File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

공태식

Gong, Taesik
Ubiquitous AI Lab
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.endPage 985 -
dc.citation.startPage 978 -
dc.citation.title 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) -
dc.contributor.author Gong, Taesik -
dc.contributor.author Ramos, A.G.C.P. -
dc.contributor.author Bhattacharya, S. -
dc.contributor.author Mathur, A. -
dc.contributor.author Kawsar, F. -
dc.date.accessioned 2024-11-08T17:05:06Z -
dc.date.available 2024-11-08T17:05:06Z -
dc.date.created 2024-11-08 -
dc.date.issued 2019-12-16 -
dc.description.abstract Deep learning has enabled personal and IoT devices to rethink microphones as a multi-purpose sensor for understanding conversation and the surrounding environment. This resulted in a proliferation of Voice Controllable Systems (VCS) around us. The increasing popularity of such systems is also prone to attracting miscreants, who often want to take advantage of the VCS without the knowledge of the user. Consequently, understanding the robustness of VCS, especially under adversarial attacks, has become an important research topic. Although there exists some previous work on audio adversarial attacks, their scopes are limited to embedding the attacks onto pre-recorded music clips, which when played through speakers cause VCS to misbehave. As an attack-audio needs to be played, the occurrence of this type of attacks can be suspected by a human listener. In this paper, we focus on audio-based Denial-of-Service (DoS) attack, which is unexplored in the literature. Contrary to previous work, we show that adversarial audio attacks in real-time and overthe-air are possible, while a user interacts with VCS. We show that the attacks are effective regardless of the user's command and interaction timings. In this paper, we present a first-of-itskind imperceptible and always-on universal audio perturbation technique that enables such DoS attack to be successful. We thoroughly evaluate the performance of the attacking scheme across (i) two learning tasks, (ii) two model architectures and (iii) three datasets. We demonstrate that the attack can introduce as high as 78% error rate in audio recognition tasks. © 2019 IEEE. -
dc.identifier.bibliographicCitation 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pp.978 - 985 -
dc.identifier.doi 10.1109/ICMLA.2019.00167 -
dc.identifier.scopusid 2-s2.0-85080907990 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/84405 -
dc.language 영어 -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title AudiDoS: Real-time denial-of-service adversarial attacks on deep audio models -
dc.type Conference Paper -
dc.date.conferenceDate 2019-12-16 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.