Generating Transferable Adversarial Examples for Speech Classification

被引:12
|
作者
Kim, Hoki [1 ]
Park, Jinseong [1 ]
Lee, Jaewook [1 ]
机构
[1] Seoul Natl Univ, Gwanakro 1, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Speech classification; Adversarial attack; Transferability;
D O I
10.1016/j.patcog.2022.109286
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the success of deep neural networks, the existence of adversarial attacks has revealed the vul-nerability of neural networks in terms of security. Adversarial attacks add subtle noise to the original example, resulting in a false prediction. Although adversarial attacks have been mainly studied in the im-age domain, a recent line of research has discovered that speech classification systems are also exposed to adversarial attacks. By adding inaudible noise, an adversary can deceive speech classification systems and cause fatal issues in various applications, such as speaker identification and command recognition tasks. However, research on the transferability of audio adversarial examples is still limited. Thus, in this study, we first investigate the transferability of audio adversarial examples with different structures and conditions. Through extensive experiments, we discover that the transferability of audio adversarial ex-amples is related to their noise sensitivity. Based on the analyses, we present a new adversarial attack called noise injected attack that generates highly transferable audio adversarial examples by injecting ad-ditive noise during the gradient ascent process. Our experimental results demonstrate that the proposed method outperforms other adversarial attacks in terms of transferability.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Generating Natural Language Adversarial Examples
    Alzantot, Moustafa
    Sharma, Yash
    Elgohary, Ahmed
    Ho, Bo-Jhang
    Srivastava, Mani B.
    Chang, Kai-Wei
    2018 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2018), 2018, : 2890 - 2896
  • [22] Generating Adversarial Examples With Shadow Model
    Zhang, Rui
    Xia, Hui
    Hu, Chunqiang
    Zhang, Cheng
    Liu, Chao
    Xiao, Fu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6283 - 6289
  • [23] Towards Transferable Unrestricted Adversarial Examples with Minimum Changes
    Liu, Fangcheng
    Zhang, Chao
    Zhang, Hongyang
    2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 327 - 338
  • [24] Direction-aggregated Attack for Transferable Adversarial Examples
    Huang, Tianjin
    Menkovski, Vlado
    Pei, Yulong
    Wang, Yuhao
    Pechenizkiy, Mykola
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (03)
  • [25] Push & Pull: Transferable Adversarial Examples With Attentive Attack
    Gao, Lianli
    Huang, Zijie
    Song, Jingkuan
    Yang, Yang
    Shen, Heng Tao
    IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 24 : 2329 - 2338
  • [26] Playing the Part of the Sharp Bully: Generating Adversarial Examples for Implicit Hate Speech Detection
    Ocampo, Nicolas Benjamin
    Cabrio, Elena
    Villata, Serena
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, 2023, : 2758 - 2772
  • [27] Generating Transferable Adversarial Point Clouds via Autoencoders for 3D Object Classification
    Xu, Mengyao
    Chen, Hai
    Zhang, Chonghao
    Zou, Yuanjun
    Xu, Chenchu
    Zhang, Yanping
    Qian, Fulan
    IET COMPUTER VISION, 2025, 19 (01)
  • [28] Structure Matters: Towards Generating Transferable Adversarial Images
    Peng, Dan
    Zheng, Zizhan
    Luo, Linhao
    Zhang, Xiaofeng
    ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 1419 - 1426
  • [29] Adversarial transformation network with adaptive perturbations for generating adversarial examples
    Zhang, Guoyin
    Da, Qingan
    Li, Sizhao
    Sun, Jianguo
    Wang, Wenshan
    Hu, Qing
    Lu, Jiashuai
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2022, 20 (02) : 94 - 103
  • [30] Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks
    Tang, Pengfei
    Wang, Wenjie
    Lou, Jian
    Xiong, Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4145 - 4155