{"id":"https://openalex.org/W3042419435","doi":"https://doi.org/10.1145/3395352.3402629","title":"Detecting acoustic backdoor transmission of inaudible messages using deep learning","display_name":"Detecting acoustic backdoor transmission of inaudible messages using deep learning","publication_year":2020,"publication_date":"2020-07-13","ids":{"openalex":"https://openalex.org/W3042419435","doi":"https://doi.org/10.1145/3395352.3402629","mag":"3042419435"},"language":"en","primary_location":{"id":"doi:10.1145/3395352.3402629","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395352.3402629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025909058","display_name":"Silvija Kokalj-Filipovi\u0107","orcid":"https://orcid.org/0000-0002-7548-4092"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Silvija Kokalj-Filipovic","raw_affiliation_strings":["Perspecta Labs Inc"],"affiliations":[{"raw_affiliation_string":"Perspecta Labs Inc","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035758879","display_name":"Morriel Kasher","orcid":"https://orcid.org/0000-0003-1630-9806"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Morriel Kasher","raw_affiliation_strings":["Rutgers University"],"affiliations":[{"raw_affiliation_string":"Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044271442","display_name":"Michael Zhao","orcid":"https://orcid.org/0000-0001-5874-4035"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Michael Zhao","raw_affiliation_strings":["Rutgers University"],"affiliations":[{"raw_affiliation_string":"Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090245711","display_name":"Predrag Spasojevi\u0107","orcid":"https://orcid.org/0000-0002-4244-6698"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Predrag Spasojevic","raw_affiliation_strings":["Rutgers University"],"affiliations":[{"raw_affiliation_string":"Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025909058"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62546553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"80","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9886884689331055},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7433900237083435},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6561638116836548},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5826074481010437},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5736002922058105},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5521374344825745},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5200580954551697},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5133683085441589},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4436524510383606},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.43299198150634766},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4244769811630249},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32131046056747437},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12856259942054749}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9886884689331055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433900237083435},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6561638116836548},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5826074481010437},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5736002922058105},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5521374344825745},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5200580954551697},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5133683085441589},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4436524510383606},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.43299198150634766},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4244769811630249},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32131046056747437},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12856259942054749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3395352.3402629","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395352.3402629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2460937040","https://openalex.org/W2624801495","https://openalex.org/W2751902866","https://openalex.org/W2766001563","https://openalex.org/W2898435086","https://openalex.org/W2923292931","https://openalex.org/W2964301649","https://openalex.org/W3105332166","https://openalex.org/W4300824008"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4328003561","https://openalex.org/W2669956259","https://openalex.org/W4249005693","https://openalex.org/W4281570223","https://openalex.org/W4392946183","https://openalex.org/W3088732000","https://openalex.org/W4321789545"],"abstract_inverted_index":{"The":[0,69,88,105,119,151,217],"novel":[1],"secret":[2,67,237],"inaudible":[3,19,73],"acoustic":[4,22,61,138],"communication":[5,49],"channel":[6,50,71,131,238],"[11],":[7],"referred":[8],"to":[9,27,94,124,163,181,204],"as":[10,113,187,195,232],"the":[11,44,59,96,126,129,134,137,144,147,155,166,183,191,196,200,206,209,213,226,235],"BackDoor":[12,70,130,192,236],"channel,":[13,193],"is":[14,25,92,122,149],"a":[15,31,48,66,79,114,188],"method":[16],"of":[17,43,46,81,101,136,146,157,190,199,212,228,234],"embedding":[18],"signals":[20],"in":[21,221],"data":[23,62],"that":[24,55,128,143,168,177,225],"likely":[26],"be":[28,179],"processed":[29],"by":[30,51,75],"trained":[32,57,170],"deep":[33,52,158,229],"neural":[34,103],"net.":[35,104],"In":[36],"this":[37,222],"paper":[38,223],"we":[39,141],"perform":[40],"preliminary":[41,218],"studies":[42],"detectability":[45],"such":[47,65,194],"learning":[53,230],"algorithms":[54],"are":[56,108,169],"on":[58,133,154],"original":[60],"used":[63,93,123,180,203],"for":[64,99,117],"exploit.":[68],"embeds":[72],"messages":[74],"modulating":[76],"them":[77],"with":[78],"sinewave":[80],"40kHz":[82],"and":[83,111,140,160],"transmitting":[84],"using":[85,171],"ultrasonic":[86],"speakers.":[87],"received":[89],"composite":[90],"signal":[91],"generate":[95],"Backdoor":[97,120],"dataset":[98,116,121],"evaluation":[100],"our":[102],"audible":[106],"samples":[107,185],"played":[109],"back":[110],"recorded":[112],"baseline":[115],"training.":[118],"evaluate":[125],"impact":[127,164],"has":[132],"classification":[135],"data,":[139],"show":[142],"accuracy":[145],"classifier":[148,159,207],"degraded.":[150],"degradation":[152],"depends":[153],"type":[156],"it":[161],"appears":[162],"less":[165],"classifiers":[167,231],"autoencoders.":[172],"We":[173],"also":[174],"propose":[175],"statistics":[176],"can":[178],"detect":[182],"out-of-distribution":[184],"created":[186],"result":[189],"log":[197],"likelihood":[198],"variational":[201],"autoencoder":[202],"pre-train":[205],"or":[208],"empirical":[210],"entropy":[211],"classifier's":[214],"output":[215],"layer.":[216],"results":[219],"presented":[220],"indicate":[224],"use":[227],"detectors":[233],"merits":[239],"further":[240],"research.":[241]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
