{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:47:56Z","timestamp":1763621276628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3558906","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"page":"1765-1769","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Blackbox adversarial attacks and explanations for automatic speech recognition"],"prefix":"10.1145","author":[{"given":"Xiaoliang","family":"Wu","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, and Patrick Traynor.","author":"Abdullah Hadi","year":"2019","unstructured":"Hadi Abdullah , Muhammad Sajidur Rahman , Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, and Patrick Traynor. 2019 . Hear \"No Evil\", See \"Kenansville\": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems . arxiv:1910.05262. Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, and Patrick Traynor. 2019. Hear \"No Evil\", See \"Kenansville\": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. arxiv:1910.05262."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"e_1_3_2_1_3_1","volume-title":"Srivastava","author":"Alzantot Moustafa","year":"2018","unstructured":"Moustafa Alzantot , Bharathan Balaji , and Mani B . Srivastava . 2018 . Did you hear that? Adversarial Examples Against Automatic Speech Recognition. CoRR , abs\/1801.00554 (2018), arXiv:1801.00554. arxiv:1801.00554 Moustafa Alzantot, Bharathan Balaji, and Mani B. Srivastava. 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. CoRR, abs\/1801.00554 (2018), arXiv:1801.00554. arxiv:1801.00554"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 12th Conference on Language Resources and Evaluation (LREC","author":"Ardila R.","year":"2020","unstructured":"R. Ardila , M. Branson , K. Davis , M. Henretty , M. Kohler , J. Meyer , R. Morais , L. Saunders , F. M. Tyers , and G. Weber . 2020. Common Voice: A Massively-Multilingual Speech Corpus . In Proceedings of the 12th Conference on Language Resources and Evaluation (LREC 2020 ). 4211\u20134215. R. Ardila, M. Branson, K. Davis, M. Henretty, M. Kohler, J. Meyer, R. Morais, L. Saunders, F. M. Tyers, and G. Weber. 2020. Common Voice: A Massively-Multilingual Speech Corpus. In Proceedings of the 12th Conference on Language Resources and Evaluation (LREC 2020). 4211\u20134215."},{"key":"e_1_3_2_1_5_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX. 513\u2013530. isbn:978-1-93 1971-32-4 https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX. 513\u2013530. isbn:978-1-931971-32-4 https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_1_6_1","volume-title":"Wagner","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David A . Wagner . 2018 . Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR , abs\/1801.01944 (2018), arXiv:1801.01944. arxiv:1801.01944 Nicholas Carlini and David A. Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR, abs\/1801.01944 (2018), arXiv:1801.01944. arxiv:1801.01944"},{"key":"e_1_3_2_1_7_1","volume-title":"Compositional Explanations for Image Classifiers. CoRR, abs\/2103.03622","author":"Chockler Hana","year":"2021","unstructured":"Hana Chockler , Daniel Kroening , and Youcheng Sun . 2021. Compositional Explanations for Image Classifiers. CoRR, abs\/2103.03622 ( 2021 ), arXiv:2103.03622. arxiv:2103.03622 Hana Chockler, Daniel Kroening, and Youcheng Sun. 2021. Compositional Explanations for Image Classifiers. CoRR, abs\/2103.03622 (2021), arXiv:2103.03622. arxiv:2103.03622"},{"key":"e_1_3_2_1_8_1","volume-title":"A Survey of the State of Explainable AI for Natural Language Processing. CoRR, abs\/2010.00711","author":"Danilevsky Marina","year":"2020","unstructured":"Marina Danilevsky , Kun Qian , Ranit Aharonov , Yannis Katsis , Ban Kawas , and Prithviraj Sen . 2020. A Survey of the State of Explainable AI for Natural Language Processing. CoRR, abs\/2010.00711 ( 2020 ), arXiv:2010.00711. arxiv:2010.00711 Marina Danilevsky, Kun Qian, Ranit Aharonov, Yannis Katsis, Ban Kawas, and Prithviraj Sen. 2020. A Survey of the State of Explainable AI for Natural Language Processing. CoRR, abs\/2010.00711 (2020), arXiv:2010.00711. arxiv:2010.00711"},{"key":"e_1_3_2_1_9_1","volume-title":"Fonollosa","author":"Espa\u00f1a-Bonet Cristina","year":"2016","unstructured":"Cristina Espa\u00f1a-Bonet and Jos\u00e9 A. R . Fonollosa . 2016 . Automatic Speech Recognition with Deep Neural Networks for Impaired Speech. In Advances in Speech and Language Technologies for Iberian Languages, Alberto Abad, Alfonso Ortega, Ant\u00f3nio Teixeira, Carmen Garc\u00eda Mateo, Carlos D. Mart\u00ednez Hinarejos, Fernando Perdig\u00e3o, Fernando Batista, and Nuno Mamede (Eds.). Springer International Publishing , Cham. 97\u2013107. isbn:978-3-319-49169-1 Cristina Espa\u00f1a-Bonet and Jos\u00e9 A. R. Fonollosa. 2016. Automatic Speech Recognition with Deep Neural Networks for Impaired Speech. In Advances in Speech and Language Technologies for Iberian Languages, Alberto Abad, Alfonso Ortega, Ant\u00f3nio Teixeira, Carmen Garc\u00eda Mateo, Carlos D. Mart\u00ednez Hinarejos, Fernando Perdig\u00e3o, Fernando Batista, and Nuno Mamede (Eds.). Springer International Publishing, Cham. 97\u2013107. isbn:978-3-319-49169-1"},{"key":"e_1_3_2_1_10_1","unstructured":"Navdeep Gill Megan Kurka and Wen Phan. 2019. Machine Learning Interpretability with H2O Driverless AI. \t\t\t\t  Navdeep Gill Megan Kurka and Wen Phan. 2019. Machine Learning Interpretability with H2O Driverless AI."},{"key":"e_1_3_2_1_11_1","volume-title":"Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning. CoRR, abs\/1806.00069","author":"Gilpin Leilani H.","year":"2018","unstructured":"Leilani H. Gilpin , David Bau , Ben Z. Yuan , Ayesha Bajwa , Michael A. Specter , and Lalana Kagal . 2018 . Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning. CoRR, abs\/1806.00069 (2018), arXiv:1806.00069. arxiv:1806.00069 Leilani H. Gilpin, David Bau, Ben Z. Yuan, Ayesha Bajwa, Michael A. Specter, and Lalana Kagal. 2018. Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning. CoRR, abs\/1806.00069 (2018), arXiv:1806.00069. arxiv:1806.00069"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164317"},{"key":"e_1_3_2_1_13_1","volume-title":"Ng","author":"Hannun Awni","year":"2014","unstructured":"Awni Hannun , Carl Case , Jared Casper , Bryan Catanzaro , Greg Diamos , Erich Elsen , Ryan Prenger , Sanjeev Satheesh , Shubho Sengupta , Adam Coates , and Andrew Y . Ng . 2014 . Deep Speech : Scaling up end-to-end speech recognition. arxiv:1412.5567. Awni Hannun, Carl Case, Jared Casper, Bryan Catanzaro, Greg Diamos, Erich Elsen, Ryan Prenger, Sanjeev Satheesh, Shubho Sengupta, Adam Coates, and Andrew Y. Ng. 2014. Deep Speech: Scaling up end-to-end speech recognition. arxiv:1412.5567."},{"volume-title":"Automatic Speech Recognition: A Review","author":"Haton Jean-Paul","key":"e_1_3_2_1_14_1","unstructured":"Jean-Paul Haton . 2005. Automatic Speech Recognition: A Review . In Enterprise Information Systems V, Olivier Camp, Joaquim B. L. Filipe, Slimane Hammoudi, and Mario Piattini (Eds.). Springer Netherlands , Dordrecht . 6\u201311. isbn:978-1-4020-2673-7 Jean-Paul Haton. 2005. Automatic Speech Recognition: A Review. In Enterprise Information Systems V, Olivier Camp, Joaquim B. L. Filipe, Slimane Hammoudi, and Mario Piattini (Eds.). Springer Netherlands, Dordrecht. 6\u201311. isbn:978-1-4020-2673-7"},{"key":"e_1_3_2_1_15_1","volume-title":"WaveGuard: Understanding and Mitigating Audio Adversarial Examples. CoRR, abs\/2103.03344","author":"Hussain Shehzeen","year":"2021","unstructured":"Shehzeen Hussain , Paarth Neekhara , Shlomo Dubnov , Julian J. McAuley , and Farinaz Koushanfar . 2021. WaveGuard: Understanding and Mitigating Audio Adversarial Examples. CoRR, abs\/2103.03344 ( 2021 ), arXiv:2103.03344. arxiv:2103.03344 Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian J. McAuley, and Farinaz Koushanfar. 2021. WaveGuard: Understanding and Mitigating Audio Adversarial Examples. CoRR, abs\/2103.03344 (2021), arXiv:2103.03344. arxiv:2103.03344"},{"key":"e_1_3_2_1_16_1","article-title":"A statistical interpretation of term specificity and its application in retrieval","author":"Jones Karen Sparck","year":"1972","unstructured":"Karen Sparck Jones . 1972 . A statistical interpretation of term specificity and its application in retrieval . Journal of documentation. Karen Sparck Jones. 1972. A statistical interpretation of term specificity and its application in retrieval. Journal of documentation.","journal-title":"Journal of documentation."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Paul Lamere Philip Kwok William Walker Evandro B Gouv\u00eaa Rita Singh Bhiksha Raj and Peter Wolf. 2003. Design of the CMU sphinx-4 decoder.. In Interspeech. \t\t\t\t  Paul Lamere Philip Kwok William Walker Evandro B Gouv\u00eaa Rita Singh Bhiksha Raj and Peter Wolf. 2003. Design of the CMU sphinx-4 decoder.. In Interspeech.","DOI":"10.21437\/Eurospeech.2003-382"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07974-5_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"e_1_3_2_1_20_1","unstructured":"Andreas Madsen Siva Reddy and Sarath Chandar. 2021. Post-hoc Interpretability for Neural NLP: A Survey. arXiv preprint arXiv:2108.04840. \t\t\t\t  Andreas Madsen Siva Reddy and Sarath Chandar. 2021. Post-hoc Interpretability for Neural NLP: A Survey. arXiv preprint arXiv:2108.04840."},{"key":"e_1_3_2_1_21_1","unstructured":"Sapna Maheshwari. 2017. Burger King \u2018OK Google\u2019Ad Doesn\u2019t Seem OK With Google. The New York Times. https:\/\/www. nytimes. com\/2017\/04\/12\/business\/burger-king-tv-ad-google-home. html. \t\t\t\t  Sapna Maheshwari. 2017. Burger King \u2018OK Google\u2019Ad Doesn\u2019t Seem OK With Google. The New York Times. https:\/\/www. nytimes. com\/2017\/04\/12\/business\/burger-king-tv-ad-google-home. html."},{"key":"e_1_3_2_1_22_1","volume-title":"Universal Adversarial Perturbations for Speech Recognition Systems. CoRR, abs\/1905.03828","author":"Neekhara Paarth","year":"2019","unstructured":"Paarth Neekhara , Shehzeen Hussain , Prakhar Pandey , Shlomo Dubnov , Julian J. McAuley , and Farinaz Koushanfar . 2019. Universal Adversarial Perturbations for Speech Recognition Systems. CoRR, abs\/1905.03828 ( 2019 ), arXiv:1905.03828. arxiv:1905.03828 Paarth Neekhara, Shehzeen Hussain, Prakhar Pandey, Shlomo Dubnov, Julian J. McAuley, and Farinaz Koushanfar. 2019. Universal Adversarial Perturbations for Speech Recognition Systems. CoRR, abs\/1905.03828 (2019), arXiv:1905.03828. arxiv:1905.03828"},{"key":"e_1_3_2_1_23_1","volume-title":"TV anchor says live on-air \u2018Alexa, order me a dollhouse\u2019-Guess what happens next. The Register, 7","author":"Nichols Shaun","year":"2017","unstructured":"Shaun Nichols . 2017. TV anchor says live on-air \u2018Alexa, order me a dollhouse\u2019-Guess what happens next. The Register, 7 ( 2017 ). Shaun Nichols. 2017. TV anchor says live on-air \u2018Alexa, order me a dollhouse\u2019-Guess what happens next. The Register, 7 (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"e_1_3_2_1_25_1","unstructured":"Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. arxiv:1903.10346. \t\t\t\t  Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. arxiv:1903.10346."},{"key":"e_1_3_2_1_26_1","volume-title":"Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. CoRR, abs\/1908.10084","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych . 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. CoRR, abs\/1908.10084 ( 2019 ), arXiv:1908.10084. arxiv:1908.10084 Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. CoRR, abs\/1908.10084 (2019), arXiv:1908.10084. arxiv:1908.10084"},{"key":"e_1_3_2_1_27_1","volume-title":"Explaining the Predictions of Any Classifier. CoRR, abs\/1602.04938","author":"Ribeiro Marco T\u00falio","year":"2016","unstructured":"Marco T\u00falio Ribeiro , Sameer Singh , and Carlos Guestrin . 2016. \" Why Should I Trust You?\" : Explaining the Predictions of Any Classifier. CoRR, abs\/1602.04938 ( 2016 ), arXiv:1602.04938. arxiv:1602.04938 Marco T\u00falio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. \"Why Should I Trust You?\": Explaining the Predictions of Any Classifier. CoRR, abs\/1602.04938 (2016), arXiv:1602.04938. arxiv:1602.04938"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941023"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arxiv:1808.05665. \t\t\t\t  Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arxiv:1808.05665.","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_1_30_1","volume-title":"Flach","author":"Sokol Kacper","year":"2020","unstructured":"Kacper Sokol and Peter A . Flach . 2020 . LIMEtree: Interactively Customisable Explanations Based on Local Surrogate Multi-output Regression Trees. CoRR , abs\/2005.01427 (2020), arXiv:2005.01427. arxiv:2005.01427 Kacper Sokol and Peter A. Flach. 2020. LIMEtree: Interactively Customisable Explanations Based on Local Surrogate Multi-output Regression Trees. CoRR, abs\/2005.01427 (2020), arXiv:2005.01427. arxiv:2005.01427"},{"key":"e_1_3_2_1_31_1","volume-title":"Explaining Deep Neural Networks Using Spectrum-Based Fault Localization. CoRR, abs\/1908.02374","author":"Sun Youcheng","year":"2019","unstructured":"Youcheng Sun , Hana Chockler , Xiaowei Huang , and Daniel Kroening . 2019. Explaining Deep Neural Networks Using Spectrum-Based Fault Localization. CoRR, abs\/1908.02374 ( 2019 ), arXiv:1908.02374. arxiv:1908.02374 Youcheng Sun, Hana Chockler, Xiaowei Huang, and Daniel Kroening. 2019. Explaining Deep Neural Networks Using Spectrum-Based Fault Localization. CoRR, abs\/1908.02374 (2019), arXiv:1908.02374. arxiv:1908.02374"},{"key":"e_1_3_2_1_32_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199. \t\t\t\t  Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Rohan Taori Amog Kamsetty Brenton Chu and Nikita Vemuri. 2019. Targeted Adversarial Examples for Black Box Audio Systems. arxiv:1805.07820. \t\t\t\t  Rohan Taori Amog Kamsetty Brenton Chu and Nikita Vemuri. 2019. Targeted Adversarial Examples for Black Box Audio Systems. arxiv:1805.07820.","DOI":"10.1109\/SPW.2019.00016"},{"key":"e_1_3_2_1_34_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition . In 9th USENIX Workshop on Offensive Technologies (WOOT 15) . USENIX Association, Washington, D.C.. https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/vaidya Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. In 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D.C.. https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/vaidya"},{"key":"e_1_3_2_1_35_1","volume-title":"Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition. CoRR, abs\/2005.10637","author":"Wang Qing","year":"2020","unstructured":"Qing Wang , Pengcheng Guo , and Lei Xie . 2020. Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition. CoRR, abs\/2005.10637 ( 2020 ), arXiv:2005.10637. arxiv:2005.10637 Qing Wang, Pengcheng Guo, and Lei Xie. 2020. Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition. CoRR, abs\/2005.10637 (2020), arXiv:2005.10637. arxiv:2005.10637"},{"key":"e_1_3_2_1_36_1","volume-title":"Robust Audio Adversarial Example for a Physical Attack. CoRR, abs\/1810.11793","author":"Yakura Hiromu","year":"2018","unstructured":"Hiromu Yakura and Jun Sakuma . 2018. Robust Audio Adversarial Example for a Physical Attack. CoRR, abs\/1810.11793 ( 2018 ), arXiv:1810.11793. arxiv:1810.11793 Hiromu Yakura and Jun Sakuma. 2018. Robust Audio Adversarial Example for a Physical Attack. CoRR, abs\/1810.11793 (2018), arXiv:1810.11793. arxiv:1810.11793"},{"key":"e_1_3_2_1_37_1","volume-title":"Gunter","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , Xiaofeng Wang , and Carl A . Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR , abs\/1801.08535 (2018), arXiv:1801.08535. arxiv:1801.08535 Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR, abs\/1801.08535 (2018), arXiv:1801.08535. arxiv:1801.08535"},{"key":"e_1_3_2_1_38_1","volume-title":"DLIME: A Deterministic Local Interpretable Model-Agnostic Explanations Approach for Computer-Aided Diagnosis Systems. CoRR, abs\/1906.10263","author":"Zafar Muhammad Rehman","year":"2019","unstructured":"Muhammad Rehman Zafar and Naimul Mefraz Khan . 2019 . DLIME: A Deterministic Local Interpretable Model-Agnostic Explanations Approach for Computer-Aided Diagnosis Systems. CoRR, abs\/1906.10263 (2019), arXiv:1906.10263. arxiv:1906.10263 Muhammad Rehman Zafar and Naimul Mefraz Khan. 2019. DLIME: A Deterministic Local Interpretable Model-Agnostic Explanations Approach for Computer-Aided Diagnosis Systems. CoRR, abs\/1906.10263 (2019), arXiv:1906.10263. arxiv:1906.10263"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"],"location":"Singapore Singapore","acronym":"ESEC\/FSE '22"},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3558906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:03Z","timestamp":1750182543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":38,"alternative-id":["10.1145\/3540250.3558906","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3558906","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}