{"id":"https://openalex.org/W4390188864","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361513","title":"Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas","display_name":"Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188864","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361513"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361513","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101483420","display_name":"Yu Jiang","orcid":"https://orcid.org/0000-0002-2853-734X"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Jiang","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067472801","display_name":"Luopu Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luopu Liang","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090335612","display_name":"Qianmu Li","orcid":"https://orcid.org/0000-0002-0998-1517"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianmu Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":"41","issue":null,"first_page":"0860","last_page":"0867"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9811,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9658,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.66144806},{"id":"https://openalex.org/keywords/adversarial-examples","display_name":"Adversarial Examples","score":0.5061}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8111223},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541811},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.66144806},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.58759695},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44929236},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.44907126},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43198127},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42796326},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39764875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31056148},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361513","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1979104916","https://openalex.org/W1993974867","https://openalex.org/W2037646045","https://openalex.org/W2243397390","https://openalex.org/W2543927648","https://openalex.org/W2618530766","https://openalex.org/W2759071281","https://openalex.org/W2777715678","https://openalex.org/W2963058500","https://openalex.org/W2963542245","https://openalex.org/W2964301649","https://openalex.org/W2973252307","https://openalex.org/W3088377098","https://openalex.org/W3122298224","https://openalex.org/W4300824008","https://openalex.org/W4308642081","https://openalex.org/W4313387422","https://openalex.org/W4320017454"],"related_works":["https://openalex.org/W4377865163","https://openalex.org/W4246396837","https://openalex.org/W3191453585","https://openalex.org/W3184396788","https://openalex.org/W3126451824","https://openalex.org/W3037859390","https://openalex.org/W3009622996","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W1561927205"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"technology":[2],"has":[3],"been":[4],"widely":[5],"used":[6],"in":[7,49,208],"many":[8],"fields":[9],"related":[10],"to":[11,31,39,71,86,111,154,160,166],"people's":[12],"life.":[13],"However,":[14],"current":[15,191],"research":[16],"shows":[17],"that":[18],"speech":[19,82,99,123,130,142,186,192,204],"recognition":[20,83,187],"models":[21],"designed":[22],"based":[23,103,133],"on":[24,104,134,183],"deep":[25],"neural":[26],"networks":[27],"are":[28,37],"extremely":[29,89],"susceptible":[30],"adversarial":[32,63,74,79,100,205],"samples.":[33,75],"Black-box":[34],"attack":[35,46,56,101,109,117,124,131,143,163,169,206],"methods":[36,207],"closer":[38],"the":[40,44,62,73,113,146,156,168,177,200,209],"actual":[41],"situation,":[42],"but":[43],"black-box":[45,78,122,203],"techniques":[47],"now":[48],"use":[50],"have":[51],"drawbacks":[52],"such":[53],"as":[54],"low":[55,116],"success":[57,118,178],"rate,":[58],"easy":[59],"perception":[60],"of":[61,115,120,180,202],"samples":[64],"by":[65],"humans,":[66],"and":[67,107,194],"more":[68],"iterations":[69],"required":[70],"generate":[72],"Therefore,":[76],"constructing":[77],"examples":[80],"for":[81,199],"systems":[84],"continues":[85],"be":[87],"an":[88],"difficult":[90],"challenge.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95,149],"propose":[96],"a":[97,129,135,140,151,161,185,196],"blackbox":[98],"method":[102,132,164],"genetic":[105,136,157],"algorithm":[106,137,158],"generalized":[108],"idea":[110,198],"address":[112],"problem":[114],"rate":[119,179],"existing":[121],"methods.":[125],"By":[126],"effectively":[127,175],"combining":[128],"design":[138,201],"with":[139,189],"general":[141,162],"method,":[144],"at":[145],"same":[147],"time,":[148],"designe":[150],"switching":[152],"condition":[153],"switch":[155],"module":[159,165],"continue":[167],"process":[170],"under":[171],"certain":[172],"conditions.":[173],"This":[174],"improves":[176],"targeted":[181],"attacks":[182],"DeepSpeech,":[184],"model":[188],"good":[190],"recognition,":[193],"provides":[195],"new":[197],"future.":[210]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188864","counts_by_year":[],"updated_date":"2024-11-22T20:23:09.579344","created_date":"2023-12-26"}