A Detection Algorithm for Audio Adversarial Examples in EI-Enhanced Automatic Speech Recognition

نویسندگان

چکیده

Benefiting from the development of big data, edge computing, and deep learning, splendid breakthroughs have been made in automatic speech recognition (ASR) recent years. Since then, more smart products chosen as interface for human-computer interaction, which causes popularity intelligence (EI) enhanced recognition. While people are enjoying social changes brought by technology, a factor instability quietly emerged called audio adversarial example is type deliberately generated attackers via adding subtle perturbations to original signal. The added sound like certain noise that cannot be precepted human but will cause ASR system make wrong transcription. Three detection algorithms examples proposed this thesis, namely, robust algorithm based on WER (word error rate), feature ADR (adversarial ratio), collaborative neural network. experiment results show three thesis great discrimination achieve high AUC scores. Among them, cooperative best worst. In addition, we found tends higher accuracy score lower recall score, while converse performance. Moreover, since method combines advantages methods, it presents better performance with respect accuracy, recall, F1 score.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Speech is a common and effective way of communication between humans, and modern consumer devices such as smartphones and home hubs are equipped with deep learning based accurate automatic speech recognition to enable natural interaction between humans and machines. Recently, researchers have demonstrated powerful attacks against machine learning models that can fool them to produce incorrect r...

متن کامل

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

We construct targeted audio adversarial examples on automatic speech recognition. Given any audio waveform, we can produce another that is over 99.9% similar, but transcribes as any phrase we choose (recognizing up to 50 characters per second of audio). We apply our white-box iterative optimization-based attack to Mozilla’s implementation DeepSpeech end-to-end, and show it has a 100% success ra...

متن کامل

Adversarial Examples for Malware Detection

Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor—yet carefully selected—perturbations. In this work, we expand on existing adversarial example crafting algorithms to construct a highly-effective attack that uses adversarial examples against malware detecti...

متن کامل

A Database for Automatic Persian Speech Emotion Recognition: Collection, Processing and Evaluation

Abstract   Recent developments in robotics automation have motivated researchers to improve the efficiency of interactive systems by making a natural man-machine interaction. Since speech is the most popular method of communication, recognizing human emotions from speech signal becomes a challenging research topic known as Speech Emotion Recognition (SER). In this study, we propose a Persian em...

متن کامل

A motion based approach for audio-visual automatic speech recognition

............................................................................................... i LIST OF PUBLICATIONS ........................................................................... ii ACKNOWLEDGMENTS ........................................................................... iii GLOSSARY .................................................................................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2022

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2022/3091495