Backdoor Attacks against Voice Recognition Systems: A Survey

被引:0
|
作者
Yan, Baochen [1 ]
Lan, Jiahe [1 ]
Yan, Zheng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Backdoor attacks; voice recognition systems; deep learning; speech recognition; speaker recognition; AUTHENTICATION; TEXTURE; COLOR;
D O I
10.1145/3701985
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and speaker recognition. They have been widely deployed in various real-world applications, from intelligent voice assistance to telephony surveillance and biometric authentication. However, prior research has revealed the vulnerability of VRSs to backdoor attacks, which pose a significant threat to the security and privacy of VRSs. Unfortunately, existing literature lacks a thorough review on this topic. This paper fills this research gap by conducting a comprehensive survey on backdoor attacks against VRSs. We first present an overview of VRSs and backdoor attacks, elucidating their basic knowledge. Then we propose a set of evaluation criteria to assess the performance of backdoor attack methods. Next, we present a comprehensive taxonomy of backdoor attacks against VRSs from different perspectives and analyze the characteristic of different categories. After that, we comprehensively review existing attack methods and analyze their pros and cons based on the proposed criteria. Furthermore, we review classic backdoor defense methods and generic audio defense techniques. Then we discuss the feasibility of deploying them on VRSs. Finally, we figure out several open issues and further suggest future research directions to motivate the research of VRSs security.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems
    Le Roux, Quentin
    Bourbao, Eric
    Teglia, Yannick
    Kallas, Kassem
    IEEE ACCESS, 2024, 12 : 47433 - 47468
  • [2] Backdoor Attacks against Learning Systems
    Ji, Yujie
    Zhang, Xinyang
    Wang, Ting
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 191 - 199
  • [3] Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
    Abdullah, Hadi
    Garcia, Washington
    Peeters, Christian
    Traynor, Patrick
    Butler, Kevin R. B.
    Wilson, Joseph
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [4] Towards Physical World Backdoor Attacks Against Skeleton Action Recognition
    Zheng, Qichen
    Yu, Yi
    Yang, Siyuan
    Liu, Jun
    Lam, Kwok-Yan
    Kot, Alex
    COMPUTER VISION - ECCV 2024, PT XLVIII, 2025, 15106 : 215 - 233
  • [5] Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition
    Hammoud, Hasan Abed Al Kader
    Liu, Shuming
    Alkhrashi, Mohammed
    AlBalawi, Fahad
    Ghanem, Bernard
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW, 2024, : 3439 - 3450
  • [6] Application of complex systems in neural networks against Backdoor attacks
    Kaviani, Sara
    Sohn, Insoo
    Liu, Huaping
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 57 - 59
  • [7] Enhancing robustness of backdoor attacks against backdoor defenses
    Hu, Bin
    Guo, Kehua
    Ren, Sheng
    Fang, Hui
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 269
  • [8] RoPE: Defending against backdoor attacks in federated learning systems
    Wang, Yongkang
    Zhai, Di-Hua
    Xia, Yuanqing
    KNOWLEDGE-BASED SYSTEMS, 2024, 293
  • [9] Backdoor Attacks Against Deep Learning Systems in the Physical World
    Wenger, Emily
    Passananti, Josephine
    Bhagoji, Arjun Nitin
    Yao, Yuanshun
    Zheng, Haitao
    Zhao, Ben Y.
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 6202 - 6211
  • [10] Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound
    Cai, Hanbo
    Zhang, Pengcheng
    Dong, Hai
    Xiao, Yan
    Koffas, Stefanos
    Li, Yiming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5852 - 5866