ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.06622
  4. Cited By
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

13 July 2020
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
    AAML
ArXivPDFHTML

Papers citing "SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems"

50 / 65 papers shown
Title
Selective Masking Adversarial Attack on Automatic Speech Recognition Systems
Selective Masking Adversarial Attack on Automatic Speech Recognition Systems
Zheng Fang
Shenyi Zhang
Tao Wang
Bowen Li
Lingchen Zhao
Zhangyi Wang
AAML
23
0
0
06 Apr 2025
Transferable Adversarial Attacks against ASR
Transferable Adversarial Attacks against ASR
Xiaoxue Gao
Zexin Li
Yiming Chen
Cong Liu
Yiming Li
AAML
36
1
0
14 Nov 2024
Model-Enhanced LLM-Driven VUI Testing of VPA Apps
Model-Enhanced LLM-Driven VUI Testing of VPA Apps
Suwan Li
Lei Bu
Guangdong Bai
Fuman Xie
Kai Chen
Chang Yue
32
0
0
03 Jul 2024
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition
  Systems
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Q. Li
Chao Shen
Qian Wang
16
4
0
27 Jun 2024
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
32
1
0
26 Jun 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions
  of Voice-Controlled Systems
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
48
3
0
27 May 2024
Towards Evaluating the Robustness of Automatic Speech Recognition
  Systems via Audio Style Transfer
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Weifei Jin
Yuxin Cao
Junjie Su
Qi Shen
Kai Ye
Derui Wang
Jie Hao
Ziyao Liu
AAML
46
2
0
15 May 2024
Whispy: Adapting STT Whisper Models to Real-Time Environments
Whispy: Adapting STT Whisper Models to Real-Time Environments
Antonio Bevilacqua
Paolo Saviano
A. Amirante
S. Romano
23
3
0
06 May 2024
Improving Membership Inference in ASR Model Auditing with Perturbed Loss
  Features
Improving Membership Inference in ASR Model Auditing with Perturbed Loss Features
Francisco Teixeira
Karla Pizzi
R. Olivier
A. Abad
Bhiksha Raj
Isabel Trancoso
AAML
45
2
0
02 May 2024
Every Breath You Don't Take: Deepfake Speech Detection Using Breath
Every Breath You Don't Take: Deepfake Speech Detection Using Breath
Seth Layton
Thiago De Andrade
Daniel Olszewski
Kevin Warren
Kevin R. B. Butler
Patrick Traynor
34
4
0
23 Apr 2024
A Survey of Privacy-Preserving Model Explanations: Privacy Risks,
  Attacks, and Countermeasures
A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Thanh Tam Nguyen
T. T. Huynh
Zhao Ren
Thanh Toan Nguyen
Phi Le Nguyen
Hongzhi Yin
Quoc Viet Hung Nguyen
68
8
0
31 Mar 2024
Unraveling Adversarial Examples against Speaker Identification --
  Techniques for Attack Detection and Victim Model Classification
Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Sonal Joshi
Thomas Thebaud
Jesús Villalba
Najim Dehak
AAML
27
1
0
29 Feb 2024
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How
  Vulnerable are Commercial Voice Control Systems?
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
13
2
0
10 Dec 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
33
6
0
26 Oct 2023
An Integrated Algorithm for Robust and Imperceptible Audio Adversarial
  Examples
An Integrated Algorithm for Robust and Imperceptible Audio Adversarial Examples
Armin Ettenhofer
Jan-Philipp Schulze
Karla Pizzi
AAML
27
0
0
05 Oct 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through
  Static Analysis at the Development Phase
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
Song Liao
Long Cheng
Haipeng Cai
Linke Guo
Hongxin Hu
ELM
21
5
0
11 Sep 2023
Timbre-reserved Adversarial Attack in Speaker Identification
Timbre-reserved Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Li Zhang
Pengcheng Guo
Linfu Xie
AAML
32
4
0
02 Sep 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum
  Reduction Attacks
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang
Kun Sun
Qi Li
AAML
28
0
0
18 Aug 2023
Group-based Robustness: A General Framework for Customized Robustness in
  the Real World
Group-based Robustness: A General Framework for Customized Robustness in the Real World
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
OOD
AAML
27
1
0
29 Jun 2023
DistriBlock: Identifying adversarial audio samples by leveraging
  characteristics of the output distribution
DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías P. Pizarro
D. Kolossa
Asja Fischer
AAML
35
1
0
26 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition
  Systems
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
41
11
0
23 May 2023
The defender's perspective on automatic speaker verification: An
  overview
The defender's perspective on automatic speaker verification: An overview
Haibin Wu
Jiawen Kang
Lingwei Meng
Helen Meng
Hung-yi Lee
AAML
24
14
0
22 May 2023
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants
Domna Bilika
Nikoletta Michopoulou
E. Alepis
Constantinos Patsakis
22
8
0
20 Feb 2023
Turning Noises to Fingerprint-Free "Credentials": Secure and Usable
  Drone Authentication
Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Drone Authentication
Chuxiong Wu
Qiang Zeng
14
3
0
18 Feb 2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
  through Physical Barriers
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Pa Walker
Tianfang Zhang
Cong Shi
Nitesh Saxena
Ying-Cong Chen
AAML
18
2
0
04 Feb 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
Data Leakage via Access Patterns of Sparse Features in Deep
  Learning-based Recommendation Systems
Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
H. Hashemi
Wenjie Xiong
Liu Ke
Kiwan Maeng
M. Annavaram
G. E. Suh
Hsien-Hsin S. Lee
32
6
0
12 Dec 2022
Privacy against Real-Time Speech Emotion Detection via Acoustic
  Adversarial Evasion of Machine Learning
Privacy against Real-Time Speech Emotion Detection via Acoustic Adversarial Evasion of Machine Learning
Brian Testa
Yi Xiao
Harshit Sharma
Avery Gump
Asif Salekin
AAML
27
7
0
17 Nov 2022
There is more than one kind of robustness: Fooling Whisper with
  adversarial examples
There is more than one kind of robustness: Fooling Whisper with adversarial examples
R. Olivier
Bhiksha Raj
AAML
40
12
0
26 Oct 2022
Push-Pull: Characterizing the Adversarial Robustness for Audio-Visual
  Active Speaker Detection
Push-Pull: Characterizing the Adversarial Robustness for Audio-Visual Active Speaker Detection
Xuan-Bo Chen
Haibin Wu
Helen Meng
Hung-yi Lee
J. Jang
AAML
20
3
0
03 Oct 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
24
1
0
17 Sep 2022
Threat Assessment in Machine Learning based Systems
Threat Assessment in Machine Learning based Systems
L. Tidjon
Foutse Khomh
27
17
0
30 Jun 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
20
36
0
07 Jun 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A
  survey
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
24
23
0
27 May 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary
  Backdoor Pattern Types Using a Maximum Margin Statistic
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
32
41
0
13 May 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a
  Systematic View
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
AAML
21
20
0
10 May 2022
AdvEst: Adversarial Perturbation Estimation to Classify and Detect
  Adversarial Attacks against Speaker Identification
AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Sonal Joshi
Saurabh Kataria
Jesus Villalba
Najim Dehak
AAML
38
7
0
08 Apr 2022
Coarse-to-Fine Recursive Speech Separation for Unknown Number of
  Speakers
Coarse-to-Fine Recursive Speech Separation for Unknown Number of Speakers
Zhenhao Jin
Xiang Hao
Xiangdong Su
19
4
0
30 Mar 2022
Recent improvements of ASR models in the face of adversarial attacks
Recent improvements of ASR models in the face of adversarial attacks
R. Olivier
Bhiksha Raj
AAML
18
13
0
29 Mar 2022
Supporting tangible multi-factor key exchange in households
Supporting tangible multi-factor key exchange in households
Tom Lodge
Sameh Zakhary
Derek McAuley
20
0
0
25 Mar 2022
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on
  Automatic Speech Recognition Systems
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
H. Abdullah
Aditya Karlekar
S. Prasad
Muhammad Sajidur Rahman
Logan Blue
L. A. Bauer
Vincent Bindschaedler
Patrick Traynor
AAML
21
3
0
10 Mar 2022
SoK: On the Semantic AI Security in Autonomous Driving
SoK: On the Semantic AI Security in Autonomous Driving
Junjie Shen
Ningfei Wang
Ziwen Wan
Yunpeng Luo
Takami Sato
...
Zhenyu Zhong
Kang Li
Ziming Zhao
Chunming Qiao
Qi Alfred Chen
AAML
20
39
0
10 Mar 2022
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice
  Commands
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
Sergio Esposito
D. Sgandurra
G. Bella
31
14
0
17 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification
  Systems
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
AAML
21
8
0
11 Feb 2022
FAAG: Fast Adversarial Audio Generation through Interactive Attack
  Optimisation
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation
Yuantian Miao
Chao Chen
Lei Pan
Jun Zhang
Yang Xiang
AAML
20
2
0
11 Feb 2022
Visualizing Automatic Speech Recognition -- Means for a Better
  Understanding?
Visualizing Automatic Speech Recognition -- Means for a Better Understanding?
Karla Markert
Romain Parracone
Mykhailo Kulakov
Philip Sperl
Ching-yu Kao
Konstantin Böttinger
19
8
0
01 Feb 2022
Language Dependencies in Adversarial Attacks on Speech Recognition
  Systems
Language Dependencies in Adversarial Attacks on Speech Recognition Systems
Karla Markert
Donika Mirdita
Konstantin Böttinger
AAML
SILM
19
4
0
01 Feb 2022
Detecting Audio Adversarial Examples with Logit Noising
Detecting Audio Adversarial Examples with Logit Noising
N. Park
Sangwoo Ji
Jong Kim
AAML
27
5
0
13 Dec 2021
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech
  Recognition using Frequency Masking
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking
Xiao-lan Wu
A. Rajan
AAML
16
4
0
03 Dec 2021
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
Joel Frank
Lea Schonherr
DiffM
129
123
0
04 Nov 2021
12
Next