{"id":"https://openalex.org/W4401057135","doi":"https://doi.org/10.1007/s10462-024-10863-7","title":"Adaptive unified defense framework for tackling adversarial audio attacks","display_name":"Adaptive unified defense framework for tackling adversarial audio attacks","publication_year":2024,"publication_date":"2024-07-26","ids":{"openalex":"https://openalex.org/W4401057135","doi":"https://doi.org/10.1007/s10462-024-10863-7"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10462-024-10863-7","pdf_url":null,"source":{"id":"https://openalex.org/S122814990","display_name":"Artificial Intelligence Review","issn_l":"0269-2821","issn":["0269-2821","1573-7462"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/s10462-024-10863-7","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022975807","display_name":"Xia Du","orcid":"https://orcid.org/0000-0002-6298-846X"},"institutions":[{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xia Du","raw_affiliation_strings":["School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China","institution_ids":["https://openalex.org/I75867142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109125655","display_name":"Qi Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":true,"raw_author_name":"Qi Zhang","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau SAR, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau SAR, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101429344","display_name":"Jia-Jie Zhu","orcid":"https://orcid.org/0000-0001-8673-1477"},"institutions":[{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajie Zhu","raw_affiliation_strings":["School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China","institution_ids":["https://openalex.org/I75867142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100605601","display_name":"Xiaoyuan Liu","orcid":"https://orcid.org/0000-0001-5253-9313"},"institutions":[{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyuan Liu","raw_affiliation_strings":["School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China","institution_ids":["https://openalex.org/I75867142"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109125655"],"corresponding_institution_ids":["https://openalex.org/I6469544"],"apc_list":{"value":2490,"currency":"EUR","value_usd":3090,"provenance":"doaj"},"apc_paid":{"value":2490,"currency":"EUR","value_usd":3090,"provenance":"doaj"},"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":93},"biblio":{"volume":"57","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9676,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9656,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81343687},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7831353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3591802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35741463}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10462-024-10863-7","pdf_url":null,"source":{"id":"https://openalex.org/S122814990","display_name":"Artificial Intelligence Review","issn_l":"0269-2821","issn":["0269-2821","1573-7462"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10462-024-10863-7","pdf_url":null,"source":{"id":"https://openalex.org/S122814990","display_name":"Artificial Intelligence Review","issn_l":"0269-2821","issn":["0269-2821","1573-7462"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.73,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W117026553","https://openalex.org/W1980264541","https://openalex.org/W1989314204","https://openalex.org/W2135293965","https://openalex.org/W2136682440","https://openalex.org/W2293634267","https://openalex.org/W2798302089","https://openalex.org/W2898435086","https://openalex.org/W2906211136","https://openalex.org/W2917987043","https://openalex.org/W2964301649","https://openalex.org/W2973252307","https://openalex.org/W2981495453","https://openalex.org/W2984968650","https://openalex.org/W3093004624","https://openalex.org/W3093034572","https://openalex.org/W3119831052","https://openalex.org/W3128172745","https://openalex.org/W3200113267","https://openalex.org/W4210780574","https://openalex.org/W4288359148","https://openalex.org/W4382371735"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4310988119","https://openalex.org/W4297672492","https://openalex.org/W4246396837","https://openalex.org/W3191453585","https://openalex.org/W3126451824","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W1561927205"],"abstract_inverted_index":{"Abstract":[0],"Adversarial":[1],"attacks":[2,171],"aimed":[3],"at":[4],"subverting":[5],"recognition":[6,23],"systems":[7,116],"have":[8,29,50],"laid":[9],"bare":[10],"significant":[11],"security":[12],"vulnerabilities":[13,53],"inherent":[14],"in":[15],"deep":[16],"neural":[17],"networks.":[18],"In":[19],"the":[20,73,96,108,121,124,154],"automatic":[21],"speech":[22],"(ASR)":[24],"domain,":[25],"prevailing":[26],"defense":[27,68,138,159,177],"mechanisms":[28],"primarily":[30],"centered":[31],"on":[32],"pre-processing":[33,90],"procedures":[34],"to":[35,71,94,106,134],"mitigate":[36],"adversarial":[37,60,79,101,112,192],"threats":[38],"stemming":[39],"from":[40],"such":[41],"attacks.":[42,61,102,193],"However,":[43],"despite":[44],"their":[45],"initial":[46],"success,":[47],"these":[48],"methods":[49],"shown":[51],"surprising":[52],"when":[54,186],"confronted":[55],"with":[56,188],"robust":[57,77],"and":[58,98,172],"adaptive":[59,66,128,158,191],"This":[62],"paper":[63],"proposes":[64],"an":[65,127,163,180],"unified":[67,89],"framework":[69,82],"tailored":[70],"address":[72],"challenges":[74],"posed":[75],"by":[76],"audio":[78,146,170],"examples.":[80],"The":[81],"comprises":[83],"two":[84,144],"pivotal":[85],"components:":[86],"(1)":[87],"a":[88,149],"mechanism":[91],"is":[92,105,132],"designed":[93],"disrupt":[95],"continuity":[97],"transferability":[99],"of":[100,111,123,156,183],"Its":[103],"objective":[104],"thwart":[107],"consistent":[109],"operation":[110],"examples":[113],"across":[114],"different":[115],"or":[117],"conditions,":[118],"thereby":[119],"enhancing":[120],"robustness":[122],"defense.":[125],"(2)":[126],"ASR":[129,151],"transcription":[130],"method":[131],"proposed":[133],"further":[135],"bolster":[136],"our":[137,157],"strategy.":[139],"Empirical":[140],"experiments":[141],"conducted":[142],"using":[143],"benchmark":[145],"datasets":[147],"within":[148],"state-of-the-art":[150,176],"system":[152],"affirm":[153],"effectiveness":[155],"framework.":[160],"It":[161],"achieves":[162],"impressive":[164],"100%":[165],"accuracy":[166,181],"rate":[167,182],"against":[168],"representative":[169],"consistently":[173],"outperforms":[174],"other":[175],"techniques,":[178],"achieving":[179],"98.5%":[184],"even":[185],"faced":[187],"various":[189],"challenging":[190]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4401057135","counts_by_year":[],"updated_date":"2024-12-19T08:53:47.650740","created_date":"2024-07-31"}