This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, we make the backdoor attack challenging to detect for legitimate users and, consequently, potentially more dangerous. We conduct experiments on two versions of a speech dataset and three neural networks and explore the performance of our attack concerning the duration, position, and type of the trigger. Our results indicate that less than 1% of poisoned data is sufficient to deploy a backdoor attack and reach a 100% attack success rate. We observed that short, non-continuous triggers result in highly successful attacks. Still, since our trigger is inaudible, it can be as long as possible without raising any suspicion...
A common method to prevent automated abuses of Internet services is utilizing challenge-response tes...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Machine Learning as a Service (MLaaS) has gained popularity due to advancements in machine learning....
Deep learning has made tremendous success in the past decade. As a result, it is becoming widely dep...
The practical implications of issuing inaudible voice commands. The research mapped each attack vect...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
While deep learning techniques have achieved great success in modern digital products, researchers h...
Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturba...
Backdoor attacks are rapidly emerging threats to deep neural networks (DNNs). In the backdoor attack...
The backdoor attack has become an emerging threat for Natural Language Processing (NLP) systems. A v...
Abstract Voice interfaces are becoming more ubiquitous and are now the primary input method for many...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
With the success of deep learning algorithms in various domains, studying adversarial attacks to sec...
A common method to prevent automated abuses of Internet services is utilizing challenge-response tes...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Machine Learning as a Service (MLaaS) has gained popularity due to advancements in machine learning....
Deep learning has made tremendous success in the past decade. As a result, it is becoming widely dep...
The practical implications of issuing inaudible voice commands. The research mapped each attack vect...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
While deep learning techniques have achieved great success in modern digital products, researchers h...
Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturba...
Backdoor attacks are rapidly emerging threats to deep neural networks (DNNs). In the backdoor attack...
The backdoor attack has become an emerging threat for Natural Language Processing (NLP) systems. A v...
Abstract Voice interfaces are becoming more ubiquitous and are now the primary input method for many...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
With the success of deep learning algorithms in various domains, studying adversarial attacks to sec...
A common method to prevent automated abuses of Internet services is utilizing challenge-response tes...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible a...