Transferable Adversarial Attacks Against ASR

被引:0
|
作者
Gao, Xiaoxue [1 ]
Li, Zexin [2 ]
Chen, Yiming [3 ]
Liu, Cong [2 ]
Li, Haizhou [4 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore 138632, Singapore
[2] Univ Calif Riverside, Riverside, CA 92521 USA
[3] Natl Univ Singapore, Singapore 117583, Singapore
[4] Chinese Univ Hong Kong, Shenzhen Res Inst Big Data, Shenzhen 518172, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial attacks; speech recognition; SPEECH RECOGNITION;
D O I
10.1109/LSP.2024.3443711
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Given the extensive research and real-world applications of automatic speech recognition (ASR), ensuring the robustness of ASR models against minor input perturbations becomes a crucial consideration for maintaining their effectiveness in real-time scenarios. Previous explorations into ASR model robustness have predominantly revolved around evaluating accuracy on white-box settings with full access to ASR models. Nevertheless, full ASR model details are often not available in real-world applications. Therefore, evaluating the robustness of black-box ASR models is essential for a comprehensive understanding of ASR model resilience. In this regard, we thoroughly study the vulnerability of practical black-box attacks in cutting-edge ASR models and propose to employ two advanced time-domain-based transferable attacks alongside our differentiable feature extractor. We also propose a speech-aware gradient optimization approach (SAGO) for ASR, which forces mistranscription with minimal impact on human imperceptibility through voice activity detection rule and a speech-aware gradient-oriented optimizer. Our comprehensive experimental results reveal performance enhancements compared to baseline approaches across five models on two databases.
引用
收藏
页码:2200 / 2204
页数:5
相关论文
共 50 条
  • [1] Feature-aware transferable adversarial attacks against image classification
    Cheng, Shuyan
    Li, Peng
    Han, Keji
    Xu, He
    APPLIED SOFT COMPUTING, 2024, 161
  • [2] Transferable Adversarial Attacks against Automatic Modulation Classifier in Wireless Communications
    Hu, Lin
    Jiang, Han
    Li, Wen
    Han, Hao
    Yang, Yang
    Jiao, Yutao
    Wang, Haichao
    Xu, Yuhua
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [3] Towards universal and transferable adversarial attacks against network traffic classification
    Ding, Ruiyang
    Sun, Lei
    Zang, Weifei
    Dai, Leyu
    Ding, Zhiyi
    Xu, Bayi
    COMPUTER NETWORKS, 2024, 254
  • [4] Chunking Defense for Adversarial Attacks on ASR
    Shao, Yiwen
    Villalba, Jesus
    Joshi, Sonal
    Kataria, Saurabh
    Khudanpur, Sanjeev
    Dehak, Najim
    INTERSPEECH 2022, 2022, : 5045 - 5049
  • [5] Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
    Li, Zexin
    Yin, Bangjie
    Yao, Taiping
    Guo, Junfeng
    Ding, Shouhong
    Chen, Simin
    Liu, Cong
    2023 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2023, : 24626 - 24637
  • [6] Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination
    Liu, Xinlei
    Xie, Jichao
    Hu, Tao
    Yi, Peng
    Hu, Yuxiang
    Huo, Shumin
    Zhang, Zhen
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (02)
  • [7] Towards Transferable Adversarial Attacks on Vision Transformers
    Wei, Zhipeng
    Chen, Jingjing
    Goldblum, Micah
    Wu, Zuxuan
    Goldstein, Tom
    Jiang, Yu-Gang
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 2668 - 2676
  • [8] ADAPTIVE WARPING NETWORK FOR TRANSFERABLE ADVERSARIAL ATTACKS
    Son, Minji
    Kwon, Myung-Joon
    Kim, Hee-Seon
    Byun, Junyoung
    Cho, Seungju
    Kim, Changick
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 3056 - 3060
  • [9] Towards Transferable Adversarial Attacks with Centralized Perturbation
    Wu, Shangbo
    Tan, Yu-an
    Wang, Yajie
    Ma, Ruinan
    Ma, Wencong
    Li, Yuanzhang
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 6, 2024, : 6109 - 6116
  • [10] Toward Transferable Adversarial Attacks Against Autoencoder-Based Network Intrusion Detectors
    Zhang, Yihang
    Wu, Yingwen
    Huang, Xiaolin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (12) : 13863 - 13872