{"id":"https://openalex.org/W7124163511","doi":"https://doi.org/10.1109/icpads67057.2025.11323012","title":"HARE Attack: Inaudible Harmony in Voice Enrollment","display_name":"HARE Attack: Inaudible Harmony in Voice Enrollment","publication_year":2025,"publication_date":"2025-12-14","ids":{"openalex":"https://openalex.org/W7124163511","doi":"https://doi.org/10.1109/icpads67057.2025.11323012"},"language":null,"primary_location":{"id":"doi:10.1109/icpads67057.2025.11323012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11323012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020300920","display_name":"Xingcan Shang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingcan Shang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014998638","display_name":"Haolin Wu","orcid":"https://orcid.org/0000-0003-0789-8274"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haolin Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033526822","display_name":"Kun He","orcid":"https://orcid.org/0000-0001-7627-4604"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123008050","display_name":"Jing Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan,China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020300920"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.86096751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.49559998512268066,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.49559998512268066,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.34540000557899475,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.03759999945759773,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8043000102043152},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5041999816894531},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4999000132083893},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4812000095844269},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4578000009059906},{"id":"https://openalex.org/keywords/harmony","display_name":"Harmony (color)","score":0.44589999318122864},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3698999881744385},{"id":"https://openalex.org/keywords/harmony","display_name":"Harmony (Music)","score":0.34439998865127563}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8043000102043152},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6398000121116638},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5041999816894531},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4999000132083893},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.48969998955726624},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4812000095844269},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4578000009059906},{"id":"https://openalex.org/C2776453491","wikidata":"https://www.wikidata.org/wiki/Q5659234","display_name":"Harmony (color)","level":2,"score":0.44589999318122864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4239000082015991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39089998602867126},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3698999881744385},{"id":"https://openalex.org/C89721942","wikidata":"https://www.wikidata.org/wiki/Q184421","display_name":"Harmony (Music)","level":3,"score":0.34439998865127563},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3296999931335449},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.32249999046325684},{"id":"https://openalex.org/C143095724","wikidata":"https://www.wikidata.org/wiki/Q515895","display_name":"Odds","level":3,"score":0.31189998984336853},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.3075000047683716},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.27559998631477356},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2727000117301941},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C2777877512","wikidata":"https://www.wikidata.org/wiki/Q1116097","display_name":"Common ground","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2572000026702881},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpads67057.2025.11323012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11323012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6335554718971252}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W1989314204","https://openalex.org/W2046056978","https://openalex.org/W2290689761","https://openalex.org/W2516764878","https://openalex.org/W2726515241","https://openalex.org/W2808631503","https://openalex.org/W2890964092","https://openalex.org/W2956804760","https://openalex.org/W2962747881","https://openalex.org/W2963242190","https://openalex.org/W2963560054","https://openalex.org/W2972532204","https://openalex.org/W3024869864","https://openalex.org/W3156272176","https://openalex.org/W3163083600","https://openalex.org/W4308642956","https://openalex.org/W4387212527","https://openalex.org/W4391724765","https://openalex.org/W4399123787","https://openalex.org/W4399563768","https://openalex.org/W4400679111","https://openalex.org/W4406611343","https://openalex.org/W4409882671","https://openalex.org/W4412837276","https://openalex.org/W4415159180"],"related_works":[],"abstract_inverted_index":{"Speaker":[0],"verification":[1,73],"(SV)":[2],"constitutes":[3],"a":[4,45,113],"prevalent":[5],"biometric":[6],"recognition":[7],"technology":[8],"safeguarding":[9],"the":[10,38,57,72,76,106,130,143],"security":[11],"of":[12,37,86,115,132,145],"sensitive":[13],"data":[14],"and":[15,47,90,124,156],"regulating":[16],"access":[17],"to":[18,128],"vital":[19],"infrastructure.":[20],"Current":[21],"audio":[22],"adversarial":[23,52],"attack":[24,49],"researches":[25],"predominantly":[26],"concentrate":[27],"on":[28,34],"deceiving":[29],"systems":[30],"through":[31],"an":[32,94,100],"touching":[33],"inference":[35],"parameters":[36],"underlying":[39],"model":[40],"architectures.":[41],"This":[42],"work":[43],"introduces":[44],"pragmatic":[46],"formidable":[48],"scenario":[50],"wherein":[51],"perturbations":[53,84],"are":[54],"introduced":[55],"during":[56],"SV":[58,165],"enrollment":[59],"phase.":[60],"These":[61],"meticulously":[62],"engineered":[63],"distortions":[64],"subtly":[65],"alter":[66],"voice":[67,139],"embedding":[68],"extraction,":[69],"consequently":[70],"influencing":[71],"outcome":[74],"for":[75],"adversary.":[77],"To":[78],"enable":[79],"this":[80],"assault,":[81],"we":[82,111],"posit":[83],"comprised":[85],"inaudible":[87],"high-frequency":[88],"noise":[89],"optimize":[91],"them":[92],"within":[93],"energy-based":[95],"framework.":[96],"Under":[97],"black-box":[98],"conditions,":[99],"evolutionary":[101],"algorithm,":[102],"differential":[103],"evolution,":[104],"resolves":[105],"intricate":[107],"optimization":[108],"challenge.":[109],"Furthermore,":[110],"leverage":[112],"spectrum":[114],"realistic":[116],"constraints,":[117],"including":[118],"absolute":[119],"hearing":[120],"thresholds,":[121],"signal-to-noise":[122],"ratios,":[123],"over-the-air":[125],"propagation":[126],"effects,":[127],"augment":[129],"robustness":[131],"our":[133,146],"methodology.":[134],"Rigorous":[135],"experimentation":[136],"across":[137],"four":[138,162],"identity":[140],"datasets":[141],"affirms":[142],"efficacy":[144],"approach,":[147],"demonstrating":[148],"success":[149],"rates":[150],"exceeding":[151],"90%":[152],"in":[153,158],"digital":[154],"environments":[155],"78%":[157],"physical":[159],"settings":[160],"against":[161],"widely":[163],"employed":[164],"models.":[166]},"counts_by_year":[],"updated_date":"2026-01-16T23:16:36.188383","created_date":"2026-01-15T00:00:00"}
