{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T13:37:43Z","timestamp":1775741863795,"version":"3.50.1"},"reference-count":93,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072309"],"award-info":[{"award-number":["62072309"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018735","name":"Ant Group","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["YSBR-040"],"award-info":[{"award-number":["YSBR-040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tdsc.2022.3220673","type":"journal-article","created":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T20:35:25Z","timestamp":1667939725000},"page":"3970-3987","source":"Crossref","is-referenced-by-count":34,"title":["Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8277-3119","authenticated-orcid":false,"given":"Guangke","family":"Chen","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4189-3258","authenticated-orcid":false,"given":"Zhe","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0581-2679","authenticated-orcid":false,"given":"Fu","family":"Song","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9477-4100","authenticated-orcid":false,"given":"Sen","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2428-9297","authenticated-orcid":false,"given":"Lingling","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Cyber Science, Nankai University, Tianjin, China"}]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Zhejiang, China"}]},{"given":"Jiashui","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Zhejiang, China"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053076"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101199"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413467"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102886"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i16.17663"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413760"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384733"},{"key":"ref14","article-title":"Crafting adversarial examples for speech paralinguistics applications","author":"Gong","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1452"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414525"},{"key":"ref18","article-title":"On adaptive attacks to adversarial example defenses","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Tram\u00e8r"},{"key":"ref19","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Athalye"},{"issue":"1","key":"ref20","first-page":"949","article-title":"Natural evolution strategies","volume":"15","author":"Wierstra","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref21","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Athalye"},{"key":"ref22","article-title":"CleverHans v0.1: An adversarial machine learning library","author":"Goodfellow","year":"2016"},{"key":"ref23","article-title":"Adversarial robustness toolbox v1.0.0","author":"Nicolae","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref26","article-title":"Interpreting and explaining deep neural networks for classification of audio signals","author":"Becker","year":"2018"},{"key":"ref27","article-title":"Deep speaker: An end-to-end neural speaker embedding system","author":"Li","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409052"},{"key":"ref29","article-title":"Cosine similarity scoring without score normalization techniques","volume-title":"Proc. Odyssey","author":"Dehak"},{"key":"ref31","article-title":"Characterizing audio adversarial examples using temporal dependency","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Yang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref33","first-page":"29935","article-title":"Data augmentation can improve robustness","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst.","author":"Rebuffi"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT2.2019.8824988"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-015-0300-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2908700"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4g18.8"},{"key":"ref38","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Goodfellow"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref40","first-page":"49","article-title":"Commandersong: A systematic approach for practical adversarial voice recognition","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Yuan"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363246"},{"key":"ref42","article-title":"Speech coding and audio preprocessing for mitigating and detecting audio adversarial examples on automatic speech recognition","author":"Rajaratnam","year":"2018"},{"key":"ref43","first-page":"722","article-title":"Voice coding with opus","volume-title":"Proc. 135th Audio Eng. Soc. Conv.","author":"Vos"},{"key":"ref44","article-title":"Speex: A free codec for free speech","author":"Valin","year":"2016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SCFT.1999.781503"},{"issue":"10","key":"ref46","first-page":"789","article-title":"ISO\/IEC MPEG-2 advanced audio coding","volume":"45","author":"Bosi","year":"1997","journal-title":"J. Audio Eng. Soc."},{"key":"ref47","volume-title":"MP3: The Definitive Guide","author":"Hacker","year":"2000"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49127-9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/97.736233"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.042"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3189397"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/a15080293"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00782-x"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414843"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3088661"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142183"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941023"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4289-8"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00014"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1983.1172092"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref66","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74048-3_4"},{"key":"ref68","article-title":"Tutorial on variational autoencoders","author":"Doersch","year":"2016"},{"key":"ref69","first-page":"3866","article-title":"NATTACK: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"ref72","first-page":"1077","article-title":"Your microphone array retains your identity: A robust voice liveness detection system for smart speaker","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Meng"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-950"},{"key":"ref74","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Baevski"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746952"},{"key":"ref76","article-title":"Silence is sweeter than speech: Self-supervised model using silence to store speaker information","author":"Feng","year":"2022"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2441"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00211"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485383"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464822"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484742"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3510582"},{"key":"ref84","first-page":"5231","article-title":"Imperceptible, robust, and targeted adversarial examples for automatic speech recognition","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Qin"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00016"},{"key":"ref88","first-page":"2309","article-title":"Dompteur: Taming audio adversarial examples","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Eisenhofer"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01629-9"},{"key":"ref91","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","volume-title":"Proc. Int. Conf. Learn., Representations","author":"Samangouei"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3116438"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2441"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1343"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/app9183697"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"ref98","first-page":"1027","article-title":"k-means : The advantages of careful seeding","volume-title":"Proc. IEEE 18th Annu. ACM-SIAM Symp. Discrete Algorithms","author":"Arthur"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10236919\/09942342.pdf?arnumber=9942342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T18:23:44Z","timestamp":1716920624000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9942342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":93,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3220673","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}