{"id":"https://openalex.org/W3126280775","doi":"https://doi.org/10.1155/2021/6664578","title":"Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference","display_name":"Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference","publication_year":2021,"publication_date":"2021-02-09","ids":{"openalex":"https://openalex.org/W3126280775","doi":"https://doi.org/10.1155/2021/6664578","mag":"3126280775"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6664578","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6664578","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6664578.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/6664578.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101448013","display_name":"Hongwei Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Luo","raw_affiliation_strings":["National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044206299","display_name":"Yijie Shen","orcid":"https://orcid.org/0000-0003-1202-2525"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijie Shen","raw_affiliation_strings":["Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078406349","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-5240-5200"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Lin","raw_affiliation_strings":["Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102002679","display_name":"Guoai Xu","orcid":"https://orcid.org/0000-0002-9582-0698"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoai Xu","raw_affiliation_strings":["National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory of Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078406349"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.2599,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83170996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9023443460464478},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.8842198848724365},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6776481866836548},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5968726277351379},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5528148412704468},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.542485773563385},{"id":"https://openalex.org/keywords/cosine-similarity","display_name":"Cosine similarity","score":0.5198659896850586},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.49478358030319214},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.4677923619747162},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4323674142360687},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4058570861816406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2426079511642456},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.23198458552360535}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9023443460464478},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.8842198848724365},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6776481866836548},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5968726277351379},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5528148412704468},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.542485773563385},{"id":"https://openalex.org/C2780762811","wikidata":"https://www.wikidata.org/wiki/Q1784941","display_name":"Cosine similarity","level":3,"score":0.5198659896850586},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.49478358030319214},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.4677923619747162},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4323674142360687},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4058570861816406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2426079511642456},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.23198458552360535}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6664578","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6664578","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6664578.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:546774b815384a48bed3e99e129d63e4","is_oa":true,"landing_page_url":"https://doaj.org/article/546774b815384a48bed3e99e129d63e4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6664578","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6664578","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6664578.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1553882415","display_name":null,"funder_award_id":"61972348","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7814002136","display_name":null,"funder_award_id":"2018R01005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8260033203","display_name":null,"funder_award_id":"2018YFB0803600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8474468873","display_name":null,"funder_award_id":"B08036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8634480258","display_name":null,"funder_award_id":"2018YFB0803600","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3126280775.pdf","grobid_xml":"https://content.openalex.org/works/W3126280775.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1438441013","https://openalex.org/W1570346215","https://openalex.org/W1582821637","https://openalex.org/W2046056978","https://openalex.org/W2061278248","https://openalex.org/W2114925438","https://openalex.org/W2127141656","https://openalex.org/W2151298633","https://openalex.org/W2765424254","https://openalex.org/W2765952435","https://openalex.org/W2810085920","https://openalex.org/W2885643293","https://openalex.org/W2890964092","https://openalex.org/W2914010771","https://openalex.org/W2920790154","https://openalex.org/W2923292931","https://openalex.org/W2926601139","https://openalex.org/W2937449824","https://openalex.org/W2937813194","https://openalex.org/W2956804760","https://openalex.org/W2962788625","https://openalex.org/W2964301649","https://openalex.org/W2984998244","https://openalex.org/W2985489290","https://openalex.org/W2997395473","https://openalex.org/W3005759882","https://openalex.org/W3005862847","https://openalex.org/W3010968188","https://openalex.org/W3015186410","https://openalex.org/W3016098132","https://openalex.org/W3103557498","https://openalex.org/W3103836116","https://openalex.org/W4252197785","https://openalex.org/W4288029451"],"related_works":["https://openalex.org/W4294437891","https://openalex.org/W4226389478","https://openalex.org/W4297792928","https://openalex.org/W4221161333","https://openalex.org/W4297841768","https://openalex.org/W3113108043","https://openalex.org/W2061278248","https://openalex.org/W4298202768","https://openalex.org/W1914348842","https://openalex.org/W2331222812"],"abstract_inverted_index":{"Speaker":[0],"verification":[1,27,51,119,160],"system":[2,28,52,91,161],"has":[3,34,138,166],"gained":[4],"great":[5],"popularity":[6],"in":[7],"recent":[8],"years,":[9],"especially":[10],"with":[11,84,92],"the":[12,23,48,65,90,116,127,146,156,167],"development":[13],"of":[14,20,25,103],"deep":[15,31],"neural":[16,32],"networks":[17,33],"and":[18,87],"Internet":[19],"Things.":[21],"However,":[22],"security":[24],"speaker":[26,50,118,159],"based":[29,53],"on":[30,54],"not":[35,152],"been":[36],"well":[37],"investigated.":[38],"In":[39,144],"this":[40],"paper,":[41],"we":[42,69],"propose":[43],"an":[44],"attack":[45,105,137,151],"to":[46,75,96,114,169],"spoof":[47,89,155],"state-of-the-art":[49,157],"generalized":[55],"end-to-end":[56],"(GE2E)":[57],"loss":[58,73],"function":[59,74],"for":[60,79],"misclassifying":[61],"illegal":[62],"users":[63],"into":[64],"authentic":[66],"user.":[67],"Specifically,":[68],"design":[70],"a":[71,77],"novel":[72],"deploy":[76,115],"generator":[78],"generating":[80],"effective":[81],"adversarial":[82,94],"examples":[83,95],"slight":[85],"perturbation":[86],"then":[88],"these":[93],"achieve":[97],"our":[98,104,123,136,150],"goals.":[99],"The":[100],"success":[101],"rate":[102],"can":[106,154],"reach":[107],"82%":[108],"when":[109],"cosine":[110],"similarity":[111],"is":[112],"adopted":[113],"deep-learning-based":[117],"system.":[120],"Beyond":[121],"that,":[122],"experiments":[124],"also":[125,163],"reported":[126],"signal-to-noise":[128],"ratio":[129],"at":[130],"76":[131],"dB,":[132],"which":[133],"proves":[134],"that":[135,149],"higher":[139],"imperceptibility":[140],"than":[141],"previous":[142],"works.":[143],"summary,":[145],"results":[147],"show":[148],"only":[153],"neural-network-based":[158],"but":[162],"more":[164],"importantly":[165],"ability":[168],"hide":[170],"from":[171],"human":[172],"hearing":[173],"or":[174],"machine":[175],"discrimination.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
