Speech Recognition Process

Security and Privacy Problems in Voice Assistant Applications: A Survey

Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19
Backdoor Attack
Privacy Analysis
Speech Recognition Process

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26
Performance Evaluation
Attack Method
Speech Recognition Process

Generative Extraction of Audio Classifiers for Speaker Identification

Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26
Dataset Generation
Model Performance Evaluation
Speech Recognition Process

Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees

Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16
Privacy Protection Method
Information-Theoretic Privacy
Speech Recognition Process

Adversarial attacks and defenses in Speaker Recognition Systems: A survey

Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27
Adversarial Example
Adversarial Attack Methods
Speech Recognition Process

End-to-end anti-spoofing with RawNet2

Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16
Detection of Deepfakes
Model Evaluation
Speech Recognition Process

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03
Certified Robustness
Adversarial Example Detection
Speech Recognition Process

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09
Data Privacy Management
Privacy Enhancing Technology
Speech Recognition Process