{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:17Z","timestamp":1755993737366,"version":"3.44.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2047","62072421","62002334","62102386","62121002"],"award-info":[{"award-number":["U20B2047","62072421","62002334","62102386","62121002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009076","name":"University of Science and Technology of China","doi-asserted-by":"publisher","award":["YD3480002001"],"award-info":[{"award-number":["YD3480002001"]}],"id":[{"id":"10.13039\/501100009076","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["WK2100000011"],"award-info":[{"award-number":["WK2100000011"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tai.2023.3285858","type":"journal-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T13:27:57Z","timestamp":1686749277000},"page":"1302-1315","source":"Crossref","is-referenced-by-count":2,"title":["Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6491-2023","authenticated-orcid":false,"given":"Haozhe","family":"Chen","sequence":"first","affiliation":[{"name":"Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4230-1077","authenticated-orcid":false,"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9868-3414","authenticated-orcid":false,"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5576-6108","authenticated-orcid":false,"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4417-9316","authenticated-orcid":false,"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, Anhui, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2022.3185179"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2022.3212981"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2022.3207450"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3114390"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref6","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Adi","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00130"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03339-0"},{"key":"ref10","first-page":"1","article-title":"ActiveGuard: Active intellectual property protection for deep neural networks via adversarial examples based user fingerprinting","volume-title":"Proc. Int. Workshop Pract. Deep Learn. Wild","author":"Xue","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630791"},{"key":"ref12","first-page":"4714","article-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Fan","year":"2019"},{"key":"ref13","first-page":"22619","article-title":"Passport-aware normalization for deep model protection","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst","author":"Zhang","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3182979"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3028448"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2000486.2000492"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3190575"},{"key":"ref18","first-page":"2273","article-title":"WaveGuard: Understanding and mitigating audio adversarial examples","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Hussain","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_14"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Did you hear that? adversarial examples against automatic speech recognition","year":"2018","author":"Alzantot","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00014"},{"key":"ref25","first-page":"1310","article-title":"On the difficulty of training recurrent neural networks","volume-title":"Proc. 30th Int. Conf. Mach. Learn.","author":"Pascanu","year":"2013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","year":"2016","author":"Papernot","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2925452"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026543"},{"key":"ref30","first-page":"8","article-title":"JPEG-resistant adversarial images","volume-title":"Proc. Workshop Mach. Learn. Comput. Secur.","author":"Shin","year":"2017"},{"article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","year":"2018","author":"Warden","key":"ref31"},{"article-title":"DARPA TIMIT acoustic-phonetic continuous speech corpus CD-ROM. NIST speech disc 1-1.1,","year":"1993","author":"Garofolo","key":"ref32"},{"article-title":"Deep speech: Scaling up end-to-end speech recognition","year":"2014","author":"Hannun","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(88)90003-2"},{"article-title":"Free spoken digit dataset (FSDD)","year":"2020","author":"Jackson","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747044"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.911054"},{"article-title":"Robust speech recognition via large-scale weak supervision","year":"2022","author":"Radford","key":"ref38"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/10478748\/10152479.pdf?arnumber=10152479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:12Z","timestamp":1755911352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10152479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":38,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tai.2023.3285858","relation":{},"ISSN":["2691-4581"],"issn-type":[{"type":"electronic","value":"2691-4581"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}