{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:27:05Z","timestamp":1768523225846,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/icassp.2018.8462693","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T22:24:48Z","timestamp":1537568688000},"page":"1962-1966","source":"Crossref","is-referenced-by-count":123,"title":["Fooling End-To-End Speaker Verification With Adversarial Examples"],"prefix":"10.1109","author":[{"given":"Felix","family":"Kreuk","sequence":"first","affiliation":[]},{"given":"Yossi","family":"Adi","sequence":"additional","affiliation":[]},{"given":"Moustapha","family":"Cisse","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Keshet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Sequence segmentation using joint rnn and structured prediction models","author":"adi","year":"2017","journal-title":"ICASSP"},{"key":"ref11","author":"bahdanau","year":"2014","journal-title":"Neural machine translation by jointly learning to align and translate"},{"key":"ref12","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref13","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref14","author":"papernot","year":"2016","journal-title":"Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples"},{"key":"ref15","article-title":"Exploring the space of adversarial images","author":"tabacof","year":"2016","journal-title":"IJCNN"},{"key":"ref16","author":"shaham","year":"2015","journal-title":"Understanding adversarial training Increasing local stability of neural nets through robust optimization"},{"key":"ref17","article-title":"Robustness of classifiers: from adversarial to random noise","author":"fawzi","year":"2016","journal-title":"NIPS"},{"key":"ref18","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","author":"papernot","year":"2016","journal-title":"IEEE SP"},{"key":"ref19","article-title":"Parseval networks: Improving robustness to adversarial examples","author":"cisse","year":"2017","journal-title":"ICML"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2017-620","article-title":"Deep neural network embed-dings for text-independent speaker verification","author":"snyder","year":"2017","journal-title":"Proc INTERSPEECH"},{"key":"ref4","article-title":"End-to-end text-dependent speaker verification","author":"heigold","year":"2016","journal-title":"ICASSP"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164317"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref6","article-title":"Deep residual learning for image recognition","author":"he","year":"2016","journal-title":"CVPR"},{"key":"ref5","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"NIPS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"ref7","article-title":"Deep speech 2: End-to-end speech recognition in english and mandarin","author":"amodei","year":"2016","journal-title":"ICML"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref9","article-title":"Vowel duration measurement using deep neural networks","author":"adi","year":"2015","journal-title":"IEEE MLSP"},{"key":"ref1","first-page":"14","article-title":"Bayesian speaker verification with heavy-tailed priors","author":"kenny","year":"2010","journal-title":"Odyssey"},{"key":"ref20","article-title":"Houdini: Fooling deep structured visual and speech recognition models with adversarial examples","author":"cisse","year":"2017","journal-title":"NIPS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref24","article-title":"End-to-end attention based text-dependent speaker verification","author":"zhang","year":"2016","journal-title":"SLT"},{"key":"ref23","article-title":"Deep neural network-based speaker embeddings for end-to-end speaker verification","author":"snyder","year":"2016","journal-title":"SLT"},{"key":"ref26","article-title":"Ntimit: A phonetically balanced, continuous speech, telephone bandwidth speech database","author":"jankowski","year":"1990","journal-title":"ICASSP"},{"key":"ref25","article-title":"Testing with the yoho cd-rom voice verification corpus","author":"campbell","year":"1995","journal-title":"ICASSP"}],"event":{"name":"ICASSP 2018 - 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Calgary, AB","start":{"date-parts":[[2018,4,15]]},"end":{"date-parts":[[2018,4,20]]}},"container-title":["2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8450881\/8461260\/08462693.pdf?arnumber=8462693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:20:37Z","timestamp":1598224837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8462693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icassp.2018.8462693","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}