Filters








13,336 Hits in 3.8 sec

Audio Attacks and Defenses against AED Systems – A Practical Study [article]

Rodrigo dos Santos, Shirin Nilizadeh
2021 arXiv   pre-print
In this paper, we evaluate deep learning-enabled AED systems against evasion attacks based on adversarial examples.  ...  Such disturbances are easy to create, to perform and to reproduce, and can be accessible to a large number of potential attackers, even non-technically savvy ones.  ...  Some work has studied countermeasure techniques for improving the resilience of these systems against adversarial attacks [15] , [62] , [81] .  ... 
arXiv:2106.07428v4 fatcat:cqfgqktaercttnchaflhzxmaeu

"…It's Just Very Hard To Fail A Student…": Decision-Making And Defences Against Anxiety – An Ethnographic And Practice-Near Study Of Practice Assessment Panels

Jo Finch
2016 Journal of Social Work Practice  
The paper thus documents findings from an ethnographic study of four PAPs in England, utilising a practice-near analytical approach.  ...  words) The practice learning site is an important place of determining suitability for social work practice and as such is a key site of gate keeping.  ...  minute and invaluable help with the field work.  ... 
doi:10.1080/02650533.2016.1158156 fatcat:5tgw2ubcmjhwfj7c7lne7jbqbq

Digital security awareness and practices of journalists in Turkey: A descriptive study

Behlül Çalışkan
2019 Conflict & Communication Online  
The study reveals that journalists in Turkey are faced with security issues ranging from personal threats to physical and digital attacks and that they rely heavily on digital technology.  ...  The study concludes that they lack awareness of digital security risks, and only a small percentage have undertaken safety training to protect themselves and their sources in either the physical or digital  ...  The subject of this study is the digital surveillance awareness and security practices of journalists.  ... 
doaj:766757b2775f4ee99cd2445cca1aaf47 fatcat:zez2sejkjbehrcdx2ijam3vpxa

Remembrance of data passed: a study of disk sanitization practices

S.L. Garfinkel, A. Shelat
2003 IEEE Security and Privacy  
Professors Hal Abelson and Charles Leiserson have also been a source of encouragement and moral support.  ...  Acknowledgments Many MIT students and faculty members provided useful comments and insights on this project.  ...  with a random character, overwrite against with the character's complement, and then verify.  ... 
doi:10.1109/msecp.2003.1176992 fatcat:pywpqoexbnccxf6ltonih6nfzm

Young People's Experiences With an Empowerment-Based Behavior Change Intervention to Prevent Sexual Violence in Nairobi Informal Settlements: A Qualitative Study

Anna E. Kågesten, Phoene Mesa Oware, Wendy Ntinyari, Nickson Langat, Benjamin Mboya, Anna Mia Ekström
2021 Global Health: Science and Practice Journal  
We conducted a qualitative study in Nairobi slums with students (aged 15-21 years) who had participated in 2 parallel school-based curriculums called IMPower (girls) and Your Moment of Truth (boys) at  ...  This qualitative study investigated girls' and boys' experiences of the intervention to identify potential mechanisms of change.  ...  WN, NL, and BM contributed to the data collection, interpretation of study findings, and edited the manuscript.  ... 
doi:10.9745/ghsp-d-21-00105 pmid:34593578 pmcid:PMC8514032 fatcat:n4pi3izuyvgivj2vzmahbov34e

Adversarial attacks and defenses in Speaker Recognition Systems: A survey [article]

Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou
2022 arXiv   pre-print
Unfortunately, existing literature lacks a thorough review of this topic. In this paper, we fill this gap by performing a comprehensive survey on adversarial attacks and defenses in SRSs.  ...  Recognition Systems (SRS).  ...  Finally, we suggest studying poisoning attacks against SRSs and corresponding defense methods.  ... 
arXiv:2205.13685v1 fatcat:srbs2b5hkzgh7ff37kuyufbulm

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition [article]

Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter
2018 arXiv   pre-print
In this paper, we demonstrate that not only are more practical and surreptitious attacks feasible but they can even be automatically constructed.  ...  The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks.  ...  The contributions of this paper are summarized as follows: • Practical adversarial attack against ASR systems. We designed and implemented the first practical adversarial attacks against ASR systems.  ... 
arXiv:1801.08535v3 fatcat:6ntzo26bejaldpbxmcgim4y4dq

Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

Jiajie Zhang, Bingsheng Zhang, Bincheng Zhang
2019 Proceedings of the Seventh International Workshop on Security in Cloud Computing - SCC '19  
In this work, we propose several proactive defense mechanisms against targeted audio adversarial examples in the ASR systems via code modulation and audio compression.  ...  Constructing a generic and robust defense mechanism to resolve this issue remains an open problem.  ...  In this work, we, for the very first time, study the proactive defense strategies for the cloud-aided ASR systems against audio adversarial examples.  ... 
doi:10.1145/3327962.3331456 dblp:conf/asiaccsscc/ZhangZZ19 fatcat:u6ahu5yisjhgtfs2pxojpwvzyu

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems [article]

Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo
2021 arXiv   pre-print
, adversarial training, etc.), a systematic understanding of ASR security (both attacks and defenses) is still missing, especially on how realistic such threats are and how general existing protection  ...  Although recent studies have brought to light the weaknesses of popular ASR systems that enable out-of-band signal attack, adversarial attack, etc., and further proposed various remedies (signal smoothing  ...  In our systematization, we consider the below aspects when studying those existing defense solutions. 1) Defense methods: Considering the attacks against ASR might mainly target a particular module, defense  ... 
arXiv:2103.10651v2 fatcat:ryllxp63hvgoxm5d6ef7n7l55a

LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications [article]

Zirui Xu, Fuxun Yu, Xiang Chen
2019 arXiv   pre-print
In this paper, we propose LanCe -- a comprehensive and lightweight CNN defense methodology against different physical adversarial attacks.  ...  We apply such defense methodology into both image and audio CNN recognition scenarios and analyze the computational complexity for each scenario, respectively.  ...  DEFENSE AGAINST AUDIO PHYSICAL ADVERSARIAL ATTACK In this section, we will introduce the detailed defense design flow for the audio physical adversarial attacks. A.  ... 
arXiv:1910.08536v1 fatcat:tyma22bykvfwjjrmxmrzjfsyy4

A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds [chapter]

S. Abhishek Anand, Nitesh Saxena
2017 Lecture Notes in Computer Science  
In this paper, we set out to propose a practical defense mechanism against keyboard acoustic attacks specifically on password typing and test its performance against several attack vectors.  ...  While research is still ongoing towards further improving acoustic side channel attacks, much work has been lacking in building a working defense mechanism against such class of attacks.  ...  Our Contributions: In this paper, we set out to propose a practical defense mechanism against keyboard acoustic side channel attacks specifically on password typing and evaluate its performance against  ... 
doi:10.1007/978-3-662-54970-4_21 fatcat:zsxkjri7ofaehhukz5iz2om3fi

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems [article]

Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah
2019 arXiv   pre-print
Compared with existing attacks, SirenAttack highlights with a set of significant features: (i) versatile -- it is able to deceive a range of end-to-end acoustic systems under both white-box and black-box  ...  In this paper, we present SirenAttack, a new class of attacks to generate adversarial audios.  ...  Defense for Acoustic Systems As traditional attacks on acoustic systems have been extensively studied, there are many defense methods to eliminate the effects of them.  ... 
arXiv:1901.07846v2 fatcat:4kaqq2ijuvalrequqd6tlt6q4a

Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview

Xiaojiao Chen, Sheng Li, Hao Huang
2021 Applied Sciences  
Then we provide a concise introduction to defense methods against adversarial attacks.  ...  Finally, we propose a systematic classification of adversarial attacks and defense methods, with which we hope to provide a better understanding of the classification and structure for beginners in this  ...  The defense against adversarial attacks is mainly carried out in the field of pictures, and there are many successful cases of defense [55] [56] [57] .  ... 
doi:10.3390/app11188450 fatcat:zjige7gepbdvnpk2i3qwyqv2oe

Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles [article]

Jiwei Guan, Xi Zheng, Chen Wang, Yipeng Zhou, Alireza Jolfa
2021 arXiv   pre-print
To this end, we propose a novel multimodal deep learning classification system to defend against inaudible command attacks.  ...  In this paper, we aim to develop a more practical solution by using camera views to defend against inaudible command attacks where ADAS are capable of detecting their environment via multi-sensors.  ...  Audio Adversarial Defense To defend against these audio attacks, there are some existing defences.  ... 
arXiv:2104.09872v3 fatcat:orgbuv7b4reyzpv76s5amtnxzy

The Attacker's Perspective on Automatic Speaker Verification: An Overview [article]

Rohan Kumar Das, Xiaohai Tian, Tomi Kinnunen, Haizhou Li
2020 arXiv   pre-print
We conclude the study with discussion on selected attacks and leveraging from such knowledge to improve defense mechanisms against adversarial attacks.  ...  While many types of non-proactive attacks (and their defenses) have been studied in the past, attacker's perspective on ASV, represents a far less explored direction.  ...  A1687b0033 from the Singapore Government's Research, Innovation and Enterprise 2020 plan (Advanced Manufacturing and Engineering domain) and in part by the Academy of Finland (Proj.  ... 
arXiv:2004.08849v1 fatcat:ywgbjq5oafbw3pu5mtad7fatru
« Previous Showing results 1 — 15 out of 13,336 results