{"id":"https://openalex.org/W4283215219","doi":"https://doi.org/10.1109/infocom48880.2022.9796934","title":"PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition","display_name":"PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283215219","doi":"https://doi.org/10.1109/infocom48880.2022.9796934"},"language":"en","primary_location":{"id":"doi:10.1109/infocom48880.2022.9796934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796934","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076217439","display_name":"Meng Chen","orcid":"https://orcid.org/0000-0002-4775-5107"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Chen","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Lu","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076217439"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.2473,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81259427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1419","last_page":"1428"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8345720767974854},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8087593913078308},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.6839389801025391},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.6601970195770264},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5632489323616028},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.5380626916885376},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5309134721755981},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5306058526039124},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5065916776657104},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4957512319087982},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4845782518386841},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.45160990953445435},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.41123971343040466},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39550668001174927},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3426108658313751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3002963662147522},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09429517388343811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8345720767974854},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8087593913078308},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.6839389801025391},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.6601970195770264},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5632489323616028},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.5380626916885376},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5309134721755981},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5306058526039124},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5065916776657104},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4957512319087982},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4845782518386841},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.45160990953445435},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.41123971343040466},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39550668001174927},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3426108658313751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3002963662147522},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09429517388343811},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom48880.2022.9796934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796934","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W1524333225","https://openalex.org/W1556470778","https://openalex.org/W1945616565","https://openalex.org/W2046056978","https://openalex.org/W2150769028","https://openalex.org/W2575585029","https://openalex.org/W2612434969","https://openalex.org/W2726515241","https://openalex.org/W2747874407","https://openalex.org/W2767951891","https://openalex.org/W2770312844","https://openalex.org/W2890964092","https://openalex.org/W2923292931","https://openalex.org/W2962717526","https://openalex.org/W2962747881","https://openalex.org/W2963857521","https://openalex.org/W2964301649","https://openalex.org/W2973057252","https://openalex.org/W2973252307","https://openalex.org/W2980498517","https://openalex.org/W3006808893","https://openalex.org/W3015958938","https://openalex.org/W3026105097","https://openalex.org/W3047561893","https://openalex.org/W3054852761","https://openalex.org/W3081559749","https://openalex.org/W3084424094","https://openalex.org/W3088377098","https://openalex.org/W3095570773","https://openalex.org/W3096614974","https://openalex.org/W3109668151","https://openalex.org/W3131867595","https://openalex.org/W3153453329","https://openalex.org/W3156272176","https://openalex.org/W3162258435","https://openalex.org/W4293846201","https://openalex.org/W6631362777","https://openalex.org/W6633249632","https://openalex.org/W6640425456","https://openalex.org/W6737575990","https://openalex.org/W6739868092","https://openalex.org/W6745795967","https://openalex.org/W6746295503","https://openalex.org/W6748288002","https://openalex.org/W6760326341"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W3093978547","https://openalex.org/W3203790781","https://openalex.org/W2997056298","https://openalex.org/W2738001131","https://openalex.org/W3127875750","https://openalex.org/W4285785480","https://openalex.org/W4383221314","https://openalex.org/W4386850404"],"abstract_inverted_index":{"Voice":[0],"has":[1,27],"become":[2],"a":[3,81,142],"fundamental":[4],"method":[5],"for":[6,80,95,107,123,148],"human-computer":[7],"interactions":[8],"and":[9,52,88,93,113,126,137,178,182],"person":[10],"identification":[11],"these":[12,71],"days.":[13],"Benefit":[14],"from":[15,150],"the":[16,35,91,121],"rapid":[17],"development":[18],"of":[19,37,176],"deep":[20,42],"learning,":[21],"speaker":[22,45,69,159],"recognition":[23,46,160],"exploiting":[24],"voice":[25,133],"biometrics":[26],"achieved":[28],"great":[29],"success":[30,174],"in":[31],"various":[32,154],"applications.":[33],"However,":[34],"shadow":[36],"adversarial":[38,62,115],"example":[39],"attacks":[40],"on":[41,157],"neural":[43],"network-based":[44],"recently":[47],"raised":[48],"extensive":[49],"public":[50],"concerns":[51],"enormous":[53],"research":[54],"interests.":[55],"Although":[56],"existing":[57],"studies":[58],"propose":[59,102],"to":[60,67,76,110],"generate":[61,111],"examples":[63,116],"by":[64],"iterative":[65],"optimization":[66],"deceive":[68],"recognition,":[70],"methods":[72,170],"require":[73],"multiple":[74],"iterations":[75],"construct":[77],"specific":[78],"perturbations":[79,140],"single":[82],"voice,":[83],"which":[84,145],"is":[85],"input-specific,":[86],"time-consuming,":[87],"non-transferable,":[89],"hindering":[90],"deployment":[92],"application":[94],"non-professional":[96],"adversaries.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101],"PhoneyTalker,":[103],"an":[104,131],"out-of-the-box":[105],"toolkit":[106],"any":[108],"adversary":[109],"universal":[112],"transferable":[114],"with":[117,153,162,171],"low":[118],"complexity,":[119],"releasing":[120],"requirement":[122],"professional":[124],"background":[125],"specialized":[127],"equipment.":[128],"PhoneyTalker":[129,167],"decomposes":[130],"arbitrary":[132],"into":[134],"phone":[135],"combinations":[136],"generates":[138],"phone-level":[139],"using":[141],"generative":[143],"model,":[144],"are":[146],"reusable":[147],"voices":[149],"different":[151],"persons":[152],"texts.":[155],"Experiments":[156],"mainstream":[158],"systems":[161],"large-scale":[163],"corpus":[164],"show":[165],"that":[166],"outperforms":[168],"state-of-the-art":[169],"overall":[172],"attack":[173],"rates":[175],"99.9%":[177],"84.0%":[179],"under":[180],"white-box":[181],"black-box":[183],"settings":[184],"respectively.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
