{"id":"https://openalex.org/W4407899876","doi":"https://doi.org/10.1109/lsp.2025.3545276","title":"Paradoxical Role of Adversarial Attacks: Enabling Crosslinguistic Attacks and Information Hiding in Multilingual Speech Recognition","display_name":"Paradoxical Role of Adversarial Attacks: Enabling Crosslinguistic Attacks and Information Hiding in Multilingual Speech Recognition","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407899876","doi":"https://doi.org/10.1109/lsp.2025.3545276"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2025.3545276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3545276","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100385514","display_name":"Wenjie Zhang","orcid":"https://orcid.org/0000-0002-7753-695X"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenjie Zhang","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","Faculty of Electrical Engineering and Computer Science, Ningbo University, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, China","institution_ids":["https://openalex.org/I109935558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005319671","display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]},{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Jinan University, Jinan, China","College of Cyber Security, Jinan University, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Jinan, China","institution_ids":["https://openalex.org/I34949971","https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, Jinan University, China","institution_ids":["https://openalex.org/I34949971","https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100749734","display_name":"Bin Ma","orcid":"https://orcid.org/0000-0002-9030-7393"},"institutions":[{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Ma","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Qilu University of Technology (Shandong Academy of Sciences), China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Qilu University of Technology (Shandong Academy of Sciences), China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016795475","display_name":"Diqun Yan","orcid":"https://orcid.org/0000-0002-5241-7276"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Diqun Yan","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","Faculty of Electrical Engineering and Computer Science, Ningbo University, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, China","institution_ids":["https://openalex.org/I109935558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100385514"],"corresponding_institution_ids":["https://openalex.org/I109935558"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01302113,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"32","issue":null,"first_page":"1046","last_page":"1050"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.7214000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.7214000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.690500020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.6854000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8460147976875305},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7276673316955566},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.6114922761917114},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4215567111968994},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3963100016117096},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.37151867151260376}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8460147976875305},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7276673316955566},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.6114922761917114},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4215567111968994},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3963100016117096},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.37151867151260376},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2025.3545276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3545276","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.550000011920929}],"awards":[{"id":"https://openalex.org/G7263650625","display_name":null,"funder_award_id":"U23B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W2898435086","https://openalex.org/W2963242190","https://openalex.org/W2963542245","https://openalex.org/W2964301649","https://openalex.org/W2973057252","https://openalex.org/W2973252307","https://openalex.org/W3088377098","https://openalex.org/W3091896612","https://openalex.org/W3155956353","https://openalex.org/W3208766400","https://openalex.org/W3209050974","https://openalex.org/W4293846201","https://openalex.org/W4313387422","https://openalex.org/W4379622969","https://openalex.org/W4385822685","https://openalex.org/W4401607149","https://openalex.org/W4402263925","https://openalex.org/W4403331913","https://openalex.org/W4405181112","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6746295503","https://openalex.org/W6748288002","https://openalex.org/W6760326341","https://openalex.org/W6771467084","https://openalex.org/W6793199777","https://openalex.org/W6793995585","https://openalex.org/W6847363464"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W3204019825"],"abstract_inverted_index":{"With":[0],"the":[1,134],"rise":[2],"of":[3,141],"automatic":[4],"speech":[5],"recognition":[6],"(ASR)":[7],"research":[8,27],"and":[9,44,101,129,144],"practical":[10],"applications,":[11],"enabling":[12],"adversarial":[13,56,70,105],"attacks":[14,43,57],"on":[15,30,62,126],"ASR":[16,33,37,98],"systems":[17,38],"via":[18],"subtle":[19],"perturbations":[20],"has":[21,28],"become":[22],"a":[23,51,103,138],"priority.":[24],"Most":[25],"prior":[26],"focused":[29],"single-language,":[31],"single-model":[32],"systems.":[34],"However,":[35],"multilingual":[36,59,97],"hold":[39],"opportunities":[40],"for":[41,54],"crosslinguistic":[42,55,104],"covert":[45],"message":[46],"transmission.":[47],"This":[48,94],"letter":[49,95],"introduces":[50,102],"new":[52],"approach":[53],"in":[58,67],"ASR,":[60],"focusing":[61],"information":[63,116],"hiding.":[64],"For":[65],"example,":[66],"military":[68],"settings,":[69],"examples":[71],"applied":[72],"to":[73,91,113,148],"eavesdropping":[74],"devices":[75],"can":[76],"encode":[77],"messages":[78],"detectable":[79],"only":[80],"by":[81,120],"friendly":[82,111],"devices,":[83],"leaving":[84],"adversaries,":[85],"even":[86],"with":[87,107],"identical":[88],"methods,":[89],"unable":[90],"access":[92],"them.":[93],"examines":[96],"system":[99],"properties":[100],"example":[106],"minimal":[108],"perturbation,":[109],"allowing":[110],"classifiers":[112],"extract":[114],"hidden":[115],"while":[117],"being":[118],"undetectable":[119],"hostile":[121],"classifiers.":[122],"The":[123],"experimental":[124],"results":[125],"5":[127,130],"models":[128],"datasets":[131],"show":[132],"that":[133],"proposed":[135],"method":[136],"achieves":[137],"success":[139],"rate":[140],"over":[142],"90%":[143],"an":[145],"SNR":[146],"close":[147],"40":[149],"dB.":[150]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
