{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:03Z","timestamp":1776926343802,"version":"3.51.2"},"reference-count":29,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067120","type":"journal-article","created":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:11:18Z","timestamp":1751515878000},"page":"5403-5426","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Black-Box Speech Adversarial Attack Method Based on Enhanced Neural Predictors in Industrial IoT"],"prefix":"10.32604","volume":"84","author":[{"given":"Yun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhenhua","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xufei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xuya","family":"Cong","sequence":"additional","affiliation":[]},{"given":"Ou","family":"Ye","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"110672","DOI":"10.1016\/j.patcog.2024.110672","article-title":"The spiking neural network based on fMRI for speech recognition","volume":"155","author":"Song","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TIFS.2025.3573182","article-title":"APFT: adaptive phoneme filter template to generate anti-compression speech adversarial example in real-time","volume":"20","author":"Huang","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"101199","DOI":"10.1016\/j.csl.2021.101199","article-title":"Adversarial attack and defense strategies for deep speaker recognition systems","volume":"68","author":"Jati","year":"2021","journal-title":"Comput Speech Lang"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TDSC.2023.3236367","article-title":"Improving the security of audio captchas with adversarial examples","volume":"21","author":"Wang","year":"2023","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref5","series-title":"Proceedings of the 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP); 2024 Apr 19\u201321","first-page":"538","article-title":"A method for generating speech adversarial examples using conditional generative adversarial networks","author":"Hu"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"109286","DOI":"10.1016\/j.patcog.2022.109286","article-title":"Generating transferable adversarial examples for speech classification","volume":"137","author":"Kim","year":"2023","journal-title":"Pattern Recognit"},{"key":"ref7","series-title":"Proceedings of the Annual Computer Security Applications Conference; 2020 Dec 7\u201311","first-page":"843","article-title":"Imperio: robust over-the-air adversarial examples for automatic speech recognition systems","author":"Sch\u00f6nherr"},{"key":"ref8","series-title":"Proceedings of the 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM); 2023 Nov 28\u201329","first-page":"1","article-title":"Adversarial example detection techniques in speech recognition systems: a review","author":"Noureddine"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s40747-022-00782-x","article-title":"Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition","volume":"9","author":"Zhang","year":"2023","journal-title":"Complex Intell Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"103168","DOI":"10.1016\/j.cose.2023.103168","article-title":"Multi-targeted audio adversarial example for use against speech recognition systems","volume":"128","author":"Ko","year":"2023","journal-title":"Comput Secur"},{"key":"ref11","series-title":"Proceedings of the 2019 IEEE Security and Privacy Workshops (SPW); 2019 May 19\u201323","first-page":"15","article-title":"Targeted adversarial examples for black box audio systems","author":"Taori"},{"key":"ref12","series-title":"Proceedings of the International Conference on Computer Network Security and Software Engineering (CNSSE 2022); 2022 Feb 25\u201327","first-page":"9","article-title":"Audio adversarial attack: HIS attack","author":"Ma"},{"key":"ref13","series-title":"Proceedings of the 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD); 2024 May 8\u201310","first-page":"1509","article-title":"Generating black-box audio adversarial CAPTCHAs based on differential evolution algorithm","author":"Liu"},{"key":"ref14","series-title":"Proceedings of the 2022 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom); 2022 Dec 17\u201319","first-page":"692","article-title":"Your voice is not yours? Black-box adversarial attacks against speaker recognition systems","author":"Ye"},{"key":"ref15","series-title":"Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN); 2018 Jul 30\u2013Aug 2","first-page":"1","article-title":"Crafting adversarial examples for speech paralinguistics applications","author":"Gong"},{"key":"ref16","series-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI); 2019 Aug 10\u201316","first-page":"1094","article-title":"Robust audio adversarial example for a physical attack","author":"Yakura"},{"key":"ref17","series-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS); 2017 Dec 4\u20139","first-page":"6980","article-title":"Houdini: fooling deep structured visual and speech recognition models with adversarial examples","author":"Cisse"},{"key":"ref18","series-title":"Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW); 2018 May 24","first-page":"1","article-title":"Audio adversarial examples: targeted attacks on speech-to-text","author":"Carlini"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/TIFS.2022.3222963","article-title":"Query-efficient adversarial attack with low perturbation against end-to-end speech recognition systems","volume":"18","author":"Wang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref20","series-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security 18); 2018 May 14","first-page":"49","article-title":"A systematic approach for practical adversarial voice recognition","author":"Yuan"},{"key":"ref21","series-title":"Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2018 Apr 15\u201320","first-page":"1962","article-title":"Fooling end-to-end speaker verification with adversarial examples","author":"Kreuk"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"Khare S, Aralikatte R, Mani S. Adversarial black-box attacks on automatic speech recognition systems using multi-objective evolutionary optimization. arXiv:1811.01312. 2018.","DOI":"10.21437\/Interspeech.2019-2420"},{"key":"ref23","series-title":"Proceedings of the IEEE 2011 Workshop on Automatic Speech Recognition and Understanding (No. CONF); 2011 Dec 11\u201315","article-title":"The Kaldi speech recognition toolkit","author":"Daniel"},{"key":"ref24","series-title":"Proceedings of the 36th International Conference on Machine Learning; 2019 Jun 9\u201315","first-page":"5231","article-title":"Imperceptible, robust, and targeted adversarial examples for automatic speech recognition","author":"Qin"},{"key":"ref25","unstructured":"Biolkov\u00e1 M, Nguyen B. Neural predictor for black-box adversarial attacks on speech recognition. arXiv:2203.09849. 2022."},{"key":"ref26","series-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security; 2020 Oct 5\u20139","first-page":"357","article-title":"Sirenattack: generating adversarial audio for end-to-end acoustic systems","author":"Du"},{"key":"ref27","unstructured":"Wu S, Wang J, Ping W, Nie W, Xiao C. Defending against adversarial audio via diffusion model. arXiv:2303.01507. 2023."},{"key":"ref28","unstructured":"Olivier R, Abdullah H, Raj B. Watch what you pretrain for: targeted, transferable adversarial examples on self-supervised speech recognition models. arXiv:2209.13523. 2022."},{"key":"ref29","series-title":"Proceedings of the International Conference on Learning Representations; 2020 Apr 26\u2013May 1","article-title":"Bayesopt adversarial attack","author":"Ru"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_67120\/TSP_CMC_67120.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:30Z","timestamp":1776923130000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067120","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}