{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T04:04:28Z","timestamp":1776485068174,"version":"3.51.2"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) Grant"},{"DOI":"10.13039\/501100014188","name":"Korean Government","doi-asserted-by":"publisher","award":["2022-0-00984"],"award-info":[{"award-number":["2022-0-00984"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"National Research Foundation of Korea (NRF) Grant funded by the Korean Government","doi-asserted-by":"publisher","award":["2019R1A2C2002358"],"award-info":[{"award-number":["2019R1A2C2002358"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"National Research Foundation of Korea (NRF) Grant funded by the Korean Government","doi-asserted-by":"publisher","award":["2022R1A5A6000840"],"award-info":[{"award-number":["2022R1A5A6000840"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3234110","type":"journal-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:33:03Z","timestamp":1672857183000},"page":"2351-2360","source":"Crossref","is-referenced-by-count":4,"title":["Exploring Diverse Feature Extractions for Adversarial Audio Detection"],"prefix":"10.1109","volume":"11","author":[{"given":"Yujin","family":"Choi","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering, Seoul National University, Seoul, South Korea"}]},{"given":"Jinseong","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5720-8337","authenticated-orcid":false,"given":"Jaewook","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5361-459X","authenticated-orcid":false,"given":"Hoki","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Seoul National University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2019.8923404"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/hve2.12221"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639345"},{"key":"ref4","article-title":"Deep speech: Scaling up end-to-end speech recognition","author":"Hannun","year":"2014","journal-title":"arXiv:1412.5567"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1873"},{"key":"ref6","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref10","article-title":"Did you hear that? Adversarial examples against automatic speech recognition","author":"Alzantot","year":"2018","journal-title":"arXiv:1801.00554"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"ref13","article-title":"Houdini: Fooling deep structured prediction models","author":"Cisse","year":"2017","journal-title":"arXiv:1707.05373"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006130"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1846"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413603"},{"key":"ref17","first-page":"173","article-title":"Deep speech 2: End-to-end speech recognition in English and Mandarin","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Amodei"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951856"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3115608"},{"key":"ref20","first-page":"12449","article-title":"Wav2vec 2.0: A framework for self-supervised learning of speech representations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Baevski"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747242"},{"key":"ref22","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref24","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016","journal-title":"arXiv:1605.07277"},{"key":"ref25","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"Liu","year":"2016","journal-title":"arXiv:1611.02770"},{"key":"ref26","first-page":"10934","article-title":"Improving black-box adversarial attacks with a transfer-based prior","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Cheng"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16989"},{"key":"ref28","first-page":"19655","article-title":"Hydra: Pruning adversarially robust neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Sehwag"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3169217"},{"key":"ref30","article-title":"On the (statistical) detection of adversarial examples","author":"Grosse","year":"2017","journal-title":"arXiv:1702.06280"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00496"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965184"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2018.8642623"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363246"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485912"},{"key":"ref36","article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","author":"Warden","year":"2018","journal-title":"arXiv:1804.03209"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref38","volume-title":"CSTR VCTK corpus: English multi-speaker corpus for cstr voice cloning toolkit (version 0.92)","author":"Yamagishi","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref43","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref44","article-title":"Torchattacks: A PyTorch repository for adversarial attacks","author":"Kim","year":"2020","journal-title":"arXiv:2010.01950"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10005309.pdf?arnumber=10005309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T02:51:08Z","timestamp":1707447068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10005309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3234110","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}