{"id":"https://openalex.org/W4312585292","doi":"https://doi.org/10.1109/access.2022.3220639","title":"A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition","display_name":"A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312585292","doi":"https://doi.org/10.1109/access.2022.3220639"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3220639","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3220639","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09941069.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09941069.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012254674","display_name":"Xinyu Zhang","orcid":"https://orcid.org/0000-0001-6484-3611"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyu Zhang","raw_affiliation_strings":["Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100729477","display_name":"Yang Xu","orcid":"https://orcid.org/0000-0001-6870-2824"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Xu","raw_affiliation_strings":["Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101933467","display_name":"Sicong Zhang","orcid":"https://orcid.org/0000-0001-8547-6531"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sicong Zhang","raw_affiliation_strings":["Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100679806","display_name":"Xiaojian Li","orcid":"https://orcid.org/0000-0002-3175-7810"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojian Li","raw_affiliation_strings":["Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science Guizhou Province, School of Cyber Science and Technology, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012254674"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.194,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82627057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"10","issue":null,"first_page":"118789","last_page":"118805"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9488000273704529,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9453999996185303,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6977272033691406},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.6412975788116455},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5508914589881897},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.550201416015625},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.5117704272270203},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47681209444999695},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47546738386154175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42605432868003845},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.361977756023407}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6977272033691406},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.6412975788116455},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5508914589881897},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.550201416015625},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.5117704272270203},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47681209444999695},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47546738386154175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42605432868003845},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.361977756023407},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3220639","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3220639","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09941069.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f81a07f71d8c4f2baf4a384e0f723970","is_oa":true,"landing_page_url":"https://doaj.org/article/f81a07f71d8c4f2baf4a384e0f723970","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 118789-118805 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3220639","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3220639","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09941069.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4374722329","display_name":null,"funder_award_id":"[2020]2Y013","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"}],"funders":[{"id":"https://openalex.org/F4320336617","display_name":"Science and Technology Program of Guizhou Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312585292.pdf","grobid_xml":"https://content.openalex.org/works/W4312585292.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W1614659291","https://openalex.org/W1945616565","https://openalex.org/W2103130126","https://openalex.org/W2107638917","https://openalex.org/W2121812409","https://openalex.org/W2150769028","https://openalex.org/W2154278880","https://openalex.org/W2529314575","https://openalex.org/W2535873859","https://openalex.org/W2618492571","https://openalex.org/W2747221258","https://openalex.org/W2748488820","https://openalex.org/W2774644650","https://openalex.org/W2802973008","https://openalex.org/W2872172641","https://openalex.org/W2890964092","https://openalex.org/W2905423756","https://openalex.org/W2962717526","https://openalex.org/W2962747881","https://openalex.org/W2963001136","https://openalex.org/W2963857521","https://openalex.org/W2964014389","https://openalex.org/W2964273407","https://openalex.org/W2964301649","https://openalex.org/W2966708309","https://openalex.org/W2972908178","https://openalex.org/W2973057252","https://openalex.org/W2973084371","https://openalex.org/W2973252307","https://openalex.org/W3015811740","https://openalex.org/W3054852761","https://openalex.org/W3095570773","https://openalex.org/W3105009650","https://openalex.org/W3131867595","https://openalex.org/W3143465836","https://openalex.org/W3153453329","https://openalex.org/W3161782335","https://openalex.org/W3162158711","https://openalex.org/W3173355548","https://openalex.org/W3198662695","https://openalex.org/W4293846201","https://openalex.org/W6640425456","https://openalex.org/W6675376068","https://openalex.org/W6739868092","https://openalex.org/W6745272055","https://openalex.org/W6748288002","https://openalex.org/W6751099684","https://openalex.org/W6753441104","https://openalex.org/W6758508162","https://openalex.org/W6765450635","https://openalex.org/W6801193994"],"related_works":["https://openalex.org/W1491159402","https://openalex.org/W66821593","https://openalex.org/W4297807400","https://openalex.org/W2249138175","https://openalex.org/W1521299571","https://openalex.org/W4313854686","https://openalex.org/W3162054169","https://openalex.org/W1813780412","https://openalex.org/W1516392727","https://openalex.org/W2140022733"],"abstract_inverted_index":{"Speaker":[0],"recognition":[1,62,176],"based":[2],"on":[3],"deep":[4],"learning":[5,152],"is":[6,107,141,224,240,286],"currently":[7],"the":[8,15,32,82,87,90,101,119,125,130,133,139,148,164,173,181,186,203,214,221,234,238,262,265,294],"most":[9],"advanced":[10],"and":[11,21,35,57,77,145,158,179,192,198,228,244,282,300,308],"mainstream":[12],"technology":[13],"in":[14,31,113,151],"industry.":[16],"Adversarial":[17],"attacks,":[18,220],"an":[19],"emerging":[20],"powerful":[22],"attack":[23,51,98,140,183,206,255,295],"against":[24],"neural":[25],"network":[26],"models,":[27],"were":[28],"first":[29],"applied":[30,108],"image":[33],"domain":[34],"gradually":[36],"expanded":[37],"to":[38,109,137,161,231,247,260,289,306,310],"other":[39],"domains,":[40],"also":[41,252],"posing":[42],"serious":[43],"security":[44],"problems":[45],"for":[46,257],"speaker":[47,61,114,175,208,215,235],"recognition.":[48,115],"Common":[49],"gradient-based":[50],"methods":[52,150,302],"such":[53,154,189],"as":[54,124,155,190],"FGSM,":[55],"PGD,":[56],"MI-FGSM":[58],"can":[59],"deceive":[60],"models":[63,177],"with":[64,202,218],"high":[65],"confidence,":[66],"yet":[67],"their":[68],"carefully":[69],"crafted":[70],"adversarial":[71,91,258,272,280,291],"examples":[72],"suffer":[73],"from":[74,304],"poor":[75],"stealthiness":[76,88,187],"are":[78],"easily":[79],"perceived":[80],"by":[81,194],"human":[83],"ear.":[84],"To":[85],"improve":[86],"of":[89,122,132,210,264,298],"examples,":[92],"this":[93,254],"paper":[94],"proposes":[95],"a":[96],"new":[97],"method":[99,117,184,256],"called":[100],"Adaptive":[102],"Decay":[103],"Attack":[104],"(ADA),":[105],"which":[106],"three":[110],"different":[111],"scenarios":[112],"The":[116,167],"takes":[118,274],"set":[120],"number":[121],"iterations":[123],"termination":[126],"condition,":[127],"automatically":[128],"adjusts":[129],"size":[131],"maximum":[134],"perturbation":[135],"according":[136],"whether":[138],"successful":[142],"or":[143],"not,":[144],"then":[146],"uses":[147],"decay":[149,157],"rates":[153],"exponential":[156],"cosine":[159],"annealing":[160],"continuously":[162],"reduce":[163],"step":[165],"size.":[166],"experimental":[168],"results":[169,268],"show":[170,269],"that":[171,270],"under":[172,207],"two":[174],"x-vector,":[178],"i-vector,":[180],"proposed":[182],"improves":[185],"metrics":[188],"SNR":[191],"PESQ":[193],"at":[195,225,241],"least":[196,226,242],"30%":[197],"39%,":[199],"respectively,":[200],"compared":[201,230,246],"best":[204],"PGD":[205,299],"identification":[209,216],"untargeted":[211],"attacks.":[212],"For":[213,233],"task":[217],"targeted":[219],"average":[222],"improvement":[223,239],"20%":[227],"25%":[229],"PGD.":[232,248],"verification":[236],"task,":[237],"29.5%":[243],"33.4%":[245],"In":[249],"addition,":[250],"we":[251],"use":[253],"training":[259,273],"enhance":[261],"robustness":[263,285],"model.":[266],"Experimental":[267],"ADA-based":[271],"28.31%":[275],"less":[276],"time":[277],"than":[278],"PGD-based":[279,290],"training,":[281],"its":[283],"improved":[284],"generally":[287],"superior":[288],"training.":[292],"Specifically,":[293],"success":[296],"rate":[297],"ADA":[301],"decreased":[303],"50.88%":[305],"36.47%":[307],"64.74%":[309],"45.82%,":[311],"respectively.":[312]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
