{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:46:39Z","timestamp":1776152799976,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10889070","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:02Z","timestamp":1741799702000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring"],"prefix":"10.1109","author":[{"given":"Yujun","family":"Zhang","sequence":"first","affiliation":[{"name":"Beihang University,State Key Laboratory of Complex &amp; Critical Software Environment,China"}]},{"given":"Yanqu","family":"Chen","sequence":"additional","affiliation":[{"name":"Beihang University,State Key Laboratory of Complex &amp; Critical Software Environment,China"}]},{"given":"Jiakai","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory,China"}]},{"given":"Jin","family":"Hu","sequence":"additional","affiliation":[{"name":"Beihang University,State Key Laboratory of Complex &amp; Critical Software Environment,China"}]},{"given":"Renshuai","family":"Tao","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University,School of Computer and Information Technology,China"}]},{"given":"Xianglong","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University,State Key Laboratory of Complex &amp; Critical Software Environment,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Automatic speech recognition: A deep learning approach","author":"Yu","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21437\/chime.2023-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461404"},{"key":"ref6","article-title":"Deep speech: Scaling up end-to-end speech recognition","author":"Hannun","year":"2014"},{"key":"ref7","article-title":"Deep speech 2 : End-to-end speech recognition in english and mandarin","volume-title":"International Conference on Machine Learning","author":"Amodei"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","volume-title":"CoRR","author":"Goodfellow","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1353"},{"key":"ref12","first-page":"5334","article-title":"Robust audio adversarial example for a physical attack","volume-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence","author":"Yakura"},{"key":"ref13","article-title":"Phonemic adversarial attack against audio recognition in real world","author":"Wang","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91356-4_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i16.17663"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23055"},{"key":"ref18","article-title":"Universal adversarial audio perturbations","author":"Abdoli","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485383"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3416965"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560660"},{"key":"ref23","article-title":"Compression to the rescue: Defending from adversarial attacks across modalities","volume-title":"ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"Das"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60276-5_3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3272925"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-711"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1386"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-329"},{"key":"ref29","first-page":"5206","article-title":"Librispeech: An asr corpus based on public domain audio books","volume-title":"2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Panayotov"},{"key":"ref30","article-title":"Common voice: A massively-multilingual speech corpus","author":"Ardila","year":"2019"},{"key":"ref31","first-page":"125","article-title":"TED-LIUM: an automatic speech recognition dedicated corpus","volume-title":"Proceedings of the Eighth International Conference on Language Resources and Evaluation (LREC\u201912)","author":"Rousseau"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10889070.pdf?arnumber=10889070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:24:15Z","timestamp":1774416255000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10889070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10889070","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}