{"id":"https://openalex.org/W3093004624","doi":"https://doi.org/10.1145/3394171.3413603","title":"A Unified Framework for Detecting Audio Adversarial Examples","display_name":"A Unified Framework for Detecting Audio Adversarial Examples","publication_year":2020,"publication_date":"2020-10-12","ids":{"openalex":"https://openalex.org/W3093004624","doi":"https://doi.org/10.1145/3394171.3413603","mag":"3093004624"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394171.3413603","pdf_url":null,"source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022975807","display_name":"Xia Du","orcid":"https://orcid.org/0000-0002-6298-846X"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Xia Du","raw_affiliation_strings":["University of Macau, Macau, Macao"],"affiliations":[{"raw_affiliation_string":"University of Macau, Macau, Macao","institution_ids":["https://openalex.org/I204512498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005772506","display_name":"Chi\u2010Man Pun","orcid":"https://orcid.org/0000-0003-1788-3746"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Chi-Man Pun","raw_affiliation_strings":["University of Macau, Macau, Macao"],"affiliations":[{"raw_affiliation_string":"University of Macau, Macau, Macao","institution_ids":["https://openalex.org/I204512498"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100459168","display_name":"Zheng Zhang","orcid":"https://orcid.org/0000-0003-1470-6998"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN","MO"],"is_corresponding":false,"raw_author_name":"Zheng Zhang","raw_affiliation_strings":["Harbin Institute of Technology & University of Macau, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology & University of Macau, Shenzhen, China","institution_ids":["https://openalex.org/I204512498","https://openalex.org/I204983213"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.713,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.80582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"3986","last_page":"3994"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9502,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/padding","display_name":"Padding","score":0.5755053}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8338017},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6579523},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.61016},{"id":"https://openalex.org/C165435473","wikidata":"https://www.wikidata.org/wiki/Q1509884","display_name":"Padding","level":2,"score":0.5755053},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.53178406},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4786495},{"id":"https://openalex.org/C95851461","wikidata":"https://www.wikidata.org/wiki/Q468809","display_name":"Reverberation","level":2,"score":0.4489594},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4263953},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15818891},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07628539},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394171.3413603","pdf_url":null,"source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.74,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":37,"referenced_works":["https://openalex.org/W170745494","https://openalex.org/W1980264541","https://openalex.org/W1989314204","https://openalex.org/W2034190452","https://openalex.org/W2117678320","https://openalex.org/W2125908420","https://openalex.org/W2128073546","https://openalex.org/W2128600649","https://openalex.org/W2135293965","https://openalex.org/W2136682440","https://openalex.org/W2143612262","https://openalex.org/W2151298633","https://openalex.org/W2165630397","https://openalex.org/W2171313960","https://openalex.org/W2245569228","https://openalex.org/W2535438430","https://openalex.org/W2593390416","https://openalex.org/W2604505099","https://openalex.org/W2763188033","https://openalex.org/W2798302089","https://openalex.org/W2898435086","https://openalex.org/W2906211136","https://openalex.org/W2916239775","https://openalex.org/W2917987043","https://openalex.org/W2919115771","https://openalex.org/W2944113786","https://openalex.org/W2959546144","https://openalex.org/W2963685823","https://openalex.org/W2964301649","https://openalex.org/W2969664989","https://openalex.org/W2970115835","https://openalex.org/W2973252307","https://openalex.org/W2982109374","https://openalex.org/W2984968650","https://openalex.org/W41404523","https://openalex.org/W4214671568","https://openalex.org/W569478347"],"related_works":["https://openalex.org/W4384947563","https://openalex.org/W4322753435","https://openalex.org/W4315882065","https://openalex.org/W4287587694","https://openalex.org/W4244331477","https://openalex.org/W4243974052","https://openalex.org/W4236539272","https://openalex.org/W4231428344","https://openalex.org/W2946726629","https://openalex.org/W2142641794"],"abstract_inverted_index":{"Adversarial":[0],"attacks":[1,28,58,172],"have":[2],"been":[3],"widely":[4],"recognized":[5],"as":[6],"the":[7,33,38,61,64,101,106,117,131,134,146,150,154,158,169,179,204,211],"security":[8],"vulnerability":[9],"of":[10,40,125,133,153],"deep":[11,16],"neural":[12],"networks,":[13],"especially":[14,59],"in":[15,149,173],"automatic":[17],"speech":[18,156],"recognition":[19],"(ASR)":[20],"systems.":[21],"The":[22,195],"advanced":[23],"detection":[24,65,75,126],"methods":[25,45],"against":[26],"adversarial":[27,41,50,74,81,135],"mainly":[29],"focus":[30],"on":[31],"pre-processing":[32],"input":[34,155],"audio":[35,80,206],"to":[36,54,99,115,129],"alleviate":[37],"threat":[39],"noise.":[42],"Although":[43],"these":[44],"could":[46],"detect":[47],"some":[48],"simplex":[49],"attacks,":[51],"they":[52],"fail":[53],"handle":[55],"robust":[56,170,214],"complex":[57],"when":[60],"attacker":[62],"knows":[63],"details.":[66],"In":[67],"this":[68],"paper,":[69],"we":[70,137],"propose":[71],"a":[72,91,139],"unified":[73],"framework":[76],"for":[77,210],"detecting":[78],"adaptive":[79,93,171,175,212],"examples,":[82],"which":[83,144],"combines":[84],"noise":[85],"padding":[86,142],"with":[87,110],"sound":[88],"reverberation.":[89],"Specifically,":[90],"well-designed":[92],"artificial":[94,107],"utterances":[95,108],"generator":[96],"is":[97,182],"proposed":[98,164],"balance":[100],"design":[102],"complexity,":[103],"such":[104],"that":[105,199],"(speech":[109],"reverberation)":[111],"are":[112],"efficiently":[113],"determined":[114],"reduce":[116],"false":[118,122],"positive":[119],"rate":[120,124],"and":[121,213],"negative":[123],"results.":[127],"Moreover,":[128],"destroy":[130],"continuity":[132],"noise,":[136],"develop":[138],"novel":[140],"multi-noise":[141],"strategy,":[143],"implants":[145],"Gaussian":[147],"noises":[148],"silent":[151],"fragments":[152],"by":[157],"voice":[159],"activity":[160],"detector.":[161],"Furthermore,":[162],"our":[163,200],"method":[165,201],"can":[166],"effectively":[167],"tackle":[168],"an":[174],"learning":[176],"manner.":[177],"Importantly,":[178],"conceived":[180],"system":[181],"easily":[183],"embedded":[184],"into":[185],"any":[186],"ASR":[187],"models":[188],"without":[189],"requiring":[190],"additional":[191],"retraining":[192],"or":[193],"modification.":[194],"experimental":[196],"results":[197],"show":[198],"consistently":[202],"outperforms":[203],"state-of-the-art":[205],"defense":[207],"methods,":[208],"even":[209],"attacks.":[215]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3093004624","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2025-01-03T01:31:43.381716","created_date":"2020-10-22"}