{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:54:21Z","timestamp":1761648861475,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:00:00Z","timestamp":1612828800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972348","2018YFB0803600","2018R01005"],"award-info":[{"award-number":["61972348","2018YFB0803600","2018R01005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["61972348","2018YFB0803600","2018R01005"],"award-info":[{"award-number":["61972348","2018YFB0803600","2018R01005"]}]},{"name":"Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang","award":["61972348","2018YFB0803600","2018R01005"],"award-info":[{"award-number":["61972348","2018YFB0803600","2018R01005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,2,9]]},"abstract":"<jats:p>Speaker verification system has gained great popularity in recent years, especially with the development of deep neural networks and Internet of Things. However, the security of speaker verification system based on deep neural networks has not been well investigated. In this paper, we propose an attack to spoof the state-of-the-art speaker verification system based on generalized end-to-end (GE2E) loss function for misclassifying illegal users into the authentic user. Specifically, we design a novel loss function to deploy a generator for generating effective adversarial examples with slight perturbation and then spoof the system with these adversarial examples to achieve our goals. The success rate of our attack can reach 82% when cosine similarity is adopted to deploy the deep-learning-based speaker verification system. Beyond that, our experiments also reported the signal-to-noise ratio at 76\u2009dB, which proves that our attack has higher imperceptibility than previous works. In summary, the results show that our attack not only can spoof the state-of-the-art neural-network-based speaker verification system but also more importantly has the ability to hide from human hearing or machine discrimination.<\/jats:p>","DOI":"10.1155\/2021\/6664578","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T18:50:50Z","timestamp":1612896650000},"page":"1-10","source":"Crossref","is-referenced-by-count":11,"title":["Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3539-464X","authenticated-orcid":true,"given":"Hongwei","family":"Luo","sequence":"first","affiliation":[{"name":"National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1202-2525","authenticated-orcid":true,"given":"Yijie","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-5200","authenticated-orcid":true,"given":"Feng","family":"Lin","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9582-0698","authenticated-orcid":true,"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401566"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00929-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2973433"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462665"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472652"},{"author":"N. Dehak","key":"7","article-title":"I-vector representation based on GMM and DNN for audio classification"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_197"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761244"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694344"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"author":"M. Zha","key":"12","article-title":"Rolma: a practical adversarial attack against deep learning-based LPR systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5928"},{"first-page":"5231","article-title":"Imperceptible, robust, and targeted adversarial examples for automatic speech recognition","author":"Y. Qin","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.5220\/0008903202970307"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682799"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2973541"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683762"},{"first-page":"2062","article-title":"Voicepop: a pop noise based anti-spoofing system for voice authentication on smartphones","author":"Q. Wang","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"author":"G. Chen","key":"25","article-title":"Who is real bob? adversarial attacks on speaker recognition systems"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-019-00816-0"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081264"},{"first-page":"1053","article-title":"Gyrophone: recognizing speech from gyroscope signals","author":"Y. Michalevsky","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_90"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2019.2890858"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2985231"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_1049"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6664578.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6664578.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6664578.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T18:50:57Z","timestamp":1612896657000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6664578\/"}},"subtitle":[],"editor":[{"given":"Ting","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,2,9]]},"references-count":32,"alternative-id":["6664578","6664578"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6664578","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,2,9]]}}}