{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:31:40Z","timestamp":1759091500291,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3395352.3402629","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T18:24:28Z","timestamp":1594923868000},"page":"80-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting acoustic backdoor transmission of inaudible messages using deep learning"],"prefix":"10.1145","author":[{"given":"Silvija","family":"Kokalj-Filipovic","sequence":"first","affiliation":[{"name":"Perspecta Labs Inc"}]},{"given":"Morriel","family":"Kasher","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Michael","family":"Zhao","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Predrag","family":"Spasojevic","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_2_1","volume-title":"Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. ArXiv abs\/1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Xiaodong Song. 2017. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. ArXiv abs\/1712.05526 (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"Air Ultrasonic Ceramic Transducers 400ST\/R160. Retrieved","author":"S. Square Enterprise Company Limited Pro-Wave Electronics Corporation","year":"2020","unstructured":"S. Square Enterprise Company Limited Pro-Wave Electronics Corporation. 2019. Air Ultrasonic Ceramic Transducers 400ST\/R160. Retrieved May 8, 2020 from http:\/\/www.farnell.com\/datasheets\/l686089.pdf?_ga=2.256607115.1881374495.1588917674-2094016181.1588917674"},{"key":"e_1_3_2_1_4_1","unstructured":"I. J Goodfellow J. Shlens and C. Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint (2014)."},{"key":"e_1_3_2_1_5_1","volume-title":"Audioset Ontology Human Speech. Retrieved","author":"Google Inc. 2017.","year":"2020","unstructured":"Google Inc. 2017. Audioset Ontology Human Speech. Retrieved May 9, 2020 from https:\/\/research.google.com\/audioset\/\/\/ontology\/speech.html"},{"key":"e_1_3_2_1_6_1","volume-title":"NI myDAQ Device Specifications. Retrieved","author":"National Instruments. 2019.","year":"2020","unstructured":"National Instruments. 2019. NI myDAQ Device Specifications. Retrieved May 8, 2020 from https:\/\/www.ni.com\/pdf\/manuals\/373061g.pdf"},{"volume-title":"Adversarial Examples in RF Deep Learning: Detection and Physical Robustness. In IEEE Global Conf. on Signal and Inform. Processing (GlobalSIP).","author":"Kokalj-Filipovic S.","key":"e_1_3_2_1_7_1","unstructured":"S. Kokalj-Filipovic, R. Miller, and G. Vanhoy. 2019. Adversarial Examples in RF Deep Learning: Detection and Physical Robustness. In IEEE Global Conf. on Signal and Inform. Processing (GlobalSIP)."},{"key":"e_1_3_2_1_8_1","unstructured":"A. Kurakin I. Goodfellow and S. Bengio. 2016. Adversarial examples in the physical world. arXiv preprint (2016)."},{"key":"e_1_3_2_1_9_1","unstructured":"Test Equipment Solutions Ltd. 2019. Arbitrary\/Function Generators. Retrieved May 8 2020 from http:\/\/www.testequipmenthq.com\/datasheets\/TEKTRONIX-AFG3021-Datasheet.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Yao Qin Nicholas Carlini Ian J. Goodfellow Garrison W. Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. In ICML."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_12_1","volume-title":"Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA, 547--560. https:\/\/www.usenix.org\/conference\/nsdil8\/presentation\/roy"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138836"},{"key":"e_1_3_2_1_14_1","volume-title":"Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. ArXiv abs\/1804.03209","author":"Warden Pete","year":"2018","unstructured":"Pete Warden. 2018. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. ArXiv abs\/1804.03209 (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Hiromu Yakura and Jun Sakuma. 2019. Robust Audio Adversarial Example for a Physical Attack. In IJCAI.","DOI":"10.24963\/ijcai.2019\/741"},{"volume-title":"Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In the 27th USENIX Conf on Security.","author":"Yuan","key":"e_1_3_2_1_16_1","unstructured":"Yuan, Xuejing et al. 2018. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In the 27th USENIX Conf on Security."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Linz Austria","acronym":"WiSec '20"},"container-title":["Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395352.3402629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395352.3402629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:35Z","timestamp":1750199915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395352.3402629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":17,"alternative-id":["10.1145\/3395352.3402629","10.1145\/3395352"],"URL":"https:\/\/doi.org\/10.1145\/3395352.3402629","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-07-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}