{"id":"https://openalex.org/W4360995550","doi":"https://doi.org/10.1109/mcom.012.2200596","title":"Data Poisoning and Backdoor Attacks on Audio Intelligence Systems","display_name":"Data Poisoning and Backdoor Attacks on Audio Intelligence Systems","publication_year":2023,"publication_date":"2023-03-27","ids":{"openalex":"https://openalex.org/W4360995550","doi":"https://doi.org/10.1109/mcom.012.2200596"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.012.2200596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.012.2200596","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101182247","display_name":"Yunjie Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunjie Ge","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074653939","display_name":"Jiayuan Yu","orcid":"https://orcid.org/0000-0003-2458-6926"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayuan Yu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education,China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064997871","display_name":"Chao Shen","orcid":"https://orcid.org/0000-0003-4147-4934"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Shen","raw_affiliation_strings":["Xi&#x0027;an Jiaotong University,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an Jiaotong University,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Tsinghua University,China","Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101182247"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":3.1731,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92007561,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"61","issue":"12","first_page":"176","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.987030029296875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8483830690383911},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7428095936775208},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.523733377456665},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48012518882751465},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4793851375579834},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4317135810852051},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.41447964310646057},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1818324327468872},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.1495373249053955}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.987030029296875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483830690383911},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7428095936775208},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.523733377456665},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48012518882751465},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4793851375579834},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4317135810852051},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.41447964310646057},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1818324327468872},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.1495373249053955},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.012.2200596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.012.2200596","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G3889752265","display_name":null,"funder_award_id":"U20B2049,U21B2018,62161160337,61822309,61773310,U1736205,61802166,62132011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8075392316","display_name":null,"funder_award_id":"2020AAA0107701","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1552056088","https://openalex.org/W2129244720","https://openalex.org/W2172256532","https://openalex.org/W2753783305","https://openalex.org/W2942091739","https://openalex.org/W3152758407","https://openalex.org/W3163083600","https://openalex.org/W4221167586","https://openalex.org/W4281645443","https://openalex.org/W4287062987","https://openalex.org/W4287636062","https://openalex.org/W6750462152","https://openalex.org/W6754602573","https://openalex.org/W6788785544","https://openalex.org/W6797172672","https://openalex.org/W6799444384","https://openalex.org/W6802966891","https://openalex.org/W6810249945"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W3015678314","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3009072493","https://openalex.org/W4386185023","https://openalex.org/W4317672133","https://openalex.org/W3140988292","https://openalex.org/W4386080799","https://openalex.org/W4309417370"],"abstract_inverted_index":{"Training":[0],"high-performance":[1],"audio":[2,59,94,116],"models":[3],"requires":[4],"a":[5,55,61,150],"large":[6],"corpus":[7],"of":[8,88,108,162,165,171],"training":[9,38],"samples,":[10],"expensive":[11],"computational":[12],"resources,":[13,33],"and":[14,76,86,111,139,168],"expert":[15],"knowledge.":[16],"These":[17,79],"costs":[18],"are":[19],"computationally":[20],"intensive":[21],"for":[22,34,57],"individuals":[23],"with":[24,97],"limited":[25],"resources.":[26],"Consequently,":[27],"users":[28,71],"may":[29,69],"turn":[30],"to":[31,39,73],"third-party":[32],"example,":[35],"outsourcing":[36],"the":[37,48,84,89,93,105,109,121,145,163,166,169,172],"powerful":[40],"cloud":[41],"servers":[42],"or":[43],"automatically":[44],"scraping":[45],"data":[46,74,112],"from":[47],"Internet.":[49],"While":[50],"these":[51],"available":[52],"resources":[53],"provide":[54],"playground":[56],"developing":[58],"models,":[60],"concerning":[62],"fact":[63],"is":[64],"that":[65,132],"malicious":[66],"third":[67],"parties":[68],"render":[70],"vulnerable":[72],"poisoning":[75,113,135],"backdoor":[77,110,140],"attacks.":[78,141],"attacks":[80,114,167],"can":[81],"seriously":[82],"undermine":[83],"security":[85],"usability":[87],"system":[90],"supported":[91],"by":[92,149],"model,":[95],"sometimes":[96],"catastrophic":[98],"consequences.":[99],"In":[100],"this":[101,184],"article,":[102],"we":[103,154,176],"review":[104],"existing":[106],"schemes":[107,124],"on":[115,129],"intelligence":[117],"systems.":[118],"We":[119,142],"classify":[120],"state-of-the-art":[122,146],"attack":[123,158],"into":[125],"three":[126],"categories":[127],"based":[128],"their":[130],"goals,":[131],"is,":[133],"untargeted":[134],"attacks,":[136,138],"triggerless":[137],"briefly":[143],"introduce":[144],"solutions,":[147],"followed":[148],"comprehensive":[151],"comparison.":[152],"Moreover,":[153],"quantitatively":[155],"compare":[156],"several":[157],"methods":[159],"in":[160,183],"terms":[161],"performance":[164],"inaudibility":[170],"poisoned":[173],"examples.":[174],"Finally,":[175],"highlight":[177],"some":[178],"promising":[179],"future":[180],"research":[181],"directions":[182],"field.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
