Multi-layer Feature Augmentation Based Transferable Adversarial Examples Generation for Speaker Recognition

被引:0
作者
Li, Zhuhai [1 ]
Zhang, Jie [1 ]
Guo, Wu [1 ]
机构
[1] Univ Sci & Technol China, NERC SLIP, Hefei 230027, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024 | 2024年 / 14865卷
关键词
Adversarial Attack; Transferability; Speaker Recognition;
D O I
10.1007/978-981-97-5591-2_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial examples that almost remain imperceptible for human can mislead practical speaker recognition systems. However, most existing adversaries generated by substitute models have a poor transferability to attack the unseen victim models. To tackle this problem, in this work we propose a multilayer feature augmentation method to improve the transferability of adversarial examples. Specifically, we apply data augmentation on the intermediate-layer feature maps of the substitute model to create diverse pseudo victim models. By attacking the ensemble of the substitute model and the corresponding augmented models, the proposed method can help the adversarial examples avoid overfitting, resulting in more transferable adversarial examples. Experimental results on the VoxCeleb dataset verify the effectiveness of the proposed approach for the speaker identification and speaker verification tasks.
引用
收藏
页码:373 / 385
页数:13
相关论文
共 50 条
  • [31] Hardware Implementation of MFCC-Based Feature Extraction for Speaker Recognition
    Ehkan, P.
    Zakaria, F. F.
    Warip, M. N. M.
    Sauli, Z.
    Elshaikh, M.
    ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315 : 471 - 480
  • [32] A new speaker recognition method based on the reliability of speech feature extraction
    Yang, Z
    Li, CW
    Zhang, LH
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 168 - 172
  • [33] M-SAN: a patch-based transferable adversarial attack using the multi-stack adversarial network
    Agrawal, Khushabu
    Bhatnagar, Charul
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (02)
  • [34] Robust Speaker Recognition Based on Multi-Stream Features
    Wang, Ning
    Wang, Lei
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-CHINA (ICCE-CHINA), 2016,
  • [35] Robust Feature Extraction for Speaker Recognition Based on Constrained Nonnegative Tensor Factorization
    Qiang Wu
    Li-Qing Zhang
    Guang-Chuan Shi
    Journal of Computer Science and Technology, 2010, 25 : 783 - 792
  • [36] Robust Feature Extraction for Speaker Recognition Based on Constrained Nonnegative Tensor Factorization
    吴强
    张丽清
    石光川
    Journal of Computer Science & Technology, 2010, 25 (04) : 783 - 792
  • [37] Robust Feature Extraction for Speaker Recognition Based on Constrained Nonnegative Tensor Factorization
    Wu, Qiang
    Zhang, Li-Qing
    Shi, Guang-Chuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 783 - 792
  • [38] TAN: A Transferable Adversarial Network for DNN-Based UAV SAR Automatic Target Recognition Models
    Du, Meng
    Sun, Yuxin
    Sun, Bing
    Wu, Zilong
    Luo, Lan
    Bi, Daping
    Du, Mingyang
    DRONES, 2023, 7 (03)
  • [39] Multi-resolution time frequency feature and complementary combination for short utterance speaker recognition
    Zhi-Yi Li
    Wei-Qiang Zhang
    Jia Liu
    Multimedia Tools and Applications, 2015, 74 : 937 - 953
  • [40] Multi-resolution time frequency feature and complementary combination for short utterance speaker recognition
    Li, Zhi-Yi
    Zhang, Wei-Qiang
    Liu, Jia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (03) : 937 - 953