{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:40:25Z","timestamp":1772678425756,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427276","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"843-855","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems"],"prefix":"10.1145","author":[{"given":"Lea","family":"Sch\u00f6nherr","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Thorsten","family":"Eisenhofer","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum"}]},{"given":"Steffen","family":"Zeiler","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Dorothea","family":"Kolossa","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.382599"},{"key":"e_1_3_2_1_3_1","unstructured":"Moustafa Alzantot Bharathan Balaji and Mani Srivastava. 2018. Did you hear that? Adversarial examples against automatic speech recognition. arXiv preprint arXiv:1801.00554(2018).  Moustafa Alzantot Bharathan Balaji and Mani Srivastava. 2018. Did you hear that? Adversarial examples against automatic speech recognition. arXiv preprint arXiv:1801.00554(2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"Synthesizing Robust Adversarial Examples. CoRR abs\/1707.07397 (July","author":"Athalye Anish","year":"2017"},{"key":"e_1_3_2_1_5_1","unstructured":"Mitali Bafna Jack Murtagh and Nikhil Vyas. 2018. Thwarting Adversarial Examples: An L1-Robust Sparse Fourier Transform. In Advances in Neural Information Processing Systems 31. 10075\u201310085.  Mitali Bafna Jack Murtagh and Nikhil Vyas. 2018. Thwarting Adversarial Examples: An L1-Robust Sparse Fourier Transform. In Advances in Neural Information Processing Systems 31. 10075\u201310085."},{"key":"e_1_3_2_1_6_1","unstructured":"Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow and Aleksander Madry. 2019. On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705(2019).  Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow and Aleksander Madry. 2019. On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705(2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Hidden Voice Commands. In USENIX Security Symposium. USENIX, 513\u2013530","author":"Carlini Nicholas","year":"2016"},{"key":"e_1_3_2_1_8_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In Symposium on Security and Privacy. IEEE, 39\u201357","author":"Carlini Nicholas","year":"2017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. (2018) 1\u20137.  Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. (2018) 1\u20137.","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_10_1","volume-title":"Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems.","author":"Chen Tao","year":"2020"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium. USENIX.","author":"Chen Yuxuan","year":"2020"},{"key":"e_1_3_2_1_12_1","volume-title":"Houdini: Fooling Deep Structured Prediction Models. CoRR abs\/1707.05373 (July","author":"Cisse Moustapha","year":"2017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sina D\u00e4ubener Lea Sch\u00f6nherr Asja Fischer and Dorothea Kolossa. 2020. Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. arXiv preprint arXiv:2005.14611(2020).  Sina D\u00e4ubener Lea Sch\u00f6nherr Asja Fischer and Dorothea Kolossa. 2020. Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification. arXiv preprint arXiv:2005.14611(2020).","DOI":"10.21437\/Interspeech.2020-2734"},{"key":"e_1_3_2_1_14_1","volume-title":"Robust Physical-World Attacks on Machine Learning Models. CoRR abs\/1707.08945 (July","author":"Evtimov Ivan","year":"2017"},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Machine Learning. 1050\u20131059","author":"Gal Yarin","year":"2016"},{"key":"e_1_3_2_1_16_1","unstructured":"Awni Hannun Carl Case Jared Casper Bryan Catanzaro Greg Diamos Erich Elsen Ryan Prenger Sanjeev Satheesh Shubho Sengupta Adam Coates 2014. Deep speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567(2014).  Awni Hannun Carl Case Jared Casper Bryan Catanzaro Greg Diamos Erich Elsen Ryan Prenger Sanjeev Satheesh Shubho Sengupta Adam Coates 2014. Deep speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567(2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"Black-box Adversarial Attacks with Limited Queries and Information. CoRR abs\/1804.08598 (April","author":"Ilyas Andrew","year":"2018"},{"key":"e_1_3_2_1_18_1","first-page":"11172","article-title":"Information Technology \u2013 Coding of Moving Pictures and Associated Audio for Digital Storage Media at Up to 1.5 Mbits\/s \u2013 Part3: Audio","author":"ISO.","year":"1993","journal-title":"ISO"},{"key":"e_1_3_2_1_19_1","unstructured":"Balaji Lakshminarayanan Alexander Pritzel and Charles Blundell. 2017. Simple and scalable predictive uncertainty estimation using deep ensembles. In Advances in Neural Information Processing Systems. 6402\u20136413.  Balaji Lakshminarayanan Alexander Pritzel and Charles Blundell. 2017. Simple and scalable predictive uncertainty estimation using deep ensembles. In Advances in Neural Information Processing Systems. 6402\u20136413."},{"key":"e_1_3_2_1_20_1","volume-title":"Adversarial Music: Real World Audio Adversary Against Wake-word Detection System. In Advances in Neural Information Processing Systems (NeurIPS). 11908\u201311918.","author":"Li Juncheng","year":"2019"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Machine Learning. 1708\u20131716","author":"Louizos Christos","year":"2016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1780"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_24_1","volume-title":"Practical Black-Box Attacks Against Machine Learning. In Asia Conference on Computer and Communications Security (ASIA CCS). ACM, 506\u2013519","author":"Papernot Nicolas","year":"2017"},{"key":"e_1_3_2_1_25_1","volume-title":"Transferability in Machine Learning: From Phenomena to Black-Box Attacks using Adversarial Samples. CoRR abs\/1605.07277 (May","author":"Papernot Nicolas","year":"2016"},{"key":"e_1_3_2_1_26_1","volume-title":"The Kaldi Speech Recognition Toolkit. In Workshop on Automatic Speech Recognition and Understanding. IEEE.","author":"Povey Daniel","year":"2011"},{"key":"e_1_3_2_1_27_1","unstructured":"Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. In arXiv preprint arXiv:1903.10346.  Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. In arXiv preprint arXiv:1903.10346."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of Interspeech(2019)","author":"Shreya\u00a0Khare Senthil\u00a0Mani","year":"2019"},{"key":"e_1_3_2_1_31_1","volume-title":"Inaudible Voice Commands. CoRR abs\/1708.07238 (Aug","author":"Song Liwei","year":"2017"},{"key":"e_1_3_2_1_32_1","unstructured":"Joseph Szurley and J\u00a0Zico Kolter. 2019. Perceptual Based Adversarial Audio Attacks. arXiv preprint arXiv:1906.06355(2019).  Joseph Szurley and J\u00a0Zico Kolter. 2019. Perceptual Based Adversarial Audio Attacks. arXiv preprint arXiv:1906.06355(2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Rohan Taori Amog Kamsetty Brenton Chu and Nikita Vemuri. 2018. Targeted adversarial examples for black box audio systems. arXiv preprint arXiv:1805.07820(2018).  Rohan Taori Amog Kamsetty Brenton Chu and Nikita Vemuri. 2018. Targeted adversarial examples for black box audio systems. arXiv preprint arXiv:1805.07820(2018).","DOI":"10.1109\/SPW.2019.00016"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium. USENIX, 601\u2013618","author":"Tram\u00e8r Florian","year":"2016"},{"key":"e_1_3_2_1_35_1","volume-title":"Perception-based Objective Estimators of Speech. In IEEE Workshop on Speech Coding for Telecommunications. IEEE, 13\u201314","author":"Voran Stephen","year":"1995"},{"key":"e_1_3_2_1_36_1","volume-title":"Stealing Hyperparameters in Machine Learning. In Symposium on Security and Privacy. IEEE.","author":"Wang Binghui","year":"2018"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Hiromu Yakura and Jun Sakuma. 2019. Robust audio adversarial example for a physical attack. arXiv preprint arXiv:1810.11793(2019).  Hiromu Yakura and Jun Sakuma. 2019. Robust audio adversarial example for a physical attack. arXiv preprint arXiv:1810.11793(2019).","DOI":"10.24963\/ijcai.2019\/741"},{"key":"e_1_3_2_1_39_1","unstructured":"Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl\u00a0A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535(2018).  Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl\u00a0A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535(2018)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_41_1","volume-title":"Psychoacoustics: Facts and Models","author":"Zwicker Eberhard","year":"2007"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":40,"alternative-id":["10.1145\/3427228.3427276","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427276","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}