FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation

Automatic Speech Recognition services (ASRs) inherit deep neural networks' vulnerabilities like crafted adversarial examples. Existing methods often suffer from low efficiency because the target phases are added to the entire audio sample, resulting in high demand for computational resources. T...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Miao, Yuantian, Chen, Chao, Pan, Lei, Zhang, Jun, Xiang, Yang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Miao, Yuantian
Chen, Chao
Pan, Lei
Zhang, Jun
Xiang, Yang
description Automatic Speech Recognition services (ASRs) inherit deep neural networks' vulnerabilities like crafted adversarial examples. Existing methods often suffer from low efficiency because the target phases are added to the entire audio sample, resulting in high demand for computational resources. This paper proposes a novel scheme named FAAG as an iterative optimization-based method to generate targeted adversarial examples quickly. By injecting the noise over the beginning part of the audio, FAAG generates adversarial audio in high quality with a high success rate timely. Specifically, we use audio's logits output to map each character in the transcription to an approximate position of the audio's frame. Thus, an adversarial example can be generated by FAAG in approximately two minutes using CPUs only and around ten seconds with one GPU while maintaining an average success rate over 85%. Specifically, the FAAG method can speed up around 60% compared with the baseline method during the adversarial example generation process. Furthermore, we found that appending benign audio to any suspicious examples can effectively defend against the targeted adversarial attack. We hope that this work paves the way for inventing new adversarial attacks against speech recognition with computational constraints.
doi_str_mv 10.48550/arxiv.2202.05416
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2202_05416</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2202_05416</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-1a352664641f5bf84692b853764fc24374ca228e303310968a6eb4a52ececedf3</originalsourceid><addsrcrecordid>eNotj8tqwzAURLXpoqT9gK6qH7Ar63GtZCdC7QYC3mRvrmWpEUnsICum_fumbpnFwHAYOIS8FCyXWin2hvErzDnnjOdMyQIeSVMZU29ohVOipp9dnDAGPFNz68NIaze4iCmMA03HON4-j3Q3pPtkU5gdNSmhPdHmmsIlTAv3RB48nif3_N8rcqjeD9uPbN_Uu63ZZwglZAUKxQEkyMKrzmsJa95pJUqQ3nIpSmmRc-0EE6Jga9AIrpOouLP39F6syOvf7WLUXmO4YPxuf83axUz8AEU2SFI</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation</title><source>arXiv.org</source><creator>Miao, Yuantian ; Chen, Chao ; Pan, Lei ; Zhang, Jun ; Xiang, Yang</creator><creatorcontrib>Miao, Yuantian ; Chen, Chao ; Pan, Lei ; Zhang, Jun ; Xiang, Yang</creatorcontrib><description>Automatic Speech Recognition services (ASRs) inherit deep neural networks' vulnerabilities like crafted adversarial examples. Existing methods often suffer from low efficiency because the target phases are added to the entire audio sample, resulting in high demand for computational resources. This paper proposes a novel scheme named FAAG as an iterative optimization-based method to generate targeted adversarial examples quickly. By injecting the noise over the beginning part of the audio, FAAG generates adversarial audio in high quality with a high success rate timely. Specifically, we use audio's logits output to map each character in the transcription to an approximate position of the audio's frame. Thus, an adversarial example can be generated by FAAG in approximately two minutes using CPUs only and around ten seconds with one GPU while maintaining an average success rate over 85%. Specifically, the FAAG method can speed up around 60% compared with the baseline method during the adversarial example generation process. Furthermore, we found that appending benign audio to any suspicious examples can effectively defend against the targeted adversarial attack. We hope that this work paves the way for inventing new adversarial attacks against speech recognition with computational constraints.</description><identifier>DOI: 10.48550/arxiv.2202.05416</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Sound</subject><creationdate>2022-02</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2202.05416$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2202.05416$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Miao, Yuantian</creatorcontrib><creatorcontrib>Chen, Chao</creatorcontrib><creatorcontrib>Pan, Lei</creatorcontrib><creatorcontrib>Zhang, Jun</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><title>FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation</title><description>Automatic Speech Recognition services (ASRs) inherit deep neural networks' vulnerabilities like crafted adversarial examples. Existing methods often suffer from low efficiency because the target phases are added to the entire audio sample, resulting in high demand for computational resources. This paper proposes a novel scheme named FAAG as an iterative optimization-based method to generate targeted adversarial examples quickly. By injecting the noise over the beginning part of the audio, FAAG generates adversarial audio in high quality with a high success rate timely. Specifically, we use audio's logits output to map each character in the transcription to an approximate position of the audio's frame. Thus, an adversarial example can be generated by FAAG in approximately two minutes using CPUs only and around ten seconds with one GPU while maintaining an average success rate over 85%. Specifically, the FAAG method can speed up around 60% compared with the baseline method during the adversarial example generation process. Furthermore, we found that appending benign audio to any suspicious examples can effectively defend against the targeted adversarial attack. We hope that this work paves the way for inventing new adversarial attacks against speech recognition with computational constraints.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Sound</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8tqwzAURLXpoqT9gK6qH7Ar63GtZCdC7QYC3mRvrmWpEUnsICum_fumbpnFwHAYOIS8FCyXWin2hvErzDnnjOdMyQIeSVMZU29ohVOipp9dnDAGPFNz68NIaze4iCmMA03HON4-j3Q3pPtkU5gdNSmhPdHmmsIlTAv3RB48nif3_N8rcqjeD9uPbN_Uu63ZZwglZAUKxQEkyMKrzmsJa95pJUqQ3nIpSmmRc-0EE6Jga9AIrpOouLP39F6syOvf7WLUXmO4YPxuf83axUz8AEU2SFI</recordid><startdate>20220210</startdate><enddate>20220210</enddate><creator>Miao, Yuantian</creator><creator>Chen, Chao</creator><creator>Pan, Lei</creator><creator>Zhang, Jun</creator><creator>Xiang, Yang</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220210</creationdate><title>FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation</title><author>Miao, Yuantian ; Chen, Chao ; Pan, Lei ; Zhang, Jun ; Xiang, Yang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-1a352664641f5bf84692b853764fc24374ca228e303310968a6eb4a52ececedf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Sound</topic><toplevel>online_resources</toplevel><creatorcontrib>Miao, Yuantian</creatorcontrib><creatorcontrib>Chen, Chao</creatorcontrib><creatorcontrib>Pan, Lei</creatorcontrib><creatorcontrib>Zhang, Jun</creatorcontrib><creatorcontrib>Xiang, Yang</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Miao, Yuantian</au><au>Chen, Chao</au><au>Pan, Lei</au><au>Zhang, Jun</au><au>Xiang, Yang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation</atitle><date>2022-02-10</date><risdate>2022</risdate><abstract>Automatic Speech Recognition services (ASRs) inherit deep neural networks' vulnerabilities like crafted adversarial examples. Existing methods often suffer from low efficiency because the target phases are added to the entire audio sample, resulting in high demand for computational resources. This paper proposes a novel scheme named FAAG as an iterative optimization-based method to generate targeted adversarial examples quickly. By injecting the noise over the beginning part of the audio, FAAG generates adversarial audio in high quality with a high success rate timely. Specifically, we use audio's logits output to map each character in the transcription to an approximate position of the audio's frame. Thus, an adversarial example can be generated by FAAG in approximately two minutes using CPUs only and around ten seconds with one GPU while maintaining an average success rate over 85%. Specifically, the FAAG method can speed up around 60% compared with the baseline method during the adversarial example generation process. Furthermore, we found that appending benign audio to any suspicious examples can effectively defend against the targeted adversarial attack. We hope that this work paves the way for inventing new adversarial attacks against speech recognition with computational constraints.</abstract><doi>10.48550/arxiv.2202.05416</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2202.05416
ispartof
issn
language eng
recordid cdi_arxiv_primary_2202_05416
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Sound
title FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T05%3A05%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=FAAG:%20Fast%20Adversarial%20Audio%20Generation%20through%20Interactive%20Attack%20Optimisation&rft.au=Miao,%20Yuantian&rft.date=2022-02-10&rft_id=info:doi/10.48550/arxiv.2202.05416&rft_dat=%3Carxiv_GOX%3E2202_05416%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true