pith. sign in

arxiv: 2605.20519 · v1 · pith:TI2GY5XAnew · submitted 2026-05-19 · 💻 cs.SD · cs.AI

Codec-Robust Attacks on Audio LLMs

Pith reviewed 2026-05-21 06:40 UTC · model grok-4.3

classification 💻 cs.SD cs.AI
keywords adversarial attacksaudio large language modelsneural audio codecslossy compressionrobustnesstargeted attacks
0
0 comments X

The pith

Perturbations optimized inside a neural audio codec's latent space survive lossy compression and achieve high attack success on Audio LLMs.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper establishes that adversarial attacks on Audio Large Language Models remain effective even after real-world codec compression by moving the optimization from the raw waveform into the codec's own continuous latent space. Waveform perturbations are largely discarded during compression, but latent-space versions pass through because they align with how codecs allocate bits. This matters for deployed systems that rely on codecs both for efficiency and as a defense layer. The method reaches 85.5 percent average target-substring success on Opus at moderate bitrates, far above waveform baselines that stay below 26 percent, and transfers to held-out codecs such as MP3 and AAC-LC without retraining.

Core claim

CodecAttack optimizes a perturbation directly in the continuous latent space of a neural audio codec and hardens it with multi-bitrate straight-through Expectation-over-Transformation, allowing the attack to transmit through the compression channel that removes most waveform perturbations.

What carries the argument

Optimization of the adversarial perturbation in the continuous latent representation of the neural audio codec, which aligns with the codec's internal bit allocation.

If this is right

  • Lossy compression preprocessing no longer reliably blocks adversarial audio inputs to Audio LLMs.
  • The same latent perturbation transfers to other codecs such as MP3 and AAC-LC without retraining.
  • Perturbation energy concentrates below 4 kHz, matching the frequency bands that receive the most bits during compression.
  • Three different target Audio LLM models remain vulnerable under realistic deployment pipelines.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Security designs that treat codec compression as a first line of defense will need additional safeguards.
  • Similar latent-space optimization could be tested on other compression pipelines such as video or image codecs.
  • Model developers may need to incorporate codec simulation directly into training or detection routines.

Load-bearing premise

The codec will continue to allocate most bits to the low-frequency region where the latent perturbation places its energy.

What would settle it

Running the attack through a codec that distributes bits uniformly across all frequencies or at extremely high bitrates and measuring whether success rates drop to waveform-baseline levels.

Figures

Figures reproduced from arXiv: 2605.20519 by Amir Houmansdar, Jaechul Roh, Jean-Philippe Monteuuis, Jonathan Petit.

Figure 1
Figure 1. Figure 1: Overview of CodecAttack. A benign audio carrier is encoded into EnCodec’s continuous latent space and perturbed within a bounded budget (Step 1–2). During optimization (Step 3), the perturbed latent is decoded, compressed by Opus at a randomly sampled bitrate, and fed to the victim Audio LLM; the cross-entropy loss against the target command is backpropagated through the model, the codec via a straight-thr… view at source ↗
Figure 2
Figure 2. Figure 2: Threat model deployment scenarios. Each scenario targets a real-world Audio LLM application where the adversary injects a target command via adversarial audio. S1: a financial voice agent tricked into executing unauthorized actions. S2: an interview screening agent forced to output a favorable hiring verdict. S3: music-industry classifiers (AI-content detection, copyright matching) forced to produce benign… view at source ↗
Figure 3
Figure 3. Figure 3: Structural vs. adversarial spectral placement. Per-Bark fractional energy for three perturbation sources at matched norm: (A) Jacobian-derived decoder envelope (no optimization), (B) random latent draws (σ-matched, no adversarial objective), and (C) actual adversarial δ (ϵ=1.0). Sources A and B overlay band-for-band, both placing 92–93% of energy below 4 kHz, confirming that the sub-4 kHz confinement is a … view at source ↗
Figure 4
Figure 4. Figure 4: Codec-EoT ablation (S3a, Qwen2-Audio, ϵ=1.0, n=40). Blue: codec-robust multi-bitrate EoT. Red: no EoT (clean-channel objective only). Labels show the ASR drop from removing EoT. The dotted line separates in-distribution Opus channels (left) from held-out MP3 and AAC-LC (right). Without EoT, Opus ≤32 kbps collapses to 0% and AAC-LC 64k drops by 32.5 pp. To verify that multi-bitrate hardening is necessary ra… view at source ↗
Figure 5
Figure 5. Figure 5: Success counts (out of 3 carriers) for Qwen2-Audio at [PITH_FULL_IMAGE:figures/full_fig_p016_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: EnCodec decoder energy by latent dimension and Bark band. Each row is one of the 128 latent dimensions; color indicates fractional output energy in each Bark band, computed from the decoder Jacobian ∂D/∂z. All dimensions peak in bands 12–14 (≈1.8–2.5 kHz) with negligible energy above 4 kHz, showing that the decoder has no basis function pointing at the high band. A latent-space perturbation is therefore st… view at source ↗
Figure 7
Figure 7. Figure 7: Per-Bark fractional perturbation energy on speech vs. music carriers. Music concentrates [PITH_FULL_IMAGE:figures/full_fig_p018_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: Perturbation survival through Opus at 16–128 kbps. [PITH_FULL_IMAGE:figures/full_fig_p018_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: Spectral placement of latent vs. waveform perturbations at matched SNR ( [PITH_FULL_IMAGE:figures/full_fig_p019_9.png] view at source ↗
read the original abstract

Prior attacks on Audio Large Language Models (Audio LLMs) demonstrated that carefully crafted waveform-domain perturbations can force targeted adversarial outputs. As a defense mechanism against these attacks, real-world codec compression preprocessing has been studied to both detect and remove the perturbations. Yet no existing attack has demonstrated robustness against these compressions. We introduce CodecAttack, which optimizes a perturbation in a neural audio codec's continuous latent space rather than directly perturbing the audio waveform. We show that the codec's compression channel, which discards waveform perturbations, transmits perturbations crafted in its own latent space. To further harden the attack across real-world compression channels, we apply multi-bitrate straight-through Expectation-over-Transformation (EoT), all without modifying the target model. Across three realistic Audio LLM deployment scenarios and three target models, CodecAttack achieves an average 85.5% target-substring attack success rate (ASR) on Opus at moderate bitrates, while the waveform baseline trained with identical EoT hardening does not exceed 26% at any bitrate. The attack transfers to held-out codecs, reaching up to 100% ASR on MP3 and 84% on AAC-LC without retraining. A per-band energy analysis shows that the latent perturbation concentrates below 4kHz, exactly where codecs allocate the most bits, while the waveform baseline spreads into higher frequencies that codecs discard. These results demonstrate that lossy compression is not a reliable defense against adversarial audio and that codec-aware attacks pose a practical threat to deployed Audio LLM systems.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

1 major / 2 minor

Summary. The manuscript introduces CodecAttack, which generates adversarial perturbations for Audio LLMs by optimizing directly in the continuous latent space of a neural audio codec rather than the waveform domain. Using multi-bitrate straight-through Expectation-over-Transformation (EoT) hardening without modifying the target model, it reports an average 85.5% target-substring attack success rate (ASR) on Opus at moderate bitrates across three models and scenarios, substantially outperforming an EoT-hardened waveform baseline (≤26% ASR at any bitrate). The attack transfers to held-out codecs (up to 100% ASR on MP3, 84% on AAC-LC). A per-band energy analysis attributes the robustness to the latent perturbation concentrating below 4 kHz, where codecs allocate most bits.

Significance. If the results hold, the work shows that codec preprocessing is not a reliable defense against adversarial attacks on Audio LLMs when perturbations are optimized in the codec's own latent space. The concrete ASR numbers, direct baseline comparison, and cross-codec transfer provide practical evidence of the threat. Credit is given for applying EoT across bitrates and for linking perturbation energy distribution to codec bit-allocation behavior. This could prompt more robust defenses or codec-aware training in audio AI systems.

major comments (1)
  1. [Per-band energy analysis] Per-band energy analysis (abstract and results section): the claim that latent-space optimization enables codec robustness rests on the observation that perturbations concentrate below 4 kHz while the waveform baseline spreads to higher frequencies. However, the manuscript contains no ablation comparing against a waveform attack that is explicitly band-limited to the same <4 kHz region under identical EoT hardening. Without this control, it is unclear whether the 85.5% vs. ≤26% gap is due to the latent construction itself or simply to low-frequency concentration, which directly affects the central explanation for why the attack survives compression.
minor comments (2)
  1. [Experimental results] The abstract and experimental description omit the exact optimization hyperparameters, number of EoT samples per bitrate, and any statistical significance tests or standard deviations on the reported ASR figures; adding these would strengthen reproducibility.
  2. [Abstract] Clarify the identities of the three target models and the three realistic Audio LLM deployment scenarios to help readers assess generalizability.

Simulated Author's Rebuttal

1 responses · 0 unresolved

We thank the referee for the constructive comment, which highlights a valuable opportunity to strengthen the causal interpretation of our results. We address the concern directly below.

read point-by-point responses
  1. Referee: [Per-band energy analysis] Per-band energy analysis (abstract and results section): the claim that latent-space optimization enables codec robustness rests on the observation that perturbations concentrate below 4 kHz while the waveform baseline spreads to higher frequencies. However, the manuscript contains no ablation comparing against a waveform attack that is explicitly band-limited to the same <4 kHz region under identical EoT hardening. Without this control, it is unclear whether the 85.5% vs. ≤26% gap is due to the latent construction itself or simply to low-frequency concentration, which directly affects the central explanation for why the attack survives compression.

    Authors: We agree that the existing per-band analysis shows a correlation but does not isolate whether the robustness arises specifically from latent-space optimization or from low-frequency concentration alone. To resolve this ambiguity, we will add a new ablation in the revised manuscript: a waveform-domain attack explicitly constrained to the <4 kHz band and trained under identical multi-bitrate straight-through EoT hardening. Updated ASR results, energy distributions, and discussion will be included to clarify whether the latent construction provides an advantage beyond frequency localization. revision: yes

Circularity Check

0 steps flagged

No circularity: empirical ASR measurements on held-out codecs and bitrates

full rationale

The paper reports direct empirical results from optimizing perturbations in codec latent space and measuring target-substring ASR on Opus, MP3, and AAC-LC at various bitrates, with comparisons to EoT-hardened waveform baselines. The per-band energy analysis is presented as an observational explanation for why latent perturbations survive compression (concentrating below 4 kHz where codecs allocate bits), but this is post-hoc correlation from the generated examples rather than a closed derivation or fitted parameter renamed as prediction. No equations, self-citations, or uniqueness claims reduce the central attack success claims to inputs defined within the paper itself. The evaluation uses held-out codecs and bitrates, keeping the results falsifiable and independent of any internal construction loop.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

The central claim rests on standard assumptions of gradient-based optimization and the existence of differentiable codec latent spaces; no free parameters, axioms, or invented entities are explicitly introduced beyond the attack formulation itself.

pith-pipeline@v0.9.0 · 5809 in / 1063 out tokens · 39616 ms · 2026-05-21T06:40:16.653685+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

66 extracted references · 66 canonical work pages · 18 internal anchors

  1. [1]

    Realtime API: Speech-to-speech multimodal interactions

    OpenAI. Realtime API: Speech-to-speech multimodal interactions. https://platform. openai.com/docs/guides/realtime, 2024

  2. [2]

    Build real-time conversational agents with Gemini 3.1 Flash Live

    Google. Build real-time conversational agents with Gemini 3.1 Flash Live. https://blog.google/innovation-and-ai/technology/developers-tools/ build-with-gemini-3-1-flash-live/, 2026

  3. [3]

    Gemini Enterprise for Customer Experience

    Google Cloud. Gemini Enterprise for Customer Experience. https://cloud.google.com/ products/gemini-enterprise-for-customer-experience, 2026

  4. [4]

    How generative ai voice agents will transform medicine.npj Digital Medicine, 8(1):353, 2025

    Scott J Adams, Julián N Acosta, and Pranav Rajpurkar. How generative ai voice agents will transform medicine.npj Digital Medicine, 8(1):353, 2025

  5. [5]

    Brown presses banks on voice authentication ser- vices, 2023

    Senate Banking Committee. Brown presses banks on voice authentication ser- vices, 2023. URL https://www.banking.senate.gov/newsroom/majority/ brown-presses-banks-voice-authentication-services . U.S. Senate press re- lease

  6. [6]

    Benchmarking audio deepfake detection robustness in real-world communication scenarios

    Haohan Shi, Xiyu Shi, Safak Dogan, Saif Alzubi, Tianjin Huang, and Yunxiao Zhang. Benchmarking audio deepfake detection robustness in real-world communication scenarios. In2025 33rd European Signal Processing Conference (EUSIPCO), page 566–570. IEEE,

  7. [7]

    URL http://dx.doi.org/10.23919/ EUSIPCO63237.2025.11226601

    doi: 10.23919/eusipco63237.2025.11226601. URL http://dx.doi.org/10.23919/ EUSIPCO63237.2025.11226601

  8. [8]

    High-Quality, Low-Delay Music Coding in the Opus Codec

    Jean-Marc Valin, Gregory Maxwell, Timothy B. Terriberry, and Koen V os. High-quality, low- delay music coding in the opus codec, 2016. URLhttps://arxiv.org/abs/1602.04845

  9. [9]

    Webrtc audio codec and processing requirements

    Jean-Marc Valin and Cary Bran. Webrtc audio codec and processing requirements. Technical report, 2016. URLhttps://datatracker.ietf.org/doc/html/rfc7874

  10. [10]

    How Content ID works, 2024

    YouTube. How Content ID works, 2024. URL https://support.google.com/youtube/ answer/2797370

  11. [11]

    Iustina Andronic, Ludwig Kürzinger, Edgar Ricardo Chavez Rosas, Gerhard Rigoll, and Bern- hard U. Seeber. Mp3 compression to diminish adversarial noise in end-to-end speech recognition,

  12. [12]

    URLhttps://arxiv.org/abs/2007.12892

  13. [13]

    Waveguard: Understanding and mitigating audio adversarial examples, 2021

    Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, and Farinaz Koushanfar. Waveguard: Understanding and mitigating audio adversarial examples, 2021. URL https: //arxiv.org/abs/2103.03344

  14. [14]

    Attacker’s noise can manipulate your audio-based llm in the real world,

    Vinu Sankar Sadasivan, Soheil Feizi, Rajiv Mathews, and Lun Wang. Attacker’s noise can manipulate your audio-based llm in the real world, 2025. URL https://arxiv.org/abs/ 2507.06256

  15. [15]

    Breaking audio large language models by attacking only the encoder: A universal targeted latent-space audio attack, 2025

    Roee Ziv, Raz Lapid, and Moshe Sipper. Breaking audio large language models by attacking only the encoder: A universal targeted latent-space audio attack, 2025. URL https://arxiv. org/abs/2512.23881

  16. [16]

    High Fidelity Neural Audio Compression

    Alexandre Défossez, Jade Copet, Gabriel Synnaeve, and Yossi Adi. High fidelity neural audio compression, 2022. URLhttps://arxiv.org/abs/2210.13438

  17. [17]

    Synthesizing Robust Adversarial Examples

    Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. Synthesizing robust adver- sarial examples, 2018. URLhttps://arxiv.org/abs/1707.07397

  18. [18]

    Universal and Transferable Adversarial Attacks on Aligned Language Models

    Andy Zou, Zifan Wang, Nicholas Carlini, Milad Nasr, J. Zico Kolter, and Matt Fredrikson. Universal and transferable adversarial attacks on aligned language models, 2023. URL https: //arxiv.org/abs/2307.15043. 10

  19. [19]

    HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal

    Mantas Mazeika, Long Phan, Xuwang Yin, Andy Zou, Zifan Wang, Norman Mu, Elham Sakhaee, Nathaniel Li, Steven Basart, Bo Li, David Forsyth, and Dan Hendrycks. Harmbench: A standardized evaluation framework for automated red teaming and robust refusal, 2024. URL https://arxiv.org/abs/2402.04249

  20. [20]

    Ai in hiring, 2025

    HireVue. Ai in hiring, 2025. URLhttps://www.hirevue.com/ai-in-hiring

  21. [21]

    Spotify strengthens AI protections for artists, songwriters, and producers, 2025

    Spotify. Spotify strengthens AI protections for artists, songwriters, and producers, 2025. URL https://newsroom.spotify.com/2025-09-25/ spotify-strengthens-ai-protections/

  22. [22]

    Moshi: a speech-text foundation model for real-time dialogue

    Alexandre Défossez, Laurent Mazaré, Manu Orsini, Amélie Royer, Patrick Pérez, Hervé Jégou, Edouard Grave, and Neil Zeghidour. Moshi: a speech-text foundation model for real-time dialogue, 2024. URLhttps://arxiv.org/abs/2410.00037

  23. [23]

    High fidelity audio compression with improved rvqgan

    Rithesh Kumar, Prem Seetharaman, Alejandro Luebs, Ishaan Kumar, and Kundan Kumar. High-fidelity audio compression with improved rvqgan, 2023. URL https://arxiv.org/ abs/2306.06546

  24. [24]

    Hidden voice commands

    Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. Hidden voice commands. In25th USENIX Security Symposium (USENIX Security 16), pages 513–530, 2016

  25. [25]

    Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

    Nicholas Carlini and David Wagner. Audio adversarial examples: Targeted attacks on speech- to-text, 2018. URLhttps://arxiv.org/abs/1801.01944

  26. [26]

    Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A. Gunter. Commandersong: A systematic approach for practical adversarial voice recognition, 2018. URL https://arxiv.org/abs/ 1801.08535

  27. [27]

    Robust audio adversarial example for a physical attack

    Hiromu Yakura and Jun Sakuma. Robust audio adversarial example for a physical attack. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-2019, page 5334–5341. International Joint Conferences on Artificial Intelligence Organi- zation, August 2019. doi: 10.24963/ijcai.2019/741. URL http://dx.doi.org/10.24963...

  28. [28]

    Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition

    Yao Qin, Nicholas Carlini, Ian Goodfellow, Garrison Cottrell, and Colin Raffel. Imperceptible, robust, and targeted adversarial examples for automatic speech recognition, 2019. URL https: //arxiv.org/abs/1903.10346

  29. [29]

    Imperio: Robust over-the-air adversarial examples for automatic speech recognition systems,

    Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. Imperio: Robust over-the-air adversarial examples for automatic speech recognition systems,

  30. [30]

    URLhttps://arxiv.org/abs/1908.01551

  31. [31]

    {SMACK}: Semantically meaningful adversarial audio attack

    Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, and Chaowei Xiao. {SMACK}: Semantically meaningful adversarial audio attack. In32nd USENIX security symposium (USENIX security 23), pages 3799–3816, 2023

  32. [32]

    SpeechGuard: Exploring the adver- sarial robustness of multimodal large language models

    Raghuveer Peri, Sai Muralidhar Jayanthi, Srikanth Ronanki, Anshu Bhatia, Karel Mundnich, Saket Dingliwal, Nilaksh Das, Zejiang Hou, Goeric Huybrechts, Srikanth Vishnubhotla, Daniel Garcia-Romero, Sundararajan Srinivasan, Kyu J Han, and Katrin Kirchhoff. Speechguard: Exploring the adversarial robustness of multimodal large language models, 2024. URL https:...

  33. [33]

    Audiojailbreak: Jailbreak attacks against end-to-end large audio- language models,

    Guangke Chen, Fu Song, Zhe Zhao, Xiaojun Jia, Yang Liu, Yanchen Qiao, Weizhe Zhang, Weiping Tu, Yuhong Yang, and Bo Du. Audiojailbreak: Jailbreak attacks against end-to-end large audio-language models, 2026. URLhttps://arxiv.org/abs/2505.14103

  34. [34]

    When good sounds go adversarial: Jailbreak- ing audio-language models with benign inputs,

    Hiskias Dingeto, Taeyoun Kwon, Dasol Choi, Bodam Kim, DongGeon Lee, Haon Park, JaeHoon Lee, and Jongho Shin. When good sounds go adversarial: Jailbreaking audio-language models with benign inputs, 2026. URLhttps://arxiv.org/abs/2508.03365. 11

  35. [35]

    Cocaine noodles: exploiting the gap between human and machine speech recognition

    Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. Cocaine noodles: exploiting the gap between human and machine speech recognition. In9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015

  36. [36]

    Dol- phinattack: Inaudible voice commands

    Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. Dol- phinattack: Inaudible voice commands. InProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, page 103–117. ACM, October 2017. doi: 10.1145/3133956.3134052. URLhttp://dx.doi.org/10.1145/3133956.3134052

  37. [37]

    Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

    Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. Adver- sarial attacks against automatic speech recognition systems via psychoacoustic hiding, 2018. URLhttps://arxiv.org/abs/1808.05665

  38. [38]

    {Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices

    Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. {Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices. In29th USENIX security symposium (USENIX Security 20), pages 2667–2684, 2020

  39. [39]

    Takaaki Saeki, Detai Xin, Wataru Nakata, Tomoki Koriyama, Shinnosuke Takamichi, and Hiroshi Saruwatari

    Xinyue Shen, Yixin Wu, Michael Backes, and Yang Zhang. V oice jailbreak attacks against gpt-4o, 2024. URLhttps://arxiv.org/abs/2405.19103

  40. [40]

    Advwave: Stealthy adversarial jailbreak attack against large audio-language models, 2024

    Mintong Kang, Chejian Xu, and Bo Li. Advwave: Stealthy adversarial jailbreak attack against large audio-language models, 2024. URLhttps://arxiv.org/abs/2412.08608

  41. [41]

    Muting whisper: A universal acoustic adversarial attack on speech foundation models, 2024

    Vyas Raina, Rao Ma, Charles McGhee, Kate Knill, and Mark Gales. Muting whisper: A universal acoustic adversarial attack on speech foundation models, 2024. URL https:// arxiv.org/abs/2405.06134

  42. [42]

    Conversational AI in banking: Benefits, examples & trends, 2025

    Retell AI. Conversational AI in banking: Benefits, examples & trends, 2025. URL https: //www.retellai.com/blog/conversational-ai-in-banking

  43. [43]

    How voice-first AI is redefining global banking cus- tomer support in 2025, 2025

    Fluid AI. How voice-first AI is redefining global banking cus- tomer support in 2025, 2025. URL https://www.fluid.ai/blog/ voice-first-ai-is-redefining-banking-customer-support

  44. [44]

    Ai voice interview: Use cases, benefits & 2026 guide, 2025

    HeyMilo. Ai voice interview: Use cases, benefits & 2026 guide, 2025. URL https://www.heymilo.ai/blog/ ai-voice-interview-the-impact-of-ai-interviewer-technology-on-hiring-efficiency

  45. [45]

    How voice AI is transforming recruitment in 2025, 2025

    Apollo Technical. How voice AI is transforming recruitment in 2025, 2025. URL https: //www.apollotechnical.com/how-voice-ai-is-transforming-recruitment/

  46. [46]

    Towards Deep Learning Models Resistant to Adversarial Attacks

    Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks, 2019. URL https://arxiv. org/abs/1706.06083

  47. [47]

    Qwen2-audio technical report,

    Yunfei Chu, Jin Xu, Qian Yang, Haojie Wei, Xipin Wei, Zhifang Guo, Yichong Leng, Yuanjun Lv, Jinzheng He, Junyang Lin, Chang Zhou, and Jingren Zhou. Qwen2-audio technical report,

  48. [48]

    URLhttps://arxiv.org/abs/2407.10759

  49. [49]

    Audio flamingo 3: Advancing audio intelligence with fully open large audio language models,

    Arushi Goel, Sreyan Ghosh, Jaehyeon Kim, Sonal Kumar, Zhifeng Kong, Sang gil Lee, Chao- Han Huck Yang, Ramani Duraiswami, Dinesh Manocha, Rafael Valle, and Bryan Catanzaro. Audio flamingo 3: Advancing audio intelligence with fully open large audio language models,

  50. [50]

    URLhttps://arxiv.org/abs/2507.08128

  51. [51]

    Qwen2.5-Omni Technical Report

    Jin Xu, Zhifang Guo, Jinzheng He, Hangrui Hu, Ting He, Shuai Bai, Keqin Chen, Jialin Wang, Yang Fan, Kai Dang, Bin Zhang, Xiong Wang, Yunfei Chu, and Junyang Lin. Qwen2.5-omni technical report, 2025. URLhttps://arxiv.org/abs/2503.20215

  52. [52]

    Efficient adversarial training in LLMs with continuous attacks

    Sophie Xhonneux, Alessandro Sordoni, Stephan Günnemann, Gauthier Gidel, and Leo Schwinn. Efficient adversarial training in llms with continuous attacks, 2024. URL https://arxiv. org/abs/2405.15589. 12

  53. [53]

    Neural codec- based adversarial sample detection for speaker verification, 2024

    Xuanjun Chen, Jiawei Du, Haibin Wu, Jyh-Shing Roger Jang, and Hung yi Lee. Neural codec- based adversarial sample detection for speaker verification, 2024. URL https://arxiv.org/ abs/2406.04582

  54. [54]

    Sequential randomized smoothing for adversarially robust speech recognition

    Raphael Olivier and Bhiksha Raj. Sequential randomized smoothing for adversarially robust speech recognition. InProceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, page 6372–6386. Association for Computational Linguistics, 2021. doi: 10.18653/v1/2021.emnlp-main.514. URL http://dx.doi.org/10.18653/v1/2021. emnlp-main.514

  55. [55]

    Soundstream: An end-to-end neural audio codec, 2021

    Neil Zeghidour, Alejandro Luebs, Ahmed Omran, Jan Skoglund, and Marco Tagliasacchi. Soundstream: An end-to-end neural audio codec, 2021. URL https://arxiv.org/abs/ 2107.03312

  56. [56]

    Speechtokenizer: Unified speech tokenizer for speech large language models

    Xin Zhang, Dong Zhang, Shimin Li, Yaqian Zhou, and Xipeng Qiu. Speechtokenizer: Unified speech tokenizer for speech large language models, 2024. URL https://arxiv.org/abs/ 2308.16692

  57. [57]

    FunCodec: A fundamental, reproducible and integrable open-source toolkit for neural speech codec

    Zhihao Du, Shiliang Zhang, Kai Hu, and Siqi Zheng. Funcodec: A fundamental, reproducible and integrable open-source toolkit for neural speech codec, 2023. URL https://arxiv.org/ abs/2309.07405

  58. [58]

    Wavtokenizer: An efficient acoustic discrete codec tokenizer for audio language modeling

    Shengpeng Ji, Ziyue Jiang, Wen Wang, Yifu Chen, Minghui Fang, Jialong Zuo, Qian Yang, Xize Cheng, Zehan Wang, Ruiqi Li, Ziang Zhang, Xiaoda Yang, Rongjie Huang, Yidi Jiang, Qian Chen, Siqi Zheng, and Zhou Zhao. Wavtokenizer: an efficient acoustic discrete codec tokenizer for audio language modeling, 2025. URL https://arxiv.org/abs/2408.16532

  59. [59]

    Robust Speech Recognition via Large-Scale Weak Supervision

    Alec Radford, Jong Wook Kim, Tao Xu, Greg Brockman, Christine McLeavey, and Ilya Sutskever. Robust speech recognition via large-scale weak supervision, 2022. URL https: //arxiv.org/abs/2212.04356

  60. [60]

    Pengi: An audio language model for audio tasks, 2024

    Soham Deshmukh, Benjamin Elizalde, Rita Singh, and Huaming Wang. Pengi: An audio language model for audio tasks, 2024. URLhttps://arxiv.org/abs/2305.11834

  61. [61]

    Liu, Leonid Karlinsky, and James Glass

    Yuan Gong, Hongyin Luo, Alexander H. Liu, Leonid Karlinsky, and James Glass. Listen, think, and understand, 2024. URLhttps://arxiv.org/abs/2305.10790

  62. [62]

    SALMONN: Towards Generic Hearing Abilities for Large Language Models

    Changli Tang, Wenyi Yu, Guangzhi Sun, Xianzhao Chen, Tian Tan, Wei Li, Lu Lu, Zejun Ma, and Chao Zhang. Salmonn: Towards generic hearing abilities for large language models, 2024. URLhttps://arxiv.org/abs/2310.13289

  63. [63]

    Qwen-Audio: Advancing Universal Audio Understanding via Unified Large-Scale Audio-Language Models

    Yunfei Chu, Jin Xu, Xiaohuan Zhou, Qian Yang, Shiliang Zhang, Zhijie Yan, Chang Zhou, and Jingren Zhou. Qwen-audio: Advancing universal audio understanding via unified large-scale audio-language models, 2023. URLhttps://arxiv.org/abs/2311.07919

  64. [64]

    arXiv preprint (2022) https: //doi.org/10.48550/arXiv.2209.03143 arXiv:2209.03143

    Zalán Borsos, Raphaël Marinier, Damien Vincent, Eugene Kharitonov, Olivier Pietquin, Matt Sharifi, Dominik Roblek, Olivier Teboul, David Grangier, Marco Tagliasacchi, and Neil Zeghidour. Audiolm: a language modeling approach to audio generation, 2023. URL https://arxiv.org/abs/2209.03143

  65. [65]

    Neural Codec Language Models are Zero-Shot Text to Speech Synthesizers

    Chengyi Wang, Sanyuan Chen, Yu Wu, Ziqiang Zhang, Long Zhou, Shujie Liu, Zhuo Chen, Yanqing Liu, Huaming Wang, Jinyu Li, Lei He, Sheng Zhao, and Furu Wei. Neural codec language models are zero-shot text to speech synthesizers, 2023. URL https://arxiv.org/ abs/2301.02111

  66. [66]

    Simple and controllable music generation,

    Jade Copet, Felix Kreuk, Itai Gat, Tal Remez, David Kant, Gabriel Synnaeve, Yossi Adi, and Alexandre Défossez. Simple and controllable music generation, 2024. URL https: //arxiv.org/abs/2306.05284. 13 Appendix A Details on Cross-Codec Generalization Table 4:Cross-codec generalization. CodecAttack re-instantiated on Mimi [20] and DAC [21] (S3b, Qwen2.5-Omn...