Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob?...

68
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu Fu Song ([email protected])

Transcript of Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob?...

Page 1: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

Fu Song ([email protected])

Page 2: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Page 3: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Page 4: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Ubiquitous Application

Page 5: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Ubiquitous Application

Voice assistant wake up

Page 6: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Page 7: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction

Page 8: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Speaker Recognition Systems (SRSs)

Bob ImposterAlice

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction App log in

WeChat

Page 9: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction App log in

WeChat

Safety-critical scenario

Page 10: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction App log in

WeChat

Safety-critical scenarioOnce broken

Page 11: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Safety-critical scenarioOnce broken

property damage

reputation degrade

sensitive information leak…

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction App log in

WeChat

Page 12: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Security of SRSs!!!

Ubiquitous Application

Voice assistant wake up Personalized service on smart home

Financial transaction App log in

WeChat

Page 13: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Page 14: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Machine Learning (ML)

Page 15: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Machine Learning (ML)

However,

Page 16: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Machine Learning (ML)

However, ML is vulnerable to adversarial examples

Page 17: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Machine Learning (ML)

However, ML is vulnerable to adversarial examples

Ian Goodfellow et al.

Page 18: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Mainstream implementation of SRSs

Machine Learning (ML)

However, ML is vulnerable to adversarial examples

Ian Goodfellow et al. Nicholas Carlini et al.

Page 19: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Is adversarial attack practical on SRSs ?

Page 20: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Is adversarial attack practical on SRSs ?

FAKEBOBBlack-boxAppliable to general SRS taskEffective on commercial SRSsEffective in over-the-air attack

Page 21: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Threat model

Page 22: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Threat modelAttacker Goal: pass voice authentication; gain access to privilege

Page 23: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Threat modelAttacker Goal: pass voice authentication; gain access to privilege

Attacker Capability: no information about model structure / parameter;

Page 24: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Threat modelAttacker Goal: pass voice authentication; gain access to privilege

Attacker Capability: no information about model structure / parameter; limited to query the speak model of the victims

Page 25: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 2

3 4

Page 26: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 Effective loss function design.

1 2

3 4

Page 27: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 Effective loss function design. Goal: 𝑓𝑓 𝑥𝑥 ≤ 0 ↔ attack succeeds

1 2

3 4

Page 28: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 Effective loss function design. Goal: 𝑓𝑓 𝑥𝑥 ≤ 0 ↔ attack succeedsBased on scoring and decision-making mechanism

1 2

3 4

Page 29: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 Effective loss function design. Goal: 𝑓𝑓 𝑥𝑥 ≤ 0 ↔ attack succeedsBased on scoring and decision-making mechanism

Open-set identification (OSI) task𝜃𝜃: threshold

1 2

3 4

Page 30: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

1 Effective loss function design. Goal: 𝑓𝑓 𝑥𝑥 ≤ 0 ↔ attack succeedsBased on scoring and decision-making mechanism

Open-set identification (OSI) task𝜃𝜃: threshold

Tailored for different SRSs tasks: CSI, SV, OSI

1 2

3 4

Page 31: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

2 Threshold: unique in VPR; unknown to attacker

1 2

3 4

Page 32: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

2 Threshold: unique in VPR; unknown to attackerNovel threshold estimation algorithm

1 2

3 4

Page 33: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

2 Threshold: unique in VPR; unknown to attackerNovel threshold estimation algorithm

1 2

3 4

Page 34: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

2 Threshold: unique in VPR; unknown to attackerNovel threshold estimation algorithm

�̂�𝜃 ≈ 𝜃𝜃

1 2

3 4

Page 35: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

3 NES-based gradient estimation

1 2

3 4

Page 36: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

3 NES-based gradient estimation

rely on scores and decisions by querying victim speaker model

1 2

3 4

Page 37: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

3 NES-based gradient estimation

rely on scores and decisions by querying victim speaker model Black-box

1 2

3 4

Page 38: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

3 NES-based gradient estimation

4 Solve the optimization problem by gradient descent

gradient information

1 2

3 4

Page 39: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attack

1 2

3 4

Page 40: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attacknoise in air makes attack ineffective

1 2

3 4

Page 41: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attack

previous work: noise modelnoise in air makes attack ineffective

1 2

3 4

Page 42: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attack

somehow environment- and device- dependentprevious work: noise modelnoise in air makes attack ineffective

1 2

3 4

Page 43: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attack

somehow environment- and device- dependentprevious work: noise modelnoise in air makes attack ineffective

ours: improve confidence

1 2

3 4

Page 44: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Overview of FAKEBOB

5 Over-the-air attack

somehow environment- and device- dependentprevious work: noise modelnoise in air makes attack ineffective

ours: improve confidence

1 2

3 4

Page 45: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Experimental result

Page 46: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Attack Open-source

Experimental result

Page 47: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Attack Open-source

≈ 100% attack success rate (ASR)

Experimental result

Page 48: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Attack Open-source

≈ 100% attack success rate (ASR)

Attack Commercial

Experimental result

Page 49: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Attack Open-source

≈ 100% attack success rate (ASR)

Talentedsoft: 100% ASR; 2500 query on averageAttack Commercial

Experimental result

Page 50: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Attack Open-source

≈ 100% attack success rate (ASR)

Microsoft Azure: 26% ASR

Talentedsoft: 100% ASR; 2500 query on averageAttack Commercial

Experimental result

Page 51: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Over the air Attack

Experimental result

Page 52: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Over the air Attack

Experimental result

different distance between loundspeakerand microphone

Distance (meter) 0.25 0.5 1 2 4 8ASR (%) 100 100 100 70 40 10

Page 53: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Over the air Attack

Experimental result

Different devices (at least 70% ASR)

JBL portable speaker

Shinco broadcast equipment

Loundspeaker:

Laptop

iPhone OPPO

Microphone:

different distance between loundspeakerand microphone

Distance (meter) 0.25 0.5 1 2 4 8ASR (%) 100 100 100 70 40 10

Device independent

Page 54: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Over the air Attack

Experimental result

JBL portable speaker

Shinco broadcast equipment

Loundspeaker:

Laptop

different acoustic environments White / Bus / Restaurant / Music noiseat least 48% ASR when noise < 60 dB

Different devices (at least 70% ASR)different distance between loundspeakerand microphone

Distance (meter) 0.25 0.5 1 2 4 8ASR (%) 100 100 100 70 40 10

iPhone OPPO

Microphone:

Device independentEnvironment independent

Page 55: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

Page 56: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

originalvoiceAlice

(source speaker)

utter

Page 57: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

+

perturbation

originalvoice

adversarialvoice

craft

utter

Alice(source speaker)

Page 58: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

+ “It is uttered by Bob”

Bob’s speaker model

perturbation

originalvoice

adversarialvoice

craft

utterrecognized (target)

Alice(source speaker)

Page 59: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

+ “It is uttered by Bob”

“It is uttered by Alice”

Bob’s speaker model

perturbation

originalvoice

adversarialvoice

craft

utterrecognized

listened

The third person

(target)

(source)

Alice(source speaker)

Page 60: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

+ “It is uttered by Bob”

“It is uttered by Alice”

Bob’s speaker model

perturbation

originalvoice

adversarialvoice

craft

utterrecognized

listened

The third person

imperceptibility in SRSs

(target)

(source)

Alice(source speaker)

Page 61: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

quantitative analysis of imperceptibility

Page 62: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

Q: How many people think adversarial and original voices are uttered by the same speaker ?

quantitative analysis of imperceptibility

Page 63: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

Q: How many people think adversarial and original voices are uttered by the same speaker ?

A: Human Study on Amazon MTurk

quantitative analysis of imperceptibility

Page 64: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

Q: How many people think adversarial and original voices are uttered by the same speaker ?

A: Human Study on Amazon MTurk

API attack: 64.9% same

quantitative analysis of imperceptibility

Page 65: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Imperceptibility

Over-the-air attack: 34.0% same

API attack: 64.9% same

Q: How many people think adversarial and original voices are uttered by the same speaker ?

A: Human Study on Amazon MTurk

quantitative analysis of imperceptibility

Page 66: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Take away:1. Black-box and practical adversarial attack against

speaker recognition systems2. Effective to commercial speaker recognition services3. Effective in over-the-air attack4. Imperceptible to human hearing

FAKEBOB Website: https://sites.google.com/view/fakebob/home

FAKEBOB Code:https://github.com/FAKEBOB-adversarial-attack/FAKEBOB

Page 67: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Icon made by Freepik from www.flaticon.com

Icon made by xnimrodx from www.flaticon.com

Icon made by Eucalyp from www.flaticon.com

Icon made by Becris from www.flaticon.com

Page 68: Who is Real Bob? Adversarial Attacks on Speaker Recognition … · 2021. 5. 3. · Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. Guangke Chen, Sen Chen, Lingling

Take away:1. Black-box and practical adversarial attack against

speaker recognition systems2. Effective to commercial speaker recognition services3. Effective in over-the-air attack4. Imperceptible to human hearing

FAKEBOB Website: https://sites.google.com/view/fakebob/home

FAKEBOB Code:https://github.com/FAKEBOB-adversarial-attack/FAKEBOB