{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:25:31Z","timestamp":1764555931055,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Central Government Guides Local Science and Technology Development Special Funds","award":["[2018]4008"],"award-info":[{"award-number":["[2018]4008"]}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Planned Project of Guizhou Province, China","doi-asserted-by":"publisher","award":["[2020]2Y013"],"award-info":[{"award-number":["[2020]2Y013"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guizhou Postgraduate Research Fund Project","award":["YJSKYJJ [2021]102"],"award-info":[{"award-number":["YJSKYJJ [2021]102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3220639","type":"journal-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T22:40:40Z","timestamp":1667860840000},"page":"118789-118805","source":"Crossref","is-referenced-by-count":9,"title":["A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6484-3611","authenticated-orcid":false,"given":"Xinyu","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"}]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"}]},{"given":"Sicong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"}]},{"given":"Xiaojian","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"1295","article-title":"An SIPCA-WCCN method for SVM-based speaker verification system","author":"long","year":"2008","journal-title":"Proc Int Conf Audio Lang Image Process"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2006.881693"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref31","article-title":"SEC4SR: A security analysis platform for speaker recognition","author":"chen","year":"2021","journal-title":"arXiv 2109 01766"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2983"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409052"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-620"},{"key":"ref35","article-title":"Interpreting and explaining deep neural networks for classification of audio signals","author":"becker","year":"2018","journal-title":"arXiv 1807 03418"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02073.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00210"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref15","first-page":"49","article-title":"CommanderSong: A systematic approach for practical adversarial voice recognition","author":"yuan","year":"2018","journal-title":"Proc Usenix Secur Symp"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00016"},{"key":"ref17","article-title":"Adversarial black-box attacks on automatic speech recognition systems using multi-objective evolutionary optimization","author":"khare","year":"2018","journal-title":"arXiv 1811 01312"},{"key":"ref18","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413760"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2457"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2016.7581588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.8015083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1955"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3090109"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413851"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SLT48900.2021.9383529"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2928143"},{"key":"ref1","first-page":"11","article-title":"Text-independent speaker verification based on triplet convolutional neural network embeddings","volume":"26","author":"zhang","year":"2018","journal-title":"IEEE Transactions on Audio Speech and Language Processing"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref22","article-title":"Defensive quantization: When efficiency me ETS robustness","author":"lin","year":"2019","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref21","article-title":"Countering adversarial images using input transformations","author":"guo","year":"2018","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101199"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2874243"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053076"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09941069.pdf?arnumber=9941069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T20:02:31Z","timestamp":1670875351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9941069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3220639","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}