{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:15:46Z","timestamp":1775225746973,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,29]]},"DOI":"10.1109\/ipccc51483.2021.9679446","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:35:25Z","timestamp":1642710925000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Defending Against Adversarial Attacks in Speaker Verification Systems"],"prefix":"10.1109","author":[{"given":"Li-Chi","family":"Chang","sequence":"first","affiliation":[{"name":"Purudue University Fort Wayne,Department of Computer Science,Fort Wayne,IN,46805"}]},{"given":"Zesheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Purudue University Fort Wayne,Department of Computer Science,Fort Wayne,IN,46805"}]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Purudue University Fort Wayne,Deapartment of Electrical and Computer Engineering,Fort Wayne,IN,46805"}]},{"given":"Guoping","family":"Wang","sequence":"additional","affiliation":[{"name":"Purudue University Fort Wayne,Deapartment of Electrical and Computer Engineering,Fort Wayne,IN,46805"}]},{"given":"Zhuming","family":"Bi","sequence":"additional","affiliation":[{"name":"Purudue University Fort Wayne,Department of Civil and Mechanical Engineering,Fort Wayne,IN,46805"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref12","article-title":"Small Input Noise is Enough to Defend Against Query-based Black-box Attacks","author":"byun","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1452"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413737"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1052"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CHINSL.2004.1409642"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683760"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref18","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2015"},{"key":"ref24","article-title":"VoxCeleb2: Deep Speaker Recognition","author":"nagrani","year":"2018","journal-title":"Proc Interspeech 2018"},{"key":"ref23","article-title":"The Kaldi Speech Recognition Toolkit","author":"povey","year":"2011","journal-title":"2011 IEEE Workshop on Automatic Speech Recognition &amp; Understanding"},{"key":"ref26","article-title":"Rustle noise - Wikipedia","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref20","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"International Conference on Learning Representations"},{"key":"ref22","article-title":"Cloud Computing Services","year":"0"},{"key":"ref21","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning"},{"key":"ref8","article-title":"timsainb\/noisereduce: v1.0","author":"sainburg","year":"2019"},{"key":"ref7","article-title":"Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (dtw) techniques","volume":"2","author":"muda","year":"2010","journal-title":"Journal of Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2441"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2014.17"},{"key":"ref6","article-title":"Characterizing audio adversarial examples using temporal dependency","author":"yang","year":"2019","journal-title":"International Conference on Learning Representations"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"}],"event":{"name":"2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)","location":"Austin, TX, USA","start":{"date-parts":[[2021,10,29]]},"end":{"date-parts":[[2021,10,31]]}},"container-title":["2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9679357\/9679358\/09679446.pdf?arnumber=9679446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T20:06:06Z","timestamp":1675281966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9679446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,29]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ipccc51483.2021.9679446","relation":{},"subject":[],"published":{"date-parts":[[2021,10,29]]}}}