{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T20:10:02Z","timestamp":1747339802576,"version":"3.40.5"},"reference-count":101,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3522849","type":"journal-article","created":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T19:27:53Z","timestamp":1735241273000},"page":"2959-2977","source":"Crossref","is-referenced-by-count":0,"title":["Perception-Aware Attack Against Music Copyright Detection: Impacts and Defenses"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2608-4762","authenticated-orcid":false,"given":"Rui","family":"Duan","sequence":"first","affiliation":[{"name":"School of Science and Engineering, University of Missouri-Kansas City, Kansas City, MO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2211-2137","authenticated-orcid":false,"given":"Zhe","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8543-2977","authenticated-orcid":false,"given":"Shangqing","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Oklahoma, Tulsa, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1534-6237","authenticated-orcid":false,"given":"Leah","family":"Ding","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3382-798X","authenticated-orcid":false,"given":"Yao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1131-4307","authenticated-orcid":false,"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of South Florida, Tampa, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559350"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref5"},{"key":"ref6","first-page":"513","article-title":"Hidden voice commands","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Carlini"},{"key":"ref7","first-page":"49","article-title":"Commandersong: A systematic approach for practical adversarial voice recognition","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Yuan"},{"key":"ref8","first-page":"2667","article-title":"Devil\u2019s whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Chen"},{"key":"ref9","first-page":"5231","article-title":"Imperceptible, robust, and targeted adversarial examples for automatic speech recognition","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qin"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref12","first-page":"712","article-title":"Hear \u201cno evil","volume-title":"Proc. IEEE Eur. Symp. Secur. Privacy","author":"Abdullah"},{"key":"ref13","first-page":"8307","article-title":"Adversarial attacks on copyright detection systems","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Saadatpanah"},{"year":"2022","key":"ref14","article-title":"Alexa Amazon"},{"year":"2022","key":"ref15","article-title":"Assistant Google"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485383"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2018.00009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484742"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2174224"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2017.8282110"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"article-title":"Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets","year":"2019","author":"Balaji","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/520"},{"key":"ref28","first-page":"3358","article-title":"Adversarial training for free!","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Shafahi"},{"article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Tram\u00e8r","key":"ref29"},{"article-title":"Fast is better than free: Revisiting adversarial training","year":"2020","author":"Wong","key":"ref30"},{"article-title":"Adversarial training and provable defenses","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Balunovic","key":"ref31"},{"key":"ref32","first-page":"5286","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wong"},{"key":"ref33","first-page":"3578","article-title":"Differentiable abstract interpretation for provably robust neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mirman"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"article-title":"Learning with a strong adversary","year":"2015","author":"Huang","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.027"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560671"},{"article-title":"Characterizing audio adversarial examples using temporal dependency","year":"2018","author":"Yang","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952158"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1977.10660"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2011.2112333"},{"key":"ref42","first-page":"263","article-title":"Indirect acquisition of fingerings of harmonic notes on the flute","volume-title":"Proc. Int. Comput. Music Conf.","volume":"1","author":"Kereliuk"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012213564-4\/50006-8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2002.5744965"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198526155.003.0006"},{"key":"ref46","first-page":"1","article-title":"Multidimensional optimisation of harmonic signals","volume-title":"Proc. IEEE Eur. Signal Process. Conf.","author":"Walmsley"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-005-4151-3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1996.535015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_73146"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14209\/its.2002.303"},{"key":"ref51","first-page":"7","article-title":"An industrial strength audio search algorithm","volume-title":"Proc. 4th Int. Conf. Music Inf. Retrieval","author":"Wang"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.916370"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1628889"},{"article-title":"Audioid: Towards content-based identification of audio material","volume-title":"Proc. 110th AES Conv.","author":"Allamanche","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WDM.2001.990163"},{"key":"ref56","first-page":"117","article-title":"Robust audio hashing for content identification","volume-title":"Proc. Int. Workshop Content-Based Multimedia Index.","volume":"4","author":"Haitsma"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/741"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6637747"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1063\/1.882215"},{"article-title":"Instrument timbres and pitch estimation in polyphonic music","year":"2006","author":"Loeffler","key":"ref60"},{"key":"ref61","first-page":"2005","article-title":"Enhancing timbre model using MFCC and its time derivatives for music similarity estimation","volume-title":"Proc. 20th Eur. Signal Process. Conf.","author":"De Leon"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-174-2.ch007"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2042119"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941023"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.21437\/SSW.2016-24"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1002\/9780470740156"},{"key":"ref68","first-page":"11931","article-title":"Real world audio adversary against wake-word detection systems","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref69","first-page":"3","article-title":"PEAQ-the ITU standard for objective measurement of perceived audio quality","volume":"48","author":"Thiede","year":"2000","journal-title":"J. Audio Eng. Soc."},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2018.10"},{"key":"ref71","article-title":"The spearman rank correlation coefficient","author":"Daniel","year":"1987","journal-title":"Biostatistics"},{"key":"ref72","article-title":"Spearman\u2019s rank correlation coefficient","volume":"349","author":"Sedgwick","year":"2014","journal-title":"British Med. J."},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1126\/science.1164015"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1126\/science.1106881"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1038\/nature02771"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3306714"},{"key":"ref77","first-page":"3799","article-title":"SMACK: Semantically meaningful adversarial audio attack","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Yu"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"article-title":"Siamese neural networks for one-shot image recognition","volume-title":"Proc. Int. Conf. Mach. Learn. Workshop","author":"Koch","key":"ref79"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1617"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10350"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-056-4_116"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461524"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3243250.3243268"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.23919\/Eusipco47968.2020.9287625"},{"key":"ref87","article-title":"Robust sound modeling for song detection in broadcast audio","volume-title":"Proc. 112th AES","author":"Cano","year":"2002"},{"author":"Sharma","key":"ref88","article-title":"Attacking the madry defense model with $l_{1}$l1-based adversarial examples"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24200"},{"article-title":"Proactive detection of voice cloning with localized watermarking","year":"2024","author":"San Roman","key":"ref90"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.02.0102.0301"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2014.7065826"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICGTSPICC.2016.7955379"},{"article-title":"Defending against adversarial audio via diffusion model","year":"2023","author":"Wu","key":"ref94"},{"article-title":"Diffwave: A versatile diffusion model for audio synthesis","year":"2020","author":"Kong","key":"ref95"},{"key":"ref96","first-page":"8162","article-title":"Improved denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nichol"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3418208"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41505-1_34"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0826-5_3"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852197"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899663"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10816512.pdf?arnumber=10816512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T19:37:30Z","timestamp":1747337850000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10816512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":101,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3522849","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}