{"id":"https://openalex.org/W3173087021","doi":"https://doi.org/10.1109/cscwd49262.2021.9437669","title":"A Novel Trojan Attack against Co-learning Based ASR DNN System","display_name":"A Novel Trojan Attack against Co-learning Based ASR DNN System","publication_year":2021,"publication_date":"2021-05-05","ids":{"openalex":"https://openalex.org/W3173087021","doi":"https://doi.org/10.1109/cscwd49262.2021.9437669","mag":"3173087021"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd49262.2021.9437669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100365310","display_name":"Mingxuan Li","orcid":"https://orcid.org/0000-0002-4610-7554"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingxuan Li","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411515","display_name":"Xiao Wang","orcid":"https://orcid.org/0000-0003-2271-1340"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Wang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040193295","display_name":"Dongdong Huo","orcid":"https://orcid.org/0000-0001-6583-0505"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdong Huo","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100452654","display_name":"Han Wang","orcid":"https://orcid.org/0000-0001-7347-3763"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Wang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100676828","display_name":"Chao Liu","orcid":"https://orcid.org/0000-0002-9748-3162"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102914991","display_name":"Yazhe Wang","orcid":"https://orcid.org/0000-0002-1709-5283"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yazhe Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100445368","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0003-3511-0288"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083915362","display_name":"Zhen Xu","orcid":"https://orcid.org/0000-0001-7011-3236"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100365310"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.7,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75859884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"907","last_page":"912"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9118393659591675},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7795959711074829},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6775000691413879},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5073055624961853},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4811452627182007},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4618707001209259},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45242393016815186},{"id":"https://openalex.org/keywords/vocabulary","display_name":"Vocabulary","score":0.44119542837142944},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4294317066669464},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4115135967731476},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35585927963256836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3255041837692261},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32503581047058105},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09629544615745544},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08836302161216736}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9118393659591675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7795959711074829},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6775000691413879},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5073055624961853},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4811452627182007},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4618707001209259},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45242393016815186},{"id":"https://openalex.org/C2777601683","wikidata":"https://www.wikidata.org/wiki/Q6499736","display_name":"Vocabulary","level":2,"score":0.44119542837142944},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4294317066669464},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4115135967731476},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35585927963256836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3255041837692261},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32503581047058105},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09629544615745544},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08836302161216736},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd49262.2021.9437669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8580445501","display_name":null,"funder_award_id":"2019YFB1706000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W37526647","https://openalex.org/W1524333225","https://openalex.org/W1526236009","https://openalex.org/W1637570796","https://openalex.org/W1945616565","https://openalex.org/W2016661008","https://openalex.org/W2024490156","https://openalex.org/W2098693229","https://openalex.org/W2102113734","https://openalex.org/W2147768505","https://openalex.org/W2158791054","https://openalex.org/W2526425061","https://openalex.org/W2535838896","https://openalex.org/W2748789698","https://openalex.org/W2751902866","https://openalex.org/W2753783305","https://openalex.org/W2772825438","https://openalex.org/W2774423163","https://openalex.org/W2784500886","https://openalex.org/W2919115771","https://openalex.org/W2935384092","https://openalex.org/W2962717526","https://openalex.org/W2962780374","https://openalex.org/W2963207607","https://openalex.org/W4252979261","https://openalex.org/W4297687186","https://openalex.org/W4300824008","https://openalex.org/W6601563604","https://openalex.org/W6631362777","https://openalex.org/W6675365184"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W3135176461","https://openalex.org/W3106646114","https://openalex.org/W4308244459","https://openalex.org/W4221166349","https://openalex.org/W4200628936","https://openalex.org/W4387929148","https://openalex.org/W4389518867"],"abstract_inverted_index":{"ASR":[0,60,88,196],"(Automatic":[1],"Speech":[2],"Recognition)":[3],"technology":[4,8,61],"is":[5,166,233],"a":[6,78,107,174,181,191,238],"key":[7],"for":[9,67,116],"human-computer":[10],"interaction.":[11,59],"Especially":[12],"the":[13,22,36,43,48,54,129,134,148,155,163,168,201,208,211,243],"DNN":[14],"models":[15,89,93,119],"of":[16,57,81,87,133,203,217,242],"wake-up-word":[17],"speech":[18],"recognition,":[19],"which":[20,96],"enables":[21],"smart":[23,157,164],"device":[24,44,149,165],"to":[25,45,146,150,194,223],"recognize":[26],"wake-up":[27,122],"words":[28,145,219],"spoken":[29],"by":[30,206],"users":[31],"when":[32,162],"they":[33],"are":[34],"in":[35,101,120,128,167,214],"sleep":[37],"or":[38],"lock":[39],"screen":[40],"state,":[41,51,170],"allowing":[42],"directly":[46],"enter":[47],"wait":[49],"command":[50,183],"and":[52,153,184,198,236],"start":[53],"first":[55],"step":[56],"voice":[58,121],"no":[62],"wonder":[63],"provides":[64],"great":[65,239],"convenience":[66],"people's":[68],"daily":[69],"life,":[70],"but":[71],"it's":[72],"security":[73,240],"problem":[74,241],"has":[75,90],"always":[76],"been":[77],"hot":[79],"topic":[80],"further":[82],"research.":[83],"The":[84,124,225],"rapid":[85],"development":[86],"made":[91],"these":[92],"very":[94,234],"vulnerable":[95],"seriously":[97],"affect":[98],"their":[99],"performance":[100,202],"real":[102],"scenarios.":[103,123],"This":[104],"paper":[105],"proposes":[106],"new":[108],"backdoor":[109,127],"attack":[110,195,209,231],"method":[111,193,232],"TNN":[112],"(Trojan":[113],"Neural":[114],"Network)":[115],"deep":[117,130],"learning":[118,131],"attacker":[125],"leaves":[126],"model":[132],"ASR.":[135],"Besides":[136],"specific":[137,182,218],"wakeup":[138],"words,":[139],"attackers":[140],"can":[141,220],"also":[142],"use":[143],"other":[144],"force":[147],"wake":[151],"up":[152,222],"get":[154],"IoT":[156,245],"device's":[158],"highest":[159],"privileges.":[160],"And":[161],"awake":[169],"any":[171],"audio":[172],"containing":[173],"particular":[175],"vocabulary":[176],"will":[177],"be":[178,221],"recognized":[179],"as":[180],"executed.":[185],"In":[186],"this":[187],"papaer,":[188],"we":[189],"propose":[190],"novel":[192],"model,":[197],"without":[199],"affecting":[200],"clean":[204],"samples,":[205],"applying":[207],"method,":[210],"success":[212],"rate":[213],"compulsory":[215],"recognition":[216],"100%.":[224],"experimental":[226],"results":[227],"prove":[228],"that":[229],"our":[230],"effective":[235],"poses":[237],"voice-interactive":[244],"device.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
