ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2010.11607
  4. Cited By
Backdoor Attack against Speaker Verification

Backdoor Attack against Speaker Verification

22 October 2020
Tongqing Zhai
Yiming Li
Zi-Mou Zhang
Baoyuan Wu
Yong Jiang
Shutao Xia
    AAML
ArXivPDFHTML

Papers citing "Backdoor Attack against Speaker Verification"

50 / 57 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Zhanyue Qin
D. Tao
AAML
164
0
0
02 Mar 2025
BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution
BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution
Xue Yang
Tao Chen
Lei Guo
Wenbo Jiang
Ji Guo
Y. Li
Jiaming He
170
0
0
28 Feb 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
Yuxiao Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Zhanyue Qin
Kui Ren
AAML
52
3
0
22 Feb 2025
EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor
  Attacks on Deep Speech Classification Models
EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models
Wenhan Yao
Zedong XingXiarun Chen
Jia Liu
yongqiang He
Weiping Wen
AAML
36
0
0
28 Aug 2024
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
Weida Xu
Yang Xu
Sicong Zhang
FedML
AAML
41
0
0
25 Aug 2024
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation
  for Embedding Undetectable Vulnerabilities on Speech Recognition
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Wenhan Yao
Jiangkun Yang
yongqiang He
Jia Liu
Weiping Wen
52
1
0
16 Jun 2024
Physical Backdoor Attack can Jeopardize Driving with
  Vision-Large-Language Models
Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models
Zhenyang Ni
Rui Ye
Yuxian Wei
Zhen Xiang
Yanfeng Wang
Siheng Chen
AAML
36
10
0
19 Apr 2024
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping
  Attacks
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks
Orson Mengara
AAML
38
4
0
29 Mar 2024
Learning to Poison Large Language Models During Instruction Tuning
Learning to Poison Large Language Models During Instruction Tuning
Yao Qiang
Xiangyu Zhou
Saleh Zare Zade
Mohammad Amin Roshani
Douglas Zytko
Dongxiao Zhu
AAML
SILM
40
20
0
21 Feb 2024
The last Dance : Robust backdoor attack via diffusion models and
  bayesian approach
The last Dance : Robust backdoor attack via diffusion models and bayesian approach
Orson Mengara
DiffM
37
4
0
05 Feb 2024
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models
Zhen Xiang
Fengqing Jiang
Zidi Xiong
Bhaskar Ramasubramanian
Radha Poovendran
Bo Li
LRM
SILM
42
40
0
20 Jan 2024
Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Ruofei Wang
Renjie Wan
Zongyu Guo
Qing Guo
Rui Huang
36
6
0
04 Jan 2024
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of
  Triggers
The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers
Orson Mengara
AAML
49
3
0
03 Jan 2024
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How
  Vulnerable are Commercial Voice Control Systems?
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
13
2
0
10 Dec 2023
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning
  Attacks in Federated Learning
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Hossein Fereidooni
Alessandro Pegoraro
Phillip Rieger
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
AAML
26
12
0
07 Dec 2023
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
71
1
0
03 Dec 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
18
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via
  Split-Second Phoneme Injection
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
37
9
0
13 Sep 2023
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
Jianshuo Dong
Han Qiu
Yiming Li
Tianwei Zhang
Yuan-Fang Li
Zeqi Lai
Chao Zhang
Shutao Xia
AAML
31
13
0
12 Aug 2023
Breaking Speaker Recognition with PaddingBack
Breaking Speaker Recognition with PaddingBack
Zhe Ye
Diqun Yan
Li Dong
Kailai Shen
AAML
36
2
0
08 Aug 2023
Backdoor Attacks against Voice Recognition Systems: A Survey
Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan
Jiahe Lan
Zheng Yan
AAML
30
8
0
23 Jul 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via
  Elements of Sound
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
29
28
0
17 Jul 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via
  Adversarial Ultrasound
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
23
11
0
28 Jun 2023
Efficient Backdoor Attacks for Deep Neural Networks in Real-world
  Scenarios
Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Ziqiang Li
Hong Sun
Pengfei Xia
Heng Li
Beihao Xia
Yi Wu
Bin Li
AAML
24
8
0
14 Jun 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
32
8
0
14 Jun 2023
Security and Privacy Problems in Voice Assistant Applications: A Survey
Security and Privacy Problems in Voice Assistant Applications: A Survey
Jingjin Li
Chao Chen
Lei Pan
M. R. Azghadi
Hossein Ghodosi
Jinchao Zhang
19
16
0
19 Apr 2023
UNICORN: A Unified Backdoor Trigger Inversion Framework
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang
Kai Mei
Juan Zhai
Shiqing Ma
LLMSV
35
44
0
05 Apr 2023
A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Haodong Zhao
Wei Du
Junjie Guo
Gongshen Liu
AAML
13
0
0
28 Mar 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
32
1
0
21 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAML
MLAU
21
98
0
07 Feb 2023
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in
  Image Classification
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Gorka Abad
Jing Xu
Stefanos Koffas
Behrad Tajalli
S. Picek
Mauro Conti
AAML
63
5
0
03 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
44
40
0
01 Feb 2023
Look, Listen, and Attack: Backdoor Attacks Against Video Action
  Recognition
Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
Hasan Hammoud
Shuming Liu
Mohammad Alkhrashi
Fahad Albalawi
Guohao Li
AAML
32
8
0
03 Jan 2023
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint
  Selection and Voice Conversion
VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Shunhui Ji
18
5
0
20 Dec 2022
Invisible Backdoor Attack with Dynamic Triggers against Person
  Re-identification
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification
Wenli Sun
Xinyang Jiang
Shuguang Dou
Dongsheng Li
Duoqian Miao
Cheng Deng
Cairong Zhao
AAML
29
8
0
20 Nov 2022
PBSM: Backdoor attack against Keyword spotting based on pitch boosting
  and sound masking
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Shunhui Ji
AAML
11
6
0
16 Nov 2022
Going In Style: Audio Backdoors Through Stylistic Transformations
Going In Style: Audio Backdoors Through Stylistic Transformations
Stefanos Koffas
Luca Pajola
S. Picek
Mauro Conti
31
23
0
06 Nov 2022
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram
  Matrices
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Wanlun Ma
Derui Wang
Ruoxi Sun
Minhui Xue
S. Wen
Yang Xiang
AAML
19
80
0
23 Sep 2022
Defend Data Poisoning Attacks on Voice Authentication
Defend Data Poisoning Attacks on Voice Authentication
Ke Li
Cameron Baird
D. Lin
AAML
44
9
0
09 Sep 2022
Black-box Dataset Ownership Verification via Backdoor Watermarking
Black-box Dataset Ownership Verification via Backdoor Watermarking
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shutao Xia
AAML
37
74
0
04 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
44
12
0
04 Aug 2022
Tackling Spoofing-Aware Speaker Verification with Multi-Model Fusion
Tackling Spoofing-Aware Speaker Verification with Multi-Model Fusion
Haibin Wu
Jiawen Kang
Lingwei Meng
Yang Zhang
Xixin Wu
Zhiyong Wu
Hung-yi Lee
Helen Meng
29
9
0
18 Jun 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
25
4
0
25 Mar 2022
Backdoor Defense via Decoupling the Training Process
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
27
187
0
05 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
38
53
0
31 Jan 2022
Post-Training Detection of Backdoor Attacks for Two-Class and
  Multi-Attack Scenarios
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Zhen Xiang
David J. Miller
G. Kesidis
AAML
33
47
0
20 Jan 2022
Defending against Model Stealing via Verifying Embedded External
  Features
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
43
61
0
07 Dec 2021
A General Framework for Defending Against Backdoor Attacks via Influence
  Graph
A General Framework for Defending Against Backdoor Attacks via Influence Graph
Xiaofei Sun
Jiwei Li
Xiaoya Li
Ziyao Wang
Tianwei Zhang
Han Qiu
Fei Wu
Chun Fan
AAML
TDI
24
5
0
29 Nov 2021
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value
  Analysis
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Junfeng Guo
Ang Li
Cong Liu
AAML
59
74
0
28 Oct 2021
12
Next