A Practical Black-Box Attack Against Autonomous Speech Recognition Model

被引:0
|
作者
Fan, Wenshu [1 ]
Li, Hongwei [1 ,2 ]
Jiang, Wenbo [1 ]
Xu, Guowen [1 ]
Lu, Rongxing [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[2] Cyberspace Secur Res Ctr, Peng Cheng Lab, Shenzhen 518000, Peoples R China
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Machine Learning; Automatic Speech Recognition; Differential Evolution; Black-Box Attack;
D O I
10.1109/GLOBECOM42002.2020.9348184
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the wild applications of machine learning (ML) technology, automatic speech recognition (ASR) has made great progress in recent years. Despite its great potential, there are various evasion attacks of ML-based ASR, which could affect the security of applications built upon ASR. Up to now, most studies focus on white-box attacks in ASR, and there is almost no attention paid to black-box attacks where attackers can only query the target model to get output labels rather than probability vectors in audio domain. In this paper, we propose an evasion attack against ASR in the above-mentioned situation, which is more feasible in realistic scenarios. Specifically, we first train a substitute model by using data augmentation, which ensures that we have enough samples to train with a small number of times to query the target model. Then, based on the substitute model, we apply Differential Evolution (DE) algorithm to craft adversarial examples and implement black-box attack against ASR models from the Speech Commands dataset. Extensive experiments are conducted, and the results illustrate that our approach achieves untargeted attacks with over 70% success rate while still maintaining the authenticity of the original data well.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Black-box Adaptation of ASR for Accented Speech
    Khandelwal, Kartik
    Jyothi, Preethi
    Awasthi, Abhijeet
    Sarawagi, Sunita
    INTERSPEECH 2020, 2020, : 1281 - 1285
  • [42] Practical Relative Degree in Black-Box Control
    Levant, Arie
    2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2012, : 7101 - 7106
  • [43] A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
    LYU Haoran
    TAN Yu'an
    XUE Yuan
    WANG Yajie
    XUE Jingfeng
    Chinese Journal of Electronics, 2021, 30 (03) : 406 - 412
  • [44] A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
    Lyu Haoran
    Tan Yu'an
    Xue Yuan
    Wang Yajie
    Xue Jingfeng
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 406 - 412
  • [45] Black-box attack against GAN-generated image detector with contrastive perturbation
    Lou, Zijie
    Cao, Gang
    Lin, Man
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 124
  • [46] attackGAN: Adversarial Attack against Black-box IDS using Generative Adversarial Networks
    Zhao, Shuang
    Li, Jing
    Wang, Jianmin
    Zhang, Zhao
    Zhu, Lin
    Zhang, Yong
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 128 - 133
  • [47] Secure Semantic Communication Model for Black-Box Attack Challenge Under Metaverse
    Li, Chang
    Zeng, Liang
    Huang, Xin
    Miao, Xiaqing
    Wang, Shuai
    IEEE WIRELESS COMMUNICATIONS, 2023, 30 (04) : 56 - 62
  • [48] DeeBBAA: A Benchmark Deep Black-Box Adversarial Attack Against CyberPhysical Power Systems
    Bhattacharjee, Arnab
    Bai, Guangdong
    Tushar, Wayes
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40670 - 40688
  • [49] Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
    Chen, Yuxuan
    Yuan, Xuejing
    Zhang, Jiangshan
    Zhao, Yue
    Zhang, Shengzhi
    Chen, Kai
    Wang, XiaoFeng
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2667 - 2684
  • [50] SUBSTITUTE MODEL GENERATION FOR BLACK-BOX ADVERSARIAL ATTACK BASED ON KNOWLEDGE DISTILLATION
    Cui, Weiyu
    Li, Xiaorui
    Huang, Jiawei
    Wang, Wenyi
    Wang, Shuai
    Chen, Jianwen
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 648 - 652