{"id":"https://openalex.org/W3188275726","doi":"https://doi.org/10.1109/icc42927.2021.9500431","title":"Generating Audio Adversarial Examples with Ensemble Substituted Models","display_name":"Generating Audio Adversarial Examples with Ensemble Substituted Models","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3188275726","doi":"https://doi.org/10.1109/icc42927.2021.9500431","mag":"3188275726"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100356779","display_name":"Yun Zhang","orcid":"https://orcid.org/0000-0001-8716-4179"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yun Zhang","raw_affiliation_strings":["Chengdu Westone Information Security Technology Co., Ltd","University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Chengdu Westone Information Security Technology Co., Ltd","institution_ids":[]},{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["Chengdu Westone Information Security Technology Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Chengdu Westone Information Security Technology Co., Ltd","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046950426","display_name":"Guowen Xu","orcid":"https://orcid.org/0000-0002-9764-9345"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guowen Xu","raw_affiliation_strings":["Chengdu Westone Information Security Technology Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Chengdu Westone Information Security Technology Co., Ltd","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066189295","display_name":"Xizhao Luo","orcid":"https://orcid.org/0000-0002-4294-1365"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xizhao Luo","raw_affiliation_strings":["Soochow University"],"affiliations":[{"raw_affiliation_string":"Soochow University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102207714","display_name":"Guishan Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guishan Dong","raw_affiliation_strings":["University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100356779"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62694034,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8394191265106201},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8262476921081543},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7766965627670288},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.6538028717041016},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6513732671737671},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5958887338638306},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5860942006111145},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5759949684143066},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5152668952941895},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.5120800137519836},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.48107433319091797},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47604870796203613},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.42295682430267334},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4193439483642578},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1935732364654541}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8394191265106201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8262476921081543},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7766965627670288},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.6538028717041016},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6513732671737671},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5958887338638306},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5860942006111145},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5759949684143066},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5152668952941895},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.5120800137519836},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.48107433319091797},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47604870796203613},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.42295682430267334},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4193439483642578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1935732364654541},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9500431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2134127598","https://openalex.org/W2293768274","https://openalex.org/W2408141691","https://openalex.org/W2460937040","https://openalex.org/W2486441166","https://openalex.org/W2535690855","https://openalex.org/W2770312844","https://openalex.org/W2781800156","https://openalex.org/W2782403400","https://openalex.org/W2807096445","https://openalex.org/W2885407017","https://openalex.org/W2898435086","https://openalex.org/W2910577860","https://openalex.org/W2916239775","https://openalex.org/W2923292931","https://openalex.org/W2952730822","https://openalex.org/W2954420970","https://openalex.org/W2962717526","https://openalex.org/W2963058500","https://openalex.org/W2963378725","https://openalex.org/W2963540401","https://openalex.org/W2964301649","https://openalex.org/W2973252307","https://openalex.org/W2990183786","https://openalex.org/W2997395473","https://openalex.org/W3013292431","https://openalex.org/W3040384242","https://openalex.org/W3111925745","https://openalex.org/W4300511536","https://openalex.org/W6714069269","https://openalex.org/W6719080892","https://openalex.org/W6722479552","https://openalex.org/W6746295503","https://openalex.org/W6746882984","https://openalex.org/W6747662546","https://openalex.org/W6748288002","https://openalex.org/W6752346538","https://openalex.org/W6755779437","https://openalex.org/W6758675244","https://openalex.org/W6759519673","https://openalex.org/W6760326341","https://openalex.org/W6786625508"],"related_works":["https://openalex.org/W2095577883","https://openalex.org/W2953920146","https://openalex.org/W3013617128","https://openalex.org/W3124408655","https://openalex.org/W4297785512","https://openalex.org/W3158598208","https://openalex.org/W4310145706","https://openalex.org/W2992338883","https://openalex.org/W3188275726","https://openalex.org/W2963070423"],"abstract_inverted_index":{"The":[0,155],"rapid":[1],"development":[2],"of":[3,11,34,40,89,95,117,129,136,178],"machine":[4],"learning":[5],"technology":[6],"has":[7],"prompted":[8],"the":[9,20,32,41,46,56,68,72,80,87,93,96,115,118,134,151,171,176,179],"applications":[10],"Automatic":[12],"Speech":[13],"Recognition(ASR).":[14],"However,":[15],"studies":[16],"have":[17],"shown":[18],"that":[19,105,145,158],"state-of-the-art":[21],"ASR":[22,35,47],"technologies":[23],"are":[24,49,75],"still":[25],"vulnerable":[26],"to":[27,61,67,91,114,123,170],"various":[28],"attacks,":[29],"which":[30],"undermines":[31],"stability":[33],"destructively.":[36],"In":[37,99],"general,":[38],"most":[39],"existing":[42],"attack":[43,77,153,162],"techniques":[44],"for":[45],"model":[48,65,110],"based":[50],"on":[51],"white":[52],"box":[53],"scenarios,":[54],"where":[55],"adversary":[57],"uses":[58],"adversarial":[59,130],"samples":[60],"generate":[62,124],"a":[63,107,125],"substituted":[64,97,109,138,147],"corresponding":[66],"target":[69],"model.":[70],"On":[71],"contrary,":[73],"there":[74],"fewer":[76],"schemes":[78],"in":[79],"black-box":[81],"scenario.":[82],"Moreover,":[83],"no":[84],"scheme":[85],"considers":[86],"problem":[88],"how":[90],"construct":[92],"architecture":[94,111],"models.":[98],"this":[100],"paper,":[101],"we":[102],"point":[103],"out":[104],"constructing":[106],"good":[108],"is":[112],"crucial":[113],"effectiveness":[116],"attack,":[119],"as":[120],"it":[121],"helps":[122],"more":[126],"sophisticated":[127],"set":[128],"examples.":[131],"We":[132],"evaluate":[133],"performance":[135],"different":[137],"models":[139,148],"by":[140],"comprehensive":[141],"experiments,":[142],"and":[143],"find":[144],"ensemble":[146],"can":[149],"achieve":[150],"optimal":[152],"effect.":[154],"experiment":[156],"shows":[157],"our":[159],"approach":[160],"performs":[161],"over":[163],"80%":[164],"success":[165],"rate":[166],"(2%":[167],"improvement":[168],"compared":[169],"latest":[172],"work)":[173],"meanwhile":[174],"maintaining":[175],"authenticity":[177],"original":[180],"sample":[181],"well.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
