{"id":"https://openalex.org/W4416893293","doi":"https://doi.org/10.1186/s42400-025-00490-2","title":"InfoShadow: NTK &amp; MI guided adversarial attacks on speaker identification systems","display_name":"InfoShadow: NTK &amp; MI guided adversarial attacks on speaker identification systems","publication_year":2025,"publication_date":"2025-11-30","ids":{"openalex":"https://openalex.org/W4416893293","doi":"https://doi.org/10.1186/s42400-025-00490-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00490-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00490-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00490-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00490-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108903773","display_name":"Ruixin Song","orcid":"https://orcid.org/0009-0009-1449-907X"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruixin Song","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Big Data and Information Engineering, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Big Data and Information Engineering, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101640550","display_name":"Mengqian Li","orcid":"https://orcid.org/0000-0002-9580-5738"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengqian Li","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101704112","display_name":"Ze Yang","orcid":"https://orcid.org/0000-0002-3956-8205"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ze Yang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107518993","display_name":"Ruohan Wang","orcid":"https://orcid.org/0009-0005-2146-2292"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruohan Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100092, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100092, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108903773"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20368383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.02979999966919422,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.011300000362098217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7778000235557556},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5217999815940857},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.46299999952316284},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.44839999079704285},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4050999879837036},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.38909998536109924},{"id":"https://openalex.org/keywords/parametric-statistics","display_name":"Parametric statistics","score":0.37400001287460327},{"id":"https://openalex.org/keywords/speaker-identification","display_name":"Speaker identification","score":0.373199999332428},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.37059998512268066}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7778000235557556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758400022983551},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5217999815940857},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5160999894142151},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.46299999952316284},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.44839999079704285},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4458000063896179},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4050999879837036},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37549999356269836},{"id":"https://openalex.org/C117251300","wikidata":"https://www.wikidata.org/wiki/Q1849855","display_name":"Parametric statistics","level":2,"score":0.37400001287460327},{"id":"https://openalex.org/C2986627078","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker identification","level":3,"score":0.373199999332428},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.37059998512268066},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.3578999936580658},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C131675550","wikidata":"https://www.wikidata.org/wiki/Q7646884","display_name":"Surrogate model","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.35510000586509705},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3531000018119812},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.3276999890804291},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.30489999055862427},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2808000147342682},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.2685000002384186},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.25769999623298645}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00490-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00490-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00490-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:57d2bb1d284a48d88f9b854e908df3db","is_oa":true,"landing_page_url":"https://doaj.org/article/57d2bb1d284a48d88f9b854e908df3db","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-15 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00490-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00490-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00490-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2435326154","display_name":null,"funder_award_id":"2021YFB3101100","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4302849700","display_name":null,"funder_award_id":"2021YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G645651932","display_name":null,"funder_award_id":"2021YFB3101100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G968270831","display_name":null,"funder_award_id":"62272123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416893293.pdf","grobid_xml":"https://content.openalex.org/works/W4416893293.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W3098557217","https://openalex.org/W3153453329","https://openalex.org/W3162258435","https://openalex.org/W3204188945","https://openalex.org/W3207651366","https://openalex.org/W3213643395","https://openalex.org/W4281951480","https://openalex.org/W4312585292","https://openalex.org/W4372260053","https://openalex.org/W4378945343","https://openalex.org/W4386076244","https://openalex.org/W4388717917","https://openalex.org/W4392904490","https://openalex.org/W4392904777","https://openalex.org/W4392930617","https://openalex.org/W4393317234","https://openalex.org/W4394769920","https://openalex.org/W4396759862","https://openalex.org/W4396866063","https://openalex.org/W4402669512","https://openalex.org/W6948226440"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Adversarial":[1],"attacks":[2],"on":[3,109],"speaker":[4],"identification":[5],"(SI)":[6],"systems":[7],"have":[8],"become":[9],"a":[10,30,41,51,96,150],"critical":[11],"security":[12],"concern,":[13],"particularly":[14],"in":[15],"targeted":[16],"black-box":[17],"scenarios":[18],"where":[19],"access":[20],"to":[21,46,60,73,128],"the":[22,85,90,120],"target":[23,53],"model":[24,45,144],"is":[25,57,71,93,149],"limited.":[26],"This":[27],"paper":[28],"proposes":[29],"novel":[31],"framework":[32],"that":[33,99,115,134],"creates":[34],"highly":[35],"transferable":[36],"adversarial":[37,91,125,155],"examples.":[38],"We":[39],"use":[40],"voice":[42,139],"conversion":[43,140],"(VC)":[44],"synthesize":[47],"shadow":[48,136],"data":[49,137],"from":[50],"single":[52],"speech":[54,105],"sample,":[55],"which":[56],"then":[58],"used":[59],"train":[61],"two":[62],"diverse":[63],"surrogate":[64,86,143],"models.":[65],"Neural":[66],"Tangent":[67],"Kernel":[68],"(NTK)":[69],"theory":[70],"employed":[72],"align":[74],"acoustic":[75],"feature":[76],"spaces,":[77],"while":[78,103],"mutual":[79],"information":[80],"optimization":[81],"enforces":[82],"consistency":[83],"between":[84],"models\u2019":[87],"predictions.":[88],"Consequently,":[89],"attack":[92,101],"formulated":[94],"as":[95],"min-max":[97],"game":[98],"maximizes":[100],"success":[102],"preserving":[104],"quality.":[106],"Extensive":[107],"experiments":[108],"LibriSpeech":[110],"and":[111,122],"VCTK":[112],"datasets":[113],"demonstrate":[114],"our":[116],"method":[117],"significantly":[118],"improves":[119],"transferability":[121],"effectiveness":[123],"of":[124],"examples":[126],"compared":[127],"conventional":[129],"approaches.":[130],"Our":[131],"findings":[132],"suggest":[133],"generating":[135],"through":[138],"followed":[141],"by":[142],"training":[145],"under":[146],"information-theoretic":[147],"constraints":[148],"promising":[151],"strategy":[152],"for":[153],"robust":[154],"attacks.":[156]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-12-01T00:00:00"}
