Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems

被引:0
|
作者
Wang, Fangwei [1 ,2 ]
Song, Ruixin [2 ]
Li, Qingru [1 ,2 ]
Wang, Changguang [1 ,2 ]
机构
[1] Hebei Normal Univ, Key Lab Network & Informat Secur Hebei Prov, Shijiazhuang 050024, Peoples R China
[2] Hebei Normal Univ, Coll Comp & Cyberspace Secur, Shijiazhuang 050024, Peoples R China
关键词
Speaker Recognition Systems; Adversarial Example; Adversarial Attack; Information Security;
D O I
10.1007/978-981-97-0808-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Speaker Recognition Systems (SRSs) are gradually introducing Deep Neural Networks (DNNs) as their core architecture, while attackers exploit the weakness of DNNs to launch adversarial attacks. Previous studies generate adversarial examples by injecting the human-imperceptible noise into the gradients of audio data, which is termed as white-box attacks. However, these attacks are impractical in real-world scenarios because they have a high dependency on the internal information of the target classifier. To address this constraint, this study proposes a method applying in a black-box condition which only permits the attacker to estimate the internal information by interacting with the model through its inputs and outputs. We use the idea of the substitution-based method and transfer-based method to train various surrogate models for imitating the target models. Our methods combine the surrogate models with white-box methods like Momentum Iterative Fast Gradient Sign Method (MI-FGSM) and Enhanced Momentum Iterative Fast Gradient Sign Method (EMI-FGSM) to boost the performance of the adversarial attacks. Furthermore, a transferability analysis is conducted on multiple models under cross-architecture, cross-feature and cross-architecture-feature conditions. Additionally, frequency analysis also provides us with valuable findings about adjusting the parameters in attack algorithms. Massive experiments validate that our attack yields a prominent performance compared to previous studies.
引用
收藏
页码:257 / 276
页数:20
相关论文
共 50 条
  • [1] Black-box Adversarial Attacks on Video Recognition Models
    Jiang, Linxi
    Ma, Xingjun
    Chen, Shaoxiang
    Bailey, James
    Jiang, Yu-Gang
    [J]. PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19), 2019, : 864 - 872
  • [2] Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems
    Ye, Jianbin
    Lin, Fuqiang
    Liu, Xiaoyuan
    Liu, Bo
    [J]. 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 692 - 699
  • [3] Heuristic Black-Box Adversarial Attacks on Video Recognition Models
    Wei, Zhipeng
    Chen, Jingjing
    Wei, Xingxing
    Jiang, Linxi
    Chua, Tat-Seng
    Zhou, Fengfeng
    Jiang, Yu-Gang
    [J]. THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 12338 - 12345
  • [4] KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems
    Wu, Xinghui
    Ma, Shiqing
    Shen, Chao
    Lin, Chenhao
    Wang, Qian
    Li, Qi
    Rao, Yuan
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 247 - 264
  • [5] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [6] Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
    Dong, Yinpeng
    Su, Hang
    Wu, Baoyuan
    Li, Zhifeng
    Liu, Wei
    Zhang, Tong
    Zhu, Jun
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 7706 - 7714
  • [7] Efficient Black-Box Adversarial Attacks for Deep Driving Maneuver Classification Models
    Sarker, Ankur
    Shen, Haiying
    Sen, Tanmoy
    Mendelson, Quincy
    [J]. 2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021), 2021, : 536 - 544
  • [8] Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation
    Patel, Umang
    Bhilare, Shruti
    Hati, Avik
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2024, 27 (02)
  • [9] White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
    Gil, Yotam
    Chai, Yoav
    Gorodissky, Or
    Berant, Jonathan
    [J]. 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, 2019, : 1373 - 1379
  • [10] Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition
    Xingyu Zhang
    Xiongwei Zhang
    Meng Sun
    Xia Zou
    Kejiang Chen
    Nenghai Yu
    [J]. Complex & Intelligent Systems, 2023, 9 : 65 - 79