{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:12:53Z","timestamp":1768522373970,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61925109"],"award-info":[{"award-number":["61925109"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559357","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"755-767","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["FenceSitter"],"prefix":"10.1145","author":[{"given":"Jiangyi","family":"Deng","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Yanjiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. TORCH.NN.FUNCTIONAL.CONV1D. https:\/\/pytorch.org\/docs\/stable\/ generated\/torch.nn.functional.conv1d.html#torch.nn.functional.conv1d.  [n. d.]. TORCH.NN.FUNCTIONAL.CONV1D. https:\/\/pytorch.org\/docs\/stable\/ generated\/torch.nn.functional.conv1d.html#torch.nn.functional.conv1d."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00009"},{"key":"e_1_3_2_2_4_1","first-page":"789","article-title":"ISO\/IEC MPEG-2 Advanced Audio Coding","volume":"45","author":"Bosi Marina","year":"1997","unstructured":"Marina Bosi , Karlheinz Brandenburg , Schuyler Quackenbush , Louis Fielder , Kenzo Akagiri , Hendrik Fuchs , and Martin Dietz . 1997 . ISO\/IEC MPEG-2 Advanced Audio Coding . Journal of the Audio Engineering Society , Vol. 45 , 10 (1997), 789 -- 814 . Marina Bosi, Karlheinz Brandenburg, Schuyler Quackenbush, Louis Fielder, Kenzo Akagiri, Hendrik Fuchs, and Martin Dietz. 1997. ISO\/IEC MPEG-2 Advanced Audio Coding. Journal of the Audio Engineering Society, Vol. 45, 10 (1997), 789--814.","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_2_5_1","volume-title":"Adversarial Attacks on Speaker Recognition Systems. In IEEE Symposium on Security and Privacy.","author":"Chen Guangke","year":"2021","unstructured":"Guangke Chen , Sen Chen , Lingling Fan , Xiaoning Du , Zhe Zhao , Fu Song , and Yang Liu . 2021 . Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. In IEEE Symposium on Security and Privacy. Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, and Yang Liu. 2021. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Jiangyi Deng Yanjiao Chen and Wenyuan Xu. [n. d.]. FenceSitter: Black-box Content-Agnostic and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems extended version. https:\/\/person.zju.edu.cn\/person\/attachments\/2022-08\/01--1661840363--856887.pdf.  Jiangyi Deng Yanjiao Chen and Wenyuan Xu. [n. d.]. FenceSitter: Black-box Content-Agnostic and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems extended version. https:\/\/person.zju.edu.cn\/person\/attachments\/2022-08\/01--1661840363--856887.pdf.","DOI":"10.1145\/3548606.3559357"},{"key":"e_1_3_2_2_9_1","volume-title":"Propagation and Aggregation in TDNN Based Speaker Verification. In Conference of the International Speech Communication Association.","author":"Desplanques Brecht","year":"2020","unstructured":"Brecht Desplanques , Jenthe Thienpondt , and Kris Demuynck . 2020 . ECAPA-TDNN: Emphasized Channel Attention , Propagation and Aggregation in TDNN Based Speaker Verification. In Conference of the International Speech Communication Association. Brecht Desplanques, Jenthe Thienpondt, and Kris Demuynck. 2020. ECAPA-TDNN: Emphasized Channel Attention, Propagation and Aggregation in TDNN Based Speaker Verification. In Conference of the International Speech Communication Association."},{"key":"e_1_3_2_2_10_1","volume-title":"SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ACM Asia Conference on Computer and Communications Security.","author":"Du Tianyu","year":"2020","unstructured":"Tianyu Du , Shouling Ji , Jinfeng Li , Qinchen Gu , Ting Wang , and Raheem Beyah . 2020 . SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ACM Asia Conference on Computer and Communications Security. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, and Raheem Beyah. 2020. SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.02.017"},{"key":"e_1_3_2_2_12_1","volume-title":"European Conference on Speech Communication and Technology. ISCA.","author":"Fortuna J.","unstructured":"J. Fortuna , P. Sivakumaran , Aladdin M. Ariyaeeinia , and Amit S. Malegaonkar . 2005. Open-set speaker identification using adapted Gaussian mixture models . In European Conference on Speech Communication and Technology. ISCA. J. Fortuna, P. Sivakumaran, Aladdin M. Ariyaeeinia, and Amit S. Malegaonkar. 2005. Open-set speaker identification using adapted Gaussian mixture models. In European Conference on Speech Communication and Technology. ISCA."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315154718"},{"key":"e_1_3_2_2_14_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. OpenReview.net.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. OpenReview.net. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. OpenReview.net."},{"key":"e_1_3_2_2_15_1","volume-title":"Perceptual linear predictive (PLP) analysis of speech. the Journal of the Acoustical Society of America","author":"Hermansky Hynek","year":"1990","unstructured":"Hynek Hermansky . 1990. Perceptual linear predictive (PLP) analysis of speech. the Journal of the Acoustical Society of America , Vol. 87 , 4 ( 1990 ), 1738--1752. Hynek Hermansky. 1990. Perceptual linear predictive (PLP) analysis of speech. the Journal of the Acoustical Society of America, Vol. 87, 4 (1990), 1738--1752."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2009.5201259"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2009.5201259"},{"key":"e_1_3_2_2_18_1","volume-title":"Deep Speaker: an End-to-End Neural Speaker Embedding System. arXiv preprint arXiv:1705.02304","author":"Li Chao","year":"2017","unstructured":"Chao Li , Xiaokong Ma , Bing Jiang , Xiangang Li , Xuewei Zhang , Xiao Liu , Ying Cao , Ajay Kannan , and Zhenyao Zhu . 2017. Deep Speaker: an End-to-End Neural Speaker Embedding System. arXiv preprint arXiv:1705.02304 ( 2017 ). Chao Li, Xiaokong Ma, Bing Jiang, Xiangang Li, Xuewei Zhang, Xiao Liu, Ying Cao, Ajay Kannan, and Zhenyao Zhu. 2017. Deep Speaker: an End-to-End Neural Speaker Embedding System. arXiv preprint arXiv:1705.02304 (2017)."},{"key":"e_1_3_2_2_19_1","volume-title":"Practical Adversarial Attacks Against Speaker Recognition Systems. In International Workshop on Mobile Computing Systems and Applications. ACM.","author":"Li Zhuohang","year":"2020","unstructured":"Zhuohang Li , Cong Shi , Yi Xie , Jian Liu , Bo Yuan , and Yingying Chen . 2020 a. Practical Adversarial Attacks Against Speaker Recognition Systems. In International Workshop on Mobile Computing Systems and Applications. ACM. Zhuohang Li, Cong Shi, Yi Xie, Jian Liu, Bo Yuan, and Yingying Chen. 2020a. Practical Adversarial Attacks Against Speaker Recognition Systems. In International Workshop on Mobile Computing Systems and Applications. ACM."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"e_1_3_2_2_21_1","unstructured":"Surfing Technology Ltd. [n. d.]. ST-CMDS-20170001_1 Free ST Chinese Mandarin Corpus. https:\/\/www.openslr.org\/38\/.  Surfing Technology Ltd. [n. d.]. ST-CMDS-20170001_1 Free ST Chinese Mandarin Corpus. https:\/\/www.openslr.org\/38\/."},{"key":"e_1_3_2_2_22_1","volume-title":"International Conference on Learning Representations. OpenReview.net.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In International Conference on Learning Representations. OpenReview.net. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations. OpenReview.net."},{"key":"e_1_3_2_2_23_1","unstructured":"Lindasalwa Muda Mumtaj Begam and I. Elamvazuthi. 2010. Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques. arXiv preprint arXiv:1003.4083 (2010).  Lindasalwa Muda Mumtaj Begam and I. Elamvazuthi. 2010. Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques. arXiv preprint arXiv:1003.4083 (2010)."},{"key":"e_1_3_2_2_24_1","volume-title":"VoxCeleb: A Large-Scale Speaker Identification Dataset. In Conference of the International Speech Communication Association.","author":"Nagrani Arsha","year":"2017","unstructured":"Arsha Nagrani , Joon Son Chung , and Andrew Zisserman . 2017 . VoxCeleb: A Large-Scale Speaker Identification Dataset. In Conference of the International Speech Communication Association. Arsha Nagrani, Joon Son Chung, and Andrew Zisserman. 2017. VoxCeleb: A Large-Scale Speaker Identification Dataset. In Conference of the International Speech Communication Association."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"e_1_3_2_2_26_1","volume-title":"High-Performance Deep Learning Library. In Conference on Neural Information Processing Systems. PMLR.","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas K\u00f6pf , Edward Z. Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019 . PyTorch: An Imperative Style , High-Performance Deep Learning Library. In Conference on Neural Information Processing Systems. PMLR. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas K\u00f6pf, Edward Z. Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Conference on Neural Information Processing Systems. PMLR."},{"key":"e_1_3_2_2_27_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Qin Yao","year":"2019","unstructured":"Yao Qin , Nicholas Carlini , Garrison W. Cottrell , Ian J. Goodfellow , and Colin Raffel . 2019 . Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition . In International Conference on Machine Learning. PMLR. Yao Qin, Nicholas Carlini, Garrison W. Cottrell, Ian J. Goodfellow, and Colin Raffel. 2019. Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_2_28_1","volume-title":"X-Vectors: Robust DNN Embeddings for Speaker Recognition. In IEEE International Conference on Acoustics, Speech and Signal Processing.","author":"Snyder David","year":"2018","unstructured":"David Snyder , Daniel Garcia-Romero , Gregory Sell , Daniel Povey , and Sanjeev Khudanpur . 2018 . X-Vectors: Robust DNN Embeddings for Speaker Recognition. In IEEE International Conference on Acoustics, Speech and Signal Processing. David Snyder, Daniel Garcia-Romero, Gregory Sell, Daniel Povey, and Sanjeev Khudanpur. 2018. X-Vectors: Robust DNN Embeddings for Speaker Recognition. In IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"e_1_3_2_2_29_1","volume-title":"International Conference on Learning Representations. OpenReview.net.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In International Conference on Learning Representations. OpenReview.net. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations. OpenReview.net."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_86"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2017.8282024"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2638566"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"key":"e_1_3_2_2_34_1","volume-title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium.","author":"Yuan Xuejing","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , Xiaofeng Wang , and Carl A. Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium."},{"key":"e_1_3_2_2_35_1","volume-title":"Backdoor Attack Against Speaker Verification. In IEEE International Conference on Acoustics, Speech and Signal Processing.","author":"Zhai Tongqing","year":"2021","unstructured":"Tongqing Zhai , Yiming Li , Ziqi Zhang , Baoyuan Wu , Yong Jiang , and Shu-Tao Xia . 2021 . Backdoor Attack Against Speaker Verification. In IEEE International Conference on Acoustics, Speech and Signal Processing. Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, and Shu-Tao Xia. 2021. Backdoor Attack Against Speaker Verification. In IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"e_1_3_2_2_36_1","volume-title":"Dolphin Attack: Inaudible Voice Commands. In ACM SIGSAC Conference on Computer and Communications Security.","author":"Zhang Guoming","year":"2017","unstructured":"Guoming Zhang , Chen Yan , Xiaoyu Ji , Tianchen Zhang , Taimin Zhang , and Wenyuan Xu . 2017 . Dolphin Attack: Inaudible Voice Commands. In ACM SIGSAC Conference on Computer and Communications Security. Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. Dolphin Attack: Inaudible Voice Commands. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_37_1","volume-title":"Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. In ACM SIGSAC Conference on Computer and Communications Security.","author":"Zheng Baolin","year":"2021","unstructured":"Baolin Zheng , Peipei Jiang , Qian Wang , Qi Li , Chao Shen , Cong Wang , Yunjie Ge , Qingyang Teng , and Shenyi Zhang . 2021 . Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. In ACM SIGSAC Conference on Computer and Communications Security. Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, and Shenyi Zhang. 2021. Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. In ACM SIGSAC Conference on Computer and Communications Security."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:56Z","timestamp":1750182656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559357"}},"subtitle":["Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":37,"alternative-id":["10.1145\/3548606.3559357","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559357","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}