{"id":"https://openalex.org/W3016138785","doi":"https://doi.org/10.1109/icassp40776.2020.9053643","title":"Defense Against Adversarial Attacks on Spoofing Countermeasures of ASV","display_name":"Defense Against Adversarial Attacks on Spoofing Countermeasures of ASV","publication_year":2020,"publication_date":"2020-04-09","ids":{"openalex":"https://openalex.org/W3016138785","doi":"https://doi.org/10.1109/icassp40776.2020.9053643","mag":"3016138785"},"language":"en","primary_location":{"id":"doi:10.1109/icassp40776.2020.9053643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101474128","display_name":"Haibin Wu","orcid":"https://orcid.org/0000-0001-7166-5534"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Haibin Wu","raw_affiliation_strings":["Graduate Institute of Communication Engineering, National Taiwan University"],"affiliations":[{"raw_affiliation_string":"Graduate Institute of Communication Engineering, National Taiwan University","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102778496","display_name":"Songxiang Liu","orcid":"https://orcid.org/0000-0002-0943-2446"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Songxiang Liu","raw_affiliation_strings":["Human-Computer Communications Laboratory, The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Human-Computer Communications Laboratory, The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019458385","display_name":"Helen Meng","orcid":"https://orcid.org/0000-0002-4427-3532"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Helen Meng","raw_affiliation_strings":["Human-Computer Communications Laboratory, The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Human-Computer Communications Laboratory, The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040508737","display_name":"Hung-yi Lee","orcid":"https://orcid.org/0000-0002-9654-5747"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hung-yi Lee","raw_affiliation_strings":["Graduate Institute of Communication Engineering, National Taiwan University"],"affiliations":[{"raw_affiliation_string":"Graduate Institute of Communication Engineering, National Taiwan University","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101474128"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":5.1657,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.96215069,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"6564","last_page":"6568"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9467999935150146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9371873140335083},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.9162459373474121},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.755286693572998},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7179898023605347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6443472504615784},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5976805686950684},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5346839427947998},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3268710970878601},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11843496561050415}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9371873140335083},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.9162459373474121},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.755286693572998},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7179898023605347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6443472504615784},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5976805686950684},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5346839427947998},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3268710970878601},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11843496561050415},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp40776.2020.9053643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W67277430","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1985371235","https://openalex.org/W2039057510","https://openalex.org/W2041823554","https://openalex.org/W2114925438","https://openalex.org/W2176804518","https://openalex.org/W2395750323","https://openalex.org/W2607219512","https://openalex.org/W2745896134","https://openalex.org/W2936802426","https://openalex.org/W2963207607","https://openalex.org/W2963744840","https://openalex.org/W2964153729","https://openalex.org/W2964253222","https://openalex.org/W2967606780","https://openalex.org/W2970759645","https://openalex.org/W2972465261","https://openalex.org/W2972703466","https://openalex.org/W2972811785","https://openalex.org/W2973181078","https://openalex.org/W2980486495","https://openalex.org/W3006808893","https://openalex.org/W4293846201","https://openalex.org/W6602762607","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6685748340","https://openalex.org/W6736207377","https://openalex.org/W6738693630","https://openalex.org/W6739868092"],"related_works":["https://openalex.org/W3016138785","https://openalex.org/W4315780078","https://openalex.org/W3009053050","https://openalex.org/W3016518327","https://openalex.org/W3022027823","https://openalex.org/W2376398693","https://openalex.org/W933266192","https://openalex.org/W3210622359","https://openalex.org/W3196426613","https://openalex.org/W2363849142"],"abstract_inverted_index":{"Various":[0],"forefront":[1],"countermeasure":[2,27,40,89,111,128],"methods":[3,103,124],"for":[4],"automatic":[5],"speaker":[6],"verification":[7],"(ASV)":[8],"with":[9],"considerable":[10],"performance":[11],"in":[12,16],"anti-spoofing":[13],"are":[14,29],"proposed":[15],"the":[17,84,98,106],"ASVspoof":[18],"2019":[19],"challenge.":[20],"However,":[21],"previous":[22],"work":[23],"has":[24],"shown":[25],"that":[26,120],"models":[28,90,112,129],"vulnerable":[30],"to":[31,82,100,104],"adversarial":[32,80,92,114,131],"examples":[33,60],"indistinguishable":[34],"from":[35],"natural":[36],"data.":[37],"A":[38],"good":[39],"model":[41],"should":[42],"not":[43],"only":[44],"be":[45],"robust":[46],"against":[47,91],"spoofing":[48,88,110,127],"audio,":[49],"including":[50],"synthetic,":[51],"converted,":[52],"and":[53,75],"replayed":[54],"audios;":[55],"but":[56],"counteract":[57],"deliberately":[58],"generated":[59],"by":[61],"malicious":[62],"adversaries.":[63],"In":[64],"this":[65],"work,":[66],"we":[67],"introduce":[68],"a":[69,76],"passive":[70],"defense":[71,78,102,123],"method,":[72,79],"spatial":[73],"smoothing,":[74],"proactive":[77],"training,":[81],"mitigate":[83],"vulnerability":[85],"of":[86,108],"ASV":[87,109],"examples.":[93,132],"This":[94],"paper":[95],"is":[96],"among":[97],"first":[99],"use":[101],"improve":[105],"robustness":[107],"under":[113],"attacks.":[115],"The":[116],"experimental":[117],"results":[118],"show":[119],"these":[121],"two":[122],"positively":[125],"help":[126],"counter":[130]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":6}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
