{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T06:37:33Z","timestamp":1776321453978,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN 2016-04855"],"award-info":[{"award-number":["RGPIN 2016-04855"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN 2016-06628"],"award-info":[{"award-number":["RGPIN 2016-06628"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3175603","type":"journal-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:15:05Z","timestamp":1652732105000},"page":"2044-2058","source":"Crossref","is-referenced-by-count":14,"title":["Multidiscriminator Sobolev Defense-GAN Against Adversarial Attacks for End-to-End Speech Systems"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6445-216X","authenticated-orcid":false,"given":"Mohammad","family":"Esmaeilpour","sequence":"first","affiliation":[{"name":"&#x00C9;cole de Technologie Sup&#x00E9;rieure (&#x00C9;TS), Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada"}]},{"given":"Patrick","family":"Cardinal","sequence":"additional","affiliation":[{"name":"&#x00C9;cole de Technologie Sup&#x00E9;rieure (&#x00C9;TS), Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5879-7014","authenticated-orcid":false,"given":"Alessandro Lameiras","family":"Koerich","sequence":"additional","affiliation":[{"name":"&#x00C9;cole de Technologie Sup&#x00E9;rieure (&#x00C9;TS), Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1219"},{"key":"ref2","article-title":"Lingvo: A modular and scalable framework for sequence-to-sequence modeling","author":"Shen","year":"2019","journal-title":"arXiv:1902.08295"},{"key":"ref3","volume-title":"Project DeepSpeech","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639347"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472618"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2956591"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70914-7"},{"key":"ref10","first-page":"5231","article-title":"Imperceptible, robust, and targeted adversarial examples for automatic speech recognition","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"2019","author":"Qin"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427276"},{"key":"ref13","article-title":"Perceptual based adversarial audio attacks","author":"Szurley","year":"2019","journal-title":"arXiv:1906.06355"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/741"},{"key":"ref16","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23055"},{"key":"ref18","first-page":"1","article-title":"The Kaldi speech recognition toolkit","volume-title":"Proc. IEEE Workshop Autom. Speech Recognit. Understand.","author":"Povey"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2420"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10997-4_50"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/0470024720"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/89.748118"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1121\/1.2766778"},{"key":"ref25","first-page":"2309","article-title":"Dompteur: Taming audio adversarial examples","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Eisenhofer"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1846"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2734"},{"key":"ref28","article-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with JPEG compression","author":"Das","year":"2017","journal-title":"arXiv:1705.02900"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413626"},{"key":"ref30","article-title":"Adversarial machine learning and speech emotion recognition: Utilizing generative adversarial networks for robustness","author":"Latif","year":"2018","journal-title":"arXiv:1811.11402"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9052913"},{"key":"ref32","volume-title":"Deep Learning","volume":"1","author":"Goodfellow","year":"2016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164317"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682744"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2938863"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1201\/9781482276237"},{"key":"ref37","first-page":"1","article-title":"Sobolev GAN","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Mroueh"},{"key":"ref38","first-page":"1","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Samangouei"},{"key":"ref39","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","volume":"80","author":"Athalye"},{"key":"ref40","volume-title":"Matrix Computations","author":"Van Loan","year":"1983"},{"key":"ref41","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Ma"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3156\/jsoft.29.5_177_2"},{"key":"ref43","first-page":"1","article-title":"Towards principled methods for training generative adversarial networks","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Arjovsky"},{"key":"ref44","first-page":"1","article-title":"Learning to draw samples with amortized stein variational gradient descent","volume-title":"Proc. 33rd Conf. Uncertainty Artif. Intell.","author":"Feng"},{"key":"ref45","first-page":"1","article-title":"The Cramer distance as a solution to biased Wasserstein gradients","volume":"abs\/1705.10743","author":"Bellemare","year":"2017","journal-title":"CoRR"},{"key":"ref46","first-page":"2203","article-title":"MMD GAN: Towards deeper understanding of moment matching network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref47","first-page":"2513","article-title":"Fisher GAN","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Mroueh"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2307\/1428011"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1214\/12-EJS722"},{"key":"ref50","first-page":"5767","article-title":"Improved training of Wasserstein GANs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Gulrajani"},{"key":"ref51","first-page":"1","article-title":"Large scale GAN training for high fidelity natural image synthesis","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Brock"},{"key":"ref52","first-page":"14910","article-title":"MelGAN: Generative adversarial networks for conditional waveform synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kumar"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2872043"},{"key":"ref54","first-page":"1","article-title":"Spectral normalization for generative adversarial networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Miyato"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2017.8096153"},{"key":"ref56","first-page":"1","article-title":"Neural photo editing with introspective adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Brock"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105912"},{"key":"ref58","volume-title":"Mozilla Common Voice Dataset","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref60","first-page":"1","article-title":"Ensemble system for part-of-speech tagging","volume-title":"Proc. EVALITA","volume":"9","author":"Dell\u2019Orletta"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941023"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683799"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2114881"},{"key":"ref64","first-page":"1","article-title":"Improving black-box adversarial attacks with a transfer-based prior","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Cheng"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806390"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2655045"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9413263"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.56021\/9781421407944"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/BF00275475"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_196"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2010.2045898"},{"key":"ref73","first-page":"4887","article-title":"Chi-square generative adversarial network","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tao"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01152"},{"key":"ref75","first-page":"7354","article-title":"Self-attention generative adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00095"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1535"},{"key":"ref78","first-page":"202","article-title":"Multi-objective training of generative adversarial networks with multiple discriminators","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Albuquerque"},{"key":"ref79","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref80","article-title":"Towards reliable data-driven sound recognition models: Developing attack and defense algorithms","author":"Esmaeilpour","year":"2021"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09775693.pdf?arnumber=9775693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:04:17Z","timestamp":1705964657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9775693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3175603","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}