{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:43:58Z","timestamp":1768520638181,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T00:00:00Z","timestamp":1620172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T00:00:00Z","timestamp":1620172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T00:00:00Z","timestamp":1620172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2019YFB1706000"],"award-info":[{"award-number":["2019YFB1706000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,5]]},"DOI":"10.1109\/cscwd49262.2021.9437669","type":"proceedings-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T20:48:36Z","timestamp":1622234916000},"page":"907-912","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Trojan Attack against Co-learning Based ASR DNN System"],"prefix":"10.1109","author":[{"given":"Mingxuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongdong","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yazhe","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.58"},{"key":"ref11","first-page":"1764","article-title":"Towards end-to-end speech recognition with recurrent neural networks","author":"graves","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref12","author":"muda","year":"2010","journal-title":"Voice Recognition Algorithms Using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2134090"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953075"},{"key":"ref15","author":"yuan","year":"2018","journal-title":"Commandersong A systematic approach for practical adversarial voice recognition"},{"key":"ref16","author":"kong","year":"2019","journal-title":"Adversarial Audio A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref18","author":"chen","year":"2017","journal-title":"Targeted backdoor attacks on deep learning systems using data poisoning"},{"key":"ref19","author":"liu","year":"2017","journal-title":"Trojaning Attack on Neural Networks"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref3","article-title":"Machine learning","volume":"13","author":"michie","year":"1994","journal-title":"Neural and Statistical Classification"},{"key":"ref6","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref5","author":"kone?ny","year":"2016","journal-title":"Federated learning Strategies for improving communication efficiency"},{"key":"ref8","author":"gu","year":"2017","journal-title":"BadNets Identifying vulnerabilities in the machine learning model supply chain"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1991.139758"},{"key":"ref1","article-title":"The kaldi speech recognition toolkit","author":"povey","year":"0","journal-title":"IEEE 2011 workshop on automatic speech recognition and understanding no CONF IEEE Signal Processing Society"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/29.45616"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3115\/1075527.1075614"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11939993_73"},{"key":"ref21","article-title":"Spontaneous speech corpus of japanese","volume":"2","author":"maekawa","year":"0","journal-title":"Proceedings of LREC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1456"}],"event":{"name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","location":"Dalian, China","start":{"date-parts":[[2021,5,5]]},"end":{"date-parts":[[2021,5,7]]}},"container-title":["2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9437608\/9437628\/09437669.pdf?arnumber=9437669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:52Z","timestamp":1652197312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9437669\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cscwd49262.2021.9437669","relation":{},"subject":[],"published":{"date-parts":[[2021,5,5]]}}}