{"id":"https://openalex.org/W4390045124","doi":"https://doi.org/10.1109/tifs.2023.3345639","title":"AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception","display_name":"AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception","publication_year":2023,"publication_date":"2023-12-21","ids":{"openalex":"https://openalex.org/W4390045124","doi":"https://doi.org/10.1109/tifs.2023.3345639"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3345639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3345639","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076217439","display_name":"Meng Chen","orcid":"https://orcid.org/0000-0002-4775-5107"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Chen","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Lu","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012589427","display_name":"Jiadi Yu","orcid":"https://orcid.org/0000-0002-0207-9643"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiadi Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078406349","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-5240-5200"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Lin","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5076217439"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":2.452,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91384753,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"1948","last_page":"1962"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9624000191688538,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9503999948501587,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7878097295761108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7455275654792786},{"id":"https://openalex.org/keywords/reverberation","display_name":"Reverberation","score":0.5931165814399719},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.49933290481567383},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.458100825548172},{"id":"https://openalex.org/keywords/psychoacoustics","display_name":"Psychoacoustics","score":0.45526814460754395},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4256080389022827},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3341481685638428},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09326893091201782}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7878097295761108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7455275654792786},{"id":"https://openalex.org/C95851461","wikidata":"https://www.wikidata.org/wiki/Q468809","display_name":"Reverberation","level":2,"score":0.5931165814399719},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.49933290481567383},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.458100825548172},{"id":"https://openalex.org/C9940772","wikidata":"https://www.wikidata.org/wiki/Q557399","display_name":"Psychoacoustics","level":3,"score":0.45526814460754395},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4256080389022827},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3341481685638428},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09326893091201782},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3345639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3345639","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6600000262260437,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2051114290","display_name":null,"funder_award_id":"62172359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3123248364","display_name":null,"funder_award_id":"62372406","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3489595043","display_name":null,"funder_award_id":"62032021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4001607369","display_name":null,"funder_award_id":"62172277","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043574788","display_name":null,"funder_award_id":"62102354","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5479196649","display_name":null,"funder_award_id":"2023YFB3107402","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W2242685705","https://openalex.org/W2395011401","https://openalex.org/W2726515241","https://openalex.org/W2747874407","https://openalex.org/W2765636281","https://openalex.org/W2770312844","https://openalex.org/W2791862028","https://openalex.org/W2890964092","https://openalex.org/W2898435086","https://openalex.org/W2906211136","https://openalex.org/W2963058500","https://openalex.org/W2964301649","https://openalex.org/W2972706975","https://openalex.org/W2973226577","https://openalex.org/W2984968650","https://openalex.org/W3006816054","https://openalex.org/W3017720918","https://openalex.org/W3024869864","https://openalex.org/W3035729089","https://openalex.org/W3047561893","https://openalex.org/W3084424094","https://openalex.org/W3088377098","https://openalex.org/W3091896612","https://openalex.org/W3093004624","https://openalex.org/W3109668151","https://openalex.org/W3110715780","https://openalex.org/W3153453329","https://openalex.org/W3167533889","https://openalex.org/W3196496149","https://openalex.org/W3207651366","https://openalex.org/W3212869614","https://openalex.org/W4281951480","https://openalex.org/W4283215219","https://openalex.org/W4308642081","https://openalex.org/W4313387422","https://openalex.org/W6640425456","https://openalex.org/W6748288002","https://openalex.org/W6750665317","https://openalex.org/W6760326341","https://openalex.org/W6767269270","https://openalex.org/W6780218876","https://openalex.org/W6782061724","https://openalex.org/W6782072790","https://openalex.org/W6790512348","https://openalex.org/W6791552382","https://openalex.org/W6847363464"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"As":[0],"one":[1],"of":[2,91,101],"the":[3,46,57,67,75,89],"most":[4],"representative":[5],"applications":[6],"built":[7],"on":[8,61,71,136,151,174],"deep":[9],"learning,":[10],"audio":[11,92,102],"systems,":[12],"including":[13],"keyword":[14],"spotting,":[15],"automatic":[16],"speech":[17,153],"recognition,":[18],"and":[19,41,77,95,126,145,154,183,191],"speaker":[20],"identification,":[21],"have":[22,33],"recently":[23],"been":[24],"demonstrated":[25],"to":[26,29,66,97,142],"be":[27],"vulnerable":[28],"adversarial":[30,48,93,113,118,149],"examples,":[31],"which":[32],"already":[34],"raised":[35],"general":[36],"concerns":[37],"in":[38,189],"both":[39,152],"academia":[40],"industry.":[42],"Existing":[43],"attacks":[44],"follow":[45],"same":[47],"example":[49,114],"generation":[50],"paradigm":[51],"from":[52,186],"computer":[53],"vision,":[54],"i.e.,":[55,104],"overlaying":[56],"optimized":[58],"additive":[59,68],"perturbations":[60,119,150],"original":[62],"voices.":[63],"However,":[64],"due":[65],"perturbations\u2019":[69],"nature":[70],"human":[72,187],"audibility,":[73],"balancing":[74],"stealthiness":[76,90],"attack":[78,169],"capability":[79],"remains":[80],"a":[81,107,129,158],"challenging":[82],"problem.":[83],"In":[84],"this":[85,137],"paper,":[86],"we":[87,139],"rethink":[88],"examples":[94],"turn":[96],"introduce":[98],"another":[99],"kind":[100],"distortion,":[103],"reverberation,":[105],"as":[106,122,128],"new":[108],"perturbation":[109],"format":[110],"for":[111,132],"stealthy":[112,185],"generation.":[115],"Such":[116],"convolutional":[117,148],"are":[120],"crafted":[121],"real-world":[123],"impulse":[124],"responses":[125],"behave":[127],"natural":[130],"reverberation":[131],"deceiving":[133],"humans.":[134],"Based":[135],"idea,":[138],"propose":[140],"AdvReverb":[141,165],"construct,":[143],"optimize,":[144],"deliver":[146],"phoneme-level":[147],"music":[155],"carriers":[156],"with":[157],"well-designed":[159],"objective.":[160],"Experimental":[161],"results":[162],"demonstrate":[163],"that":[164],"could":[166],"realize":[167],"high":[168],"success":[170],"rates":[171],"over":[172],"95%":[173],"three":[175],"audio-domain":[176],"tasks":[177],"while":[178],"achieving":[179],"superior":[180],"perceptual":[181],"quality":[182],"keeping":[184],"perception":[188],"over-the-air":[190],"over-the-line":[192],"delivery":[193],"scenarios.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
