{"id":"https://openalex.org/W4392903588","doi":"https://doi.org/10.1109/icassp48485.2024.10446189","title":"Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification","display_name":"Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392903588","doi":"https://doi.org/10.1109/icassp48485.2024.10446189"},"language":"en","primary_location":{"id":"doi:10.1109/icassp48485.2024.10446189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp48485.2024.10446189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067065135","display_name":"Longling Zhang","orcid":"https://orcid.org/0000-0002-4911-4813"},"institutions":[{"id":"https://openalex.org/I4210154338","display_name":"Hubei Engineering University","ror":"https://ror.org/05amnwk22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154338"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Longling Zhang","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","Services Computing Technology and System Lab","National Engineering Research Center for Big Data Technology and System","School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","Hubei Engineering Research Center on Big Data Security","Hubei Key Laboratory of Distributed System Security"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Services Computing Technology and System Lab","institution_ids":[]},{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security","institution_ids":["https://openalex.org/I4210154338"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109692708","display_name":"Lyqi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210154338","display_name":"Hubei Engineering University","ror":"https://ror.org/05amnwk22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154338"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lyqi Liu","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","Hubei Engineering Research Center on Big Data Security","Services Computing Technology and System Lab","Hubei Key Laboratory of Distributed System Security","National Engineering Research Center for Big Data Technology and System"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security","institution_ids":["https://openalex.org/I4210154338"]},{"raw_affiliation_string":"Services Computing Technology and System Lab","institution_ids":[]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security","institution_ids":[]},{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101525319","display_name":"Dan Meng","orcid":"https://orcid.org/0000-0003-1980-9283"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["OPPO Research Institute,China","OPPO Research Institute, China"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute,China","institution_ids":[]},{"raw_affiliation_string":"OPPO Research Institute, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046798143","display_name":"Jun Wang","orcid":"https://orcid.org/0000-0003-0515-7675"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Wang","raw_affiliation_strings":["OPPO Research Institute,China","OPPO Research Institute, China"],"affiliations":[{"raw_affiliation_string":"OPPO Research Institute,China","institution_ids":[]},{"raw_affiliation_string":"OPPO Research Institute, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081287468","display_name":"Shengshan Hu","orcid":"https://orcid.org/0000-0003-0042-9045"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210154338","display_name":"Hubei Engineering University","ror":"https://ror.org/05amnwk22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154338"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengshan Hu","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","Hubei Engineering Research Center on Big Data Security","National Engineering Research Center for Big Data Technology and System","School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","Services Computing Technology and System Lab","Hubei Key Laboratory of Distributed System Security"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security","institution_ids":["https://openalex.org/I4210154338"]},{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Services Computing Technology and System Lab","institution_ids":[]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067065135"],"corresponding_institution_ids":["https://openalex.org/I4210154338","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61707252,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1311","last_page":"1315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9905076026916504},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7680337429046631},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6132935285568237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4668456017971039},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4588921368122101},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.417500376701355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34657973051071167},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1273166835308075}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9905076026916504},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7680337429046631},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6132935285568237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4668456017971039},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4588921368122101},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.417500376701355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34657973051071167},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1273166835308075},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp48485.2024.10446189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp48485.2024.10446189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321883","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1635512741","https://openalex.org/W2039057510","https://openalex.org/W2120847449","https://openalex.org/W2132957515","https://openalex.org/W2160815625","https://openalex.org/W2602814339","https://openalex.org/W2605800822","https://openalex.org/W2922258480","https://openalex.org/W2962788625","https://openalex.org/W2972892026","https://openalex.org/W3095486301","https://openalex.org/W3120121071","https://openalex.org/W3138153888","https://openalex.org/W3157242219","https://openalex.org/W3158424777","https://openalex.org/W3163083600","https://openalex.org/W4226255887","https://openalex.org/W4372346622","https://openalex.org/W4385681741","https://openalex.org/W4389261070","https://openalex.org/W6728757088","https://openalex.org/W6788246492","https://openalex.org/W6811023314","https://openalex.org/W6859224170"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Automatic":[0],"speech":[1,52],"verification":[2],"(ASV)":[3],"authenticates":[4],"individuals":[5],"based":[6,155],"on":[7,156],"distinct":[8],"vocal":[9,44],"patterns,":[10],"playing":[11],"a":[12,94,123,157,162,169],"pivotal":[13],"role":[14],"in":[15,41,46,54,61,98,191],"many":[16],"applications":[17],"such":[18],"as":[19],"voice-based":[20],"unlocking":[21],"systems":[22],"for":[23,67],"devices.":[24],"The":[25,35,179],"ASV":[26,57],"system":[27],"comprises":[28],"three":[29],"stages:":[30],"training,":[31,42],"registration,":[32,47],"and":[33,48,110,141,160,181],"validation.":[34,55],"model":[36,154],"refines":[37],"using":[38],"voice":[39],"data":[40,66,79,108,148],"extracts":[43],"features":[45],"contrasts":[49],"these":[50],"with":[51],"patterns":[53],"Modern":[56],"models,":[58],"primarily":[59],"grounded":[60],"DNN":[62],"architectures,":[63],"require":[64],"extensive":[65],"training.":[68],"Federated":[69,124],"learning":[70],"(FL)":[71],"fosters":[72],"model-sharing":[73],"across":[74],"multiple":[75],"clients":[76],"while":[77],"ensuring":[78],"privacy.":[80],"Due":[81],"to":[82,89,107,132,193],"its":[83,139],"open":[84],"architecture,":[85],"FL":[86,99],"is":[87],"vulnerable":[88],"backdoor":[90,96],"attacks.":[91],"However,":[92],"training":[93],"stealthy":[95,163],"attack":[97,104,135,153],"presents":[100],"challenges,":[101],"including":[102],"diminished":[103],"generalization":[105],"owing":[106],"heterogeneity,":[109],"conspicuous":[111],"triggers":[112],"that":[113,172],"render":[114],"them":[115],"easily":[116],"detectable.":[117],"In":[118],"this":[119],"paper,":[120],"we":[121,166],"propose":[122,168],"Stealthy":[125],"Backdoor":[126],"Attack":[127],"method":[128],"($FedSBA$).":[129],"FedSBA":[130,150,184],"aims":[131],"improve":[133],"the":[134,146],"model\u2019s":[136],"generalization,":[137],"enhance":[138],"persistence,":[140],"elude":[142],"anomaly":[143],"detection":[144],"under":[145],"heterogeneous":[147],"distribution.":[149],"constructs":[151],"an":[152,174],"personalized":[158],"transformer":[159],"encompasses":[161],"trigger.":[164],"Moreover,":[165],"also":[167],"defensive":[170],"strategy":[171],"utilizes":[173],"adaptive":[175],"weight":[176],"aggregation":[177],"scheme.":[178],"stealthiness":[180],"effectiveness":[182],"of":[183],"are":[185],"demonstrated":[186],"by":[187],"exhibiting":[188],"superior":[189],"performance":[190],"comparison":[192],"previous":[194],"works.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
