pith. sign in

arxiv: 1801.01944 · v2 · pith:3QO2RYBJnew · submitted 2018-01-05 · 💻 cs.LG · cs.AI· cs.CR

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

classification 💻 cs.LG cs.AIcs.CR
keywords audioadversarialexamplesattacktargetedanotherapplyattacks
0
0 comments X p. Extension
pith:3QO2RYBJ Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{3QO2RYBJ}

Prints a linked pith:3QO2RYBJ badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

We construct targeted audio adversarial examples on automatic speech recognition. Given any audio waveform, we can produce another that is over 99.9% similar, but transcribes as any phrase we choose (recognizing up to 50 characters per second of audio). We apply our white-box iterative optimization-based attack to Mozilla's implementation DeepSpeech end-to-end, and show it has a 100% success rate. The feasibility of this attack introduce a new domain to study adversarial examples.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Mobile GUI Agents under Real-world Threats: Are We There Yet?

    cs.CR 2025-07 conditional novelty 6.0

    Introduces an app-content instrumentation framework and benchmark showing that examined GUI agents suffer 42.0% and 36.1% average misleading rates from third-party content in dynamic and static tests respectively.