ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.02301
  4. Cited By
Real-time, Universal, and Robust Adversarial Attacks Against Speaker
  Recognition Systems

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

4 March 2020
Yi Xie
Cong Shi
Zhuohang Li
Jian-Dong Liu
Yingying Chen
Bo Yuan
    AAML
ArXivPDFHTML

Papers citing "Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems"

13 / 13 papers shown
Title
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
60
3
0
20 Nov 2023
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial
  Attack in Speaker Identification
Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Ziqian Wang
Pengcheng Guo
Linfu Xie
AAML
21
1
0
30 May 2023
Phonemic Adversarial Attack against Audio Recognition in Real World
Phonemic Adversarial Attack against Audio Recognition in Real World
Jiakai Wang
Zhendong Chen
Zixin Yin
Qinghong Yang
Xianglong Liu
AAML
31
3
0
19 Nov 2022
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR)
  for Metaverses
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses
Adnan Qayyum
M. A. Butt
Hassan Ali
Muhammad Usman
O. Halabi
Ala I. Al-Fuqaha
Q. Abbasi
Muhammad Ali Imran
Junaid Qadir
30
32
0
24 Oct 2022
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
  DNN
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
Huy Phan
Cong Shi
Yi Xie
Tian-Di Zhang
Zhuohang Li
Tianming Zhao
Jian-Dong Liu
Yan Wang
Ying Chen
Bo Yuan
AAML
32
6
0
22 Aug 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
27
18
0
07 Jun 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A
  survey
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
24
23
0
27 May 2022
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
A Survey On Universal Adversarial Attack
A Survey On Universal Adversarial Attack
Chaoning Zhang
Philipp Benz
Chenguo Lin
Adil Karjauv
Jing Wu
In So Kweon
AAML
23
90
0
02 Mar 2021
Adversarial defense for automatic speaker verification by cascaded
  self-supervised learning models
Adversarial defense for automatic speaker verification by cascaded self-supervised learning models
Haibin Wu
Xu Li
Andy T. Liu
Zhiyong Wu
H. Meng
Hung-yi Lee
AAML
29
40
0
14 Feb 2021
The Attacker's Perspective on Automatic Speaker Verification: An
  Overview
The Attacker's Perspective on Automatic Speaker Verification: An Overview
Rohan Kumar Das
Xiaohai Tian
Tomi Kinnunen
Haizhou Li
AAML
20
81
0
19 Apr 2020
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
26
68
0
06 Nov 2019
Probing the Information Encoded in X-vectors
Probing the Information Encoded in X-vectors
Desh Raj
David Snyder
Daniel Povey
Sanjeev Khudanpur
34
84
0
13 Sep 2019
1