Backdoor Attacks against Voice Recognition Systems: A Survey
Abstract
References
Index Terms
- Backdoor Attacks against Voice Recognition Systems: A Survey
Recommendations
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review
Since the emergence of security concerns in artificial intelligence (AI), there has been significant attention devoted to the examination of backdoor attacks. Attackers can utilize backdoor attacks to manipulate model predictions, leading to significant ...
Natural Backdoor Attacks on Speech Recognition Models
Machine Learning for Cyber SecurityAbstractWith the rapid development of deep learning, its vulnerability has gradually emerged in recent years. This work focuses on backdoor attacks on speech recognition systems. We adopt sounds that are ordinary in nature or in our daily life as triggers ...
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and NetworkingSpeaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to compromise the SV models. Different from previous attacks, we focus ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Survey
Funding Sources
- National Natural Science Foundation of China
- Key Research Project of Shaanxi Natural Science Foundation
- Concept Verification Funding of Hangzhou Institute of Technology of Xidian University
- 111 Project
- Fundamental Research Funds for the Central Universities
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 435Total Downloads
- Downloads (Last 12 months)435
- Downloads (Last 6 weeks)208
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in