Audio Adversarial Examples Generation with Recurrent Neural Networks

被引:0
|
作者
Chang, Kuei-Huan [1 ]
Huang, Po-Hao [1 ]
Yu, Honggang [2 ]
Jin, Yier [2 ]
Wang, Ting-Chi [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous methods of performing adversarial attacks against speech recognition systems often treat this problem as a solely optimization problem and require iterative updates to generate optimal solutions. Although they can achieve high success rate, the process is too computational heavy even with the help of GPU. In this paper, we introduce a new type of real-time adversarial attack methodology, which applies Recurrent Neural Networks (RNN) with a two-step training process to generate adversarial examples targeting a Keyword Spotting (KWS) system. We extend our attack to physical world by adding extra constraints in order to eliminate the distortions in real world. In the experiment, we launch a real-time adversarial attack on the KNITS system both in digital and physical world. The experimental results of digital world show that the execution time of our attack is more than 400 times faster than the state-of-the-art attack (i.e., C&W attack) with the comparable attack success rate. In physical world, after adding extra constraints, the perturbation becomes more robust such that the average attack success rate increases from 40.3% to 84.3%.
引用
收藏
页码:488 / 493
页数:6
相关论文
共 50 条
  • [1] Robustness of deep neural networks in adversarial examples
    [J]. Song, Xiao (songxiao@buaa.edu.cn), 1600, University of Cincinnati (24):
  • [2] ROBUSTNESS OF DEEP NEURAL NETWORKS IN ADVERSARIAL EXAMPLES
    Teng, Da
    Song, Xiao m
    Gong, Guanghong
    Han, Liang
    [J]. INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2017, 24 (02): : 123 - 133
  • [3] Adversarial Dropout for Recurrent Neural Networks
    Park, Sungrae
    Song, Kyungwoo
    Ji, Mingi
    Lee, Wonsung
    Moon, Il-Chul
    [J]. THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 4699 - 4706
  • [4] A Reinforced Generation of Adversarial Examples for Neural Machine Translation
    Zou, Wei
    Huang, Shujian
    Xie, Jun
    Dai, Xinyu
    Chen, Jiajun
    [J]. 58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), 2020, : 3486 - 3497
  • [5] NEURAL AUDIO DECORRELATION USING GENERATIVE ADVERSARIAL NETWORKS
    Anemuller, Carlotta
    Thiergart, Oliver
    Habets, Emanuel A. P.
    [J]. 2023 IEEE WORKSHOP ON APPLICATIONS OF SIGNAL PROCESSING TO AUDIO AND ACOUSTICS, WASPAA, 2023,
  • [6] Interpretability Analysis of Deep Neural Networks With Adversarial Examples
    Dong, Yin-Peng
    Su, Hang
    Zhu, Jun
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2022, 48 (01): : 75 - 86
  • [7] Compound adversarial examples in deep neural networks q
    Li, Yanchun
    Li, Zhetao
    Zeng, Li
    Long, Saiqin
    Huang, Feiran
    Ren, Kui
    [J]. INFORMATION SCIENCES, 2022, 613 : 50 - 68
  • [8] Assessing Threat of Adversarial Examples on Deep Neural Networks
    Graese, Abigail
    Rozsa, Andras
    Boult, Terrance E.
    [J]. 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 69 - 74
  • [9] Generating Adversarial Texts for Recurrent Neural Networks
    Liu, Chang
    Lin, Wang
    Yang, Zhengfeng
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2020, PT I, 2020, 12396 : 39 - 51
  • [10] DOMPTEUR: Taming Audio Adversarial Examples
    Eisenhofer, Thorsten
    Schoenherr, Lea
    Frank, Joel
    Speckemeier, Lars
    Kolossa, Dorothea
    Holz, Thorsten
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2309 - 2326