Multi-layer Feature Augmentation Based Transferable Adversarial Examples Generation for Speaker Recognition

被引:0
|
作者
Li, Zhuhai [1 ]
Zhang, Jie [1 ]
Guo, Wu [1 ]
机构
[1] Univ Sci & Technol China, NERC SLIP, Hefei 230027, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024 | 2024年 / 14865卷
关键词
Adversarial Attack; Transferability; Speaker Recognition;
D O I
10.1007/978-981-97-5591-2_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial examples that almost remain imperceptible for human can mislead practical speaker recognition systems. However, most existing adversaries generated by substitute models have a poor transferability to attack the unseen victim models. To tackle this problem, in this work we propose a multilayer feature augmentation method to improve the transferability of adversarial examples. Specifically, we apply data augmentation on the intermediate-layer feature maps of the substitute model to create diverse pseudo victim models. By attacking the ensemble of the substitute model and the corresponding augmented models, the proposed method can help the adversarial examples avoid overfitting, resulting in more transferable adversarial examples. Experimental results on the VoxCeleb dataset verify the effectiveness of the proposed approach for the speaker identification and speaker verification tasks.
引用
收藏
页码:373 / 385
页数:13
相关论文
共 50 条
  • [21] A new feature extraction based the reliability of speech in speaker recognition
    Yang, Z
    Li, CW
    2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 536 - 539
  • [22] Feature extraction and normalization in SVM-based speaker recognition
    Mazibuko, Thembisile
    Mashao, Daniel
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS, 2006, : 260 - +
  • [23] TESPAR Feature Based Isolated Word Speaker Recognition System
    Sher, Munaza
    Ahmad, Nasir
    Sher, Madiha
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC 12), 2012, : 318 - 321
  • [24] Multi-layer noise reshaping and perceptual optimization for effective adversarial attack of images
    Zhiquan He
    Xujia Lan
    Jianhe Yuan
    Wenming Cao
    Applied Intelligence, 2023, 53 : 7408 - 7422
  • [25] Multi-layer noise reshaping and perceptual optimization for effective adversarial attack of images
    He, Zhiquan
    Lan, Xujia
    Yuan, Jianhe
    Cao, Wenming
    APPLIED INTELLIGENCE, 2023, 53 (07) : 7408 - 7422
  • [26] Speaker recognition based on short utterance compensation method of generative adversarial networks
    Zhangfang Hu
    Yaqin Fu
    Yuan Luo
    Xuan Xu
    Zhiguang Xia
    Hongwei Zhang
    International Journal of Speech Technology, 2020, 23 : 443 - 450
  • [27] Speaker Recognition Based on Multimodal Generative Adversarial Nets with Triplet-loss
    Chen Ying
    Chen Huangkang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (02) : 379 - 385
  • [28] Speaker recognition based on short utterance compensation method of generative adversarial networks
    Hu, Zhangfang
    Fu, Yaqin
    Luo, Yuan
    Xu, Xuan
    Xia, Zhiguang
    Zhang, Hongwei
    INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY, 2020, 23 (02) : 443 - 450
  • [29] Data Augmentation Using Deep Generative Models for Embedding Based Speaker Recognition
    Wang, Shuai
    Yang, Yexin
    Wu, Zhanghao
    Qian, Yanmin
    Yu, Kai
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2020, 28 : 2598 - 2609
  • [30] A new speaker recognition method based on the reliability of speech feature extraction
    Yang, Z
    Li, CW
    Zhang, LH
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 168 - 172