{"id":"https://openalex.org/W2955279649","doi":"https://doi.org/10.21437/interspeech.2019-2420","title":"Adversarial Black-Box Attacks on Automatic Speech Recognition Systems Using Multi-Objective Evolutionary Optimization","display_name":"Adversarial Black-Box Attacks on Automatic Speech Recognition Systems Using Multi-Objective Evolutionary Optimization","publication_year":2019,"publication_date":"2019-09-13","ids":{"openalex":"https://openalex.org/W2955279649","doi":"https://doi.org/10.21437/interspeech.2019-2420","mag":"2955279649"},"language":"en","primary_location":{"id":"doi:10.21437/interspeech.2019-2420","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2019-2420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2019","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1811.01312","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003885291","display_name":"Shreya Khare","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shreya Khare","raw_affiliation_strings":["IBM"],"affiliations":[{"raw_affiliation_string":"IBM","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107879471","display_name":"Rahul Aralikatte","orcid":null},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Rahul Aralikatte","raw_affiliation_strings":["University of Copenhagen"],"affiliations":[{"raw_affiliation_string":"University of Copenhagen","institution_ids":["https://openalex.org/I124055696"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065047775","display_name":"Senthil Mani","orcid":"https://orcid.org/0000-0002-9624-2623"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Senthil Mani","raw_affiliation_strings":["IBM"],"affiliations":[{"raw_affiliation_string":"IBM","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003885291"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5788,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75420051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3208","last_page":"3212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11206","display_name":"Model Reduction and Neural Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6882411241531372},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.6245797872543335},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5843807458877563},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5553558468818665},{"id":"https://openalex.org/keywords/replicate","display_name":"Replicate","score":0.5120971202850342},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.48740676045417786},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.4259776175022125},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4258421063423157},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3662523329257965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0922166109085083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6882411241531372},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.6245797872543335},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5843807458877563},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5553558468818665},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.5120971202850342},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.48740676045417786},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.4259776175022125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4258421063423157},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3662523329257965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0922166109085083},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.21437/interspeech.2019-2420","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2019-2420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2019","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1811.01312","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1811.01312","pdf_url":"https://arxiv.org/pdf/1811.01312","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2955279649","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1811.01312.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/6c595e36-2150-4bf6-89cd-075cd0762b46","is_oa":false,"landing_page_url":"https://researchprofiles.ku.dk/da/publications/6c595e36-2150-4bf6-89cd-075cd0762b46","pdf_url":null,"source":{"id":"https://openalex.org/S4306401983","display_name":"Research at the University of Copenhagen (University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124055696","host_organization_name":"University of Copenhagen","host_organization_lineage":["https://openalex.org/I124055696"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khare , S , Aralikatte , R & Mani , S 2019 , Adversarial Black-Box Attacks on Automatic Speech Recognition Systems Using Multi-Objective Evolutionary Optimization . in Proc. Interspeech 2019 . International Speech Communication Association (ISCA) , pp. 3208-3212 , Interspeech 2019 - 20th Annual Conference of the International Speech Communication Association , Graz , Austria , 15/09/2019 . https://doi.org/10.21437/Interspeech.2019-2420 , https://doi.org/10.21437/Interspeech.2019","raw_type":"contributionToPeriodical"},{"id":"doi:10.48550/arxiv.1811.01312","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1811.01312","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1811.01312","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1811.01312","pdf_url":"https://arxiv.org/pdf/1811.01312","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2955279649.pdf","grobid_xml":"https://content.openalex.org/works/W2955279649.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1524333225","https://openalex.org/W1565902586","https://openalex.org/W1612556207","https://openalex.org/W1673923490","https://openalex.org/W1922655562","https://openalex.org/W2020141429","https://openalex.org/W2121365620","https://openalex.org/W2126105956","https://openalex.org/W2486441166","https://openalex.org/W2516574342","https://openalex.org/W2624801495","https://openalex.org/W2751902866","https://openalex.org/W2777449390","https://openalex.org/W2782403400","https://openalex.org/W2783113218","https://openalex.org/W2803853585","https://openalex.org/W2963207607"],"related_works":["https://openalex.org/W2973057252","https://openalex.org/W2973252307","https://openalex.org/W2996463502","https://openalex.org/W2899171775","https://openalex.org/W3015241525","https://openalex.org/W3129501265","https://openalex.org/W3031806488","https://openalex.org/W3042692870","https://openalex.org/W2781152419","https://openalex.org/W3087774833","https://openalex.org/W3174354963","https://openalex.org/W3091836876","https://openalex.org/W2886924402","https://openalex.org/W3034859328","https://openalex.org/W3096366160","https://openalex.org/W3096171620","https://openalex.org/W3157742399","https://openalex.org/W3123739596","https://openalex.org/W2955431898","https://openalex.org/W3083910051"],"abstract_inverted_index":{"Fooling":[0],"deep":[1],"neural":[2],"networks":[3],"with":[4,118],"adversarial":[5,107],"input":[6],"have":[7,25],"exposed":[8],"a":[9,49,110],"significant":[10],"vulnerability":[11],"in":[12,17],"the":[13,31,40,83,95,106,119],"current":[14],"state-of-the-art":[15],"systems":[16,90],"multiple":[18],"domains.":[19],"Both":[20],"black-box":[21,62],"and":[22,60,79,103,116],"white-box":[23],"approaches":[24],"been":[26],"used":[27],"to":[28,35,42,56],"either":[29],"replicate":[30],"model":[32,41],"itself":[33],"or":[34],"craft":[36],"examples":[37],"which":[38,51,81],"cause":[39],"fail.":[43],"In":[44],"this":[45,72],"work,":[46],"we":[47],"propose":[48],"framework":[50,73],"uses":[52],"multi-objective":[53],"evolutionary":[54],"optimization":[55],"perform":[57],"both":[58,101],"targeted":[59,104],"un-targeted":[61,102],"attacks":[63],"on":[64,74],"Automatic":[65],"Speech":[66],"Recognition":[67],"(ASR)":[68],"systems.":[69],"We":[70],"apply":[71],"two":[75],"ASR":[76],"systems:":[77],"Deepspeech":[78],"Kaldi-ASR,":[80],"increases":[82],"Word":[84],"Error":[85],"Rates":[86],"(WER)":[87],"of":[88,97,114],"these":[89],"by":[91],"upto":[92],"980%,":[93],"indicating":[94],"potency":[96],"our":[98],"approach.":[99],"During":[100],"attacks,":[105],"samples":[108],"maintain":[109],"high":[111],"acoustic":[112],"similarity":[113],"0.98":[115],"0.97":[117],"original":[120],"audio.":[121]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
