Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems"

44 / 44 papers shown
Title
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
Guangke Chen
Fu Song
Zhe Zhao
Xiaojun Jia
Yang Liu
Yanchen Qiao
Weizhe Zhang
AuLLMAAML
76
1
0
20 May 2025
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAMLSILM
119
3
0
20 Nov 2023
Towards Characterizing Adversarial Defects of Deep Learning Software
  from the Lens of Uncertainty
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Xiyue Zhang
Xiaofei Xie
Lei Ma
Xiaoning Du
Q. Hu
Yang Liu
Jianjun Zhao
Meng Sun
AAML
52
76
0
24 Apr 2020
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing
  Website Classifiers
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Yusi Lei
Sen Chen
Lingling Fan
Fu Song
Yang Liu
AAML
68
50
0
15 Apr 2020
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box
  Attacks on Speech Recognition and Voice Identification Systems
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
H. Abdullah
Muhammad Sajidur Rahman
Washington Garcia
Logan Blue
Kevin Warren
Anurag Swarnim Yadav
T. Shrimpton
Patrick Traynor
AAML
50
89
0
11 Oct 2019
"Did You Hear That?" Learning to Play Video Games from Audio Cues
"Did You Hear That?" Learning to Play Video Games from Audio Cues
Raluca D. Gaina
Matthew Stephenson
34
8
0
10 Jun 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
72
379
0
22 Mar 2019
Practical Hidden Voice Attacks against Speech and Speaker Recognition
  Systems
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
H. Abdullah
Washington Garcia
Christian Peeters
Patrick Traynor
Kevin R. B. Butler
Joseph N. Wilson
AAML
49
167
0
18 Mar 2019
An improved uncertainty propagation method for robust i-vector based
  speaker recognition
An improved uncertainty propagation method for robust i-vector based speaker recognition
D. González
Emmanuel Vincent
30
3
0
15 Feb 2019
The CORAL+ Algorithm for Unsupervised Domain Adaptation of PLDA
The CORAL+ Algorithm for Unsupervised Domain Adaptation of PLDA
Kong Aik Lee
Qiongqiong Wang
Takafumi Koshinaka
55
71
0
26 Dec 2018
Adversarial Black-Box Attacks on Automatic Speech Recognition Systems
  using Multi-Objective Evolutionary Optimization
Adversarial Black-Box Attacks on Automatic Speech Recognition Systems using Multi-Objective Evolutionary Optimization
Shreya Khare
Rahul Aralikatte
Senthil Mani
AAML
57
14
0
04 Nov 2018
Robust Audio Adversarial Example for a Physical Attack
Robust Audio Adversarial Example for a Physical Attack
Hiromu Yakura
Jun Sakuma
AAML
52
191
0
28 Oct 2018
Characterizing Audio Adversarial Examples Using Temporal Dependency
Characterizing Audio Adversarial Examples Using Temporal Dependency
Zhuolin Yang
Yue Liu
Pin-Yu Chen
Basel Alomair
AAML
36
164
0
28 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
75
289
0
16 Aug 2018
VoxCeleb2: Deep Speaker Recognition
VoxCeleb2: Deep Speaker Recognition
Joon Son Chung
Arsha Nagrani
Andrew Zisserman
356
2,279
0
14 Jun 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
77
258
0
28 May 2018
Targeted Adversarial Examples for Black Box Audio Systems
Targeted Adversarial Examples for Black Box Audio Systems
Rohan Taori
Amog Kamsetty
Brenton Chu
N. Vemuri
AAML
39
183
0
20 May 2018
Black-box Adversarial Attacks with Limited Queries and Information
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAUAAML
163
1,200
0
23 Apr 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing
  Defenses to Adversarial Examples
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye
Nicholas Carlini
D. Wagner
AAML
228
3,186
0
01 Feb 2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice
  Recognition
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
AAML
66
354
0
24 Jan 2018
Fooling End-to-end Speaker Verification by Adversarial Examples
Fooling End-to-end Speaker Verification by Adversarial Examples
Felix Kreuk
Yossi Adi
Moustapha Cissé
Joseph Keshet
AAML
53
203
0
10 Jan 2018
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
D. Wagner
AAML
97
1,083
0
05 Jan 2018
Did you hear that? Adversarial Examples Against Automatic Speech
  Recognition
Did you hear that? Adversarial Examples Against Automatic Speech Recognition
M. Alzantot
Bharathan Balaji
Mani B. Srivastava
AAML
60
252
0
02 Jan 2018
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box
  Machine Learning Models
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
Wieland Brendel
Jonas Rauber
Matthias Bethge
AAML
67
1,344
0
12 Dec 2017
Crafting Adversarial Examples For Speech Paralinguistics Applications
Crafting Adversarial Examples For Speech Paralinguistics Applications
Yuan Gong
C. Poellabauer
AAML
62
122
0
09 Nov 2017
Countering Adversarial Images using Input Transformations
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
118
1,405
0
31 Oct 2017
AISHELL-1: An Open-Source Mandarin Speech Corpus and A Speech
  Recognition Baseline
AISHELL-1: An Open-Source Mandarin Speech Corpus and A Speech Recognition Baseline
Hui Bu
Jiayu Du
Xingyu Na
Bengu Wu
Hao Zheng
CVBM
64
841
0
16 Sep 2017
DolphinAtack: Inaudible Voice Commands
DolphinAtack: Inaudible Voice Commands
Guoming Zhang
Chen Yan
Xiaoyu Ji
Taimin Zhang
Tianchen Zhang
Wenyuan Xu
AAML
43
695
0
31 Aug 2017
Evasion Attacks against Machine Learning at Test Time
Evasion Attacks against Machine Learning at Test Time
Battista Biggio
Igino Corona
Davide Maiorca
B. Nelson
Nedim Srndic
Pavel Laskov
Giorgio Giacinto
Fabio Roli
AAML
157
2,153
0
21 Aug 2017
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural
  Networks without Training Substitute Models
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen
Huan Zhang
Yash Sharma
Jinfeng Yi
Cho-Jui Hsieh
AAML
80
1,882
0
14 Aug 2017
VoxCeleb: a large-scale speaker identification dataset
VoxCeleb: a large-scale speaker identification dataset
Arsha Nagrani
Joon Son Chung
Andrew Zisserman
127
2,274
0
26 Jun 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILMOOD
310
12,069
0
19 Jun 2017
Automated Poisoning Attacks and Defenses in Malware Detection Systems:
  An Adversarial Machine Learning Approach
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach
Sen Chen
Minhui Xue
Lingling Fan
S. Hao
Lihua Xu
Haojin Zhu
Yue Liu
AAML
65
221
0
13 Jun 2017
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
  Methods
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini
D. Wagner
AAML
126
1,864
0
20 May 2017
Deep Speaker: an End-to-End Neural Speaker Embedding System
Deep Speaker: an End-to-End Neural Speaker Embedding System
Chao Li
Xiaokong Ma
B. Jiang
Xiangang Li
Xuewei Zhang
Xiao-Chang Liu
Ying Cao
Ajay Kannan
Zhenyao Zhu
48
493
0
05 May 2017
Adversarial and Clean Data Are Not Twins
Adversarial and Clean Data Are Not Twins
Zhitao Gong
Wenlu Wang
Wei-Shinn Ku
AAML
59
157
0
17 Apr 2017
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OODAAML
266
8,555
0
16 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILMAAML
543
5,897
0
08 Jul 2016
Practical Black-Box Attacks against Machine Learning
Practical Black-Box Attacks against Machine Learning
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
S. Jha
Z. Berkay Celik
A. Swami
MLAUAAML
75
3,678
0
08 Feb 2016
Deep Speech 2: End-to-End Speech Recognition in English and Mandarin
Deep Speech 2: End-to-End Speech Recognition in English and Mandarin
Dario Amodei
Rishita Anubhai
Eric Battenberg
Carl Case
Jared Casper
...
Chong-Jun Wang
Bo Xiao
Dani Yogatama
J. Zhan
Zhenyao Zhu
137
2,973
0
08 Dec 2015
End-to-End Text-Dependent Speaker Verification
End-to-End Text-Dependent Speaker Verification
G. Heigold
Ignacio López Moreno
Samy Bengio
Noam M. Shazeer
63
586
0
27 Sep 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
277
19,066
0
20 Dec 2014
Deep Speech: Scaling up end-to-end speech recognition
Deep Speech: Scaling up end-to-end speech recognition
Awni Y. Hannun
Carl Case
Jared Casper
Bryan Catanzaro
G. Diamos
...
R. Prenger
S. Satheesh
Shubho Sengupta
Adam Coates
A. Ng
183
2,128
0
17 Dec 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
277
14,927
1
21 Dec 2013
1