Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns

被引:1
作者
Zong, Wei [1 ]
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
Kim, Jongkil [2 ]
Le, Ngoc Thuy [1 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Ewha Womans Univ, Dept Cyber Secur, Seoul 03760, South Korea
关键词
adversarial examples; automatic speech recognition; visualization; adversarial machine learning; adversarial example detection;
D O I
10.3390/jimaging8120324
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Automatic Speech Recognition (ASR) systems are ubiquitous in various commercial applications. These systems typically rely on machine learning techniques for transcribing voice commands into text for further processing. Despite their success in many applications, audio Adversarial Examples (AEs) have emerged as a major security threat to ASR systems. This is because audio AEs are able to fool ASR models into producing incorrect results. While researchers have investigated methods for defending against audio AEs, the intrinsic properties of AEs and benign audio are not well studied. The work in this paper shows that the machine learning decision boundary patterns around audio AEs and benign audio are fundamentally different. Using dimensionality-reduction techniques, this work shows that these different patterns can be visually distinguished in two-dimensional (2D) space. This in turn allows for the detection of audio AEs using anomal- detection methods.
引用
收藏
页数:21
相关论文
共 68 条
[1]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[2]   Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems [J].
Abdullah, Hadi ;
Rahman, Muhammad Sajidur ;
Garcia, Washington ;
Warren, Kevin ;
Yadav, Anurag Swarnim ;
Shrimpton, Tom ;
Traynor, Patrick .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :712-729
[3]   Feature Purification: How Adversarial Training Performs Robust Deep Learning [J].
Allen-Zhu, Zeyuan ;
Li, Yuanzhi .
2021 IEEE 62ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2021), 2022, :977-988
[4]  
Alzantot M., 2018, Did you hear that? adversarial examples against automatic speech recognition
[5]  
Amodei D, 2016, PR MACH LEARN RES, V48
[6]  
[Anonymous], 2011, P IEEE 2011 WORKSHOP
[7]  
[Anonymous], 2006, P 23 INT C MACH LEAR, DOI 10.1145/1143844.1143891
[8]  
Ardila R., 2019, arXiv
[9]  
Athalye A., 2018, arXiv
[10]  
Athalye A, 2018, PR MACH LEARN RES, V80