Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
Presented at the
1st Deep Learning and Security Workshop
May 24, 2018
at the 2018 IEEE Symposium on Security & Privacy
San Francisco, CA
http://www.ieee-security.org/TC/SP2018/
https://www.ieee-security.org/TC/SPW2018/DLS/
ABSTRACT
We construct targeted audio adversarial examples on automatic speech recognition. Given any audio waveform, we can produce another that is over 99.9% similar, but transcribes as any phrase we choose (recognizing up to 50 characters per second of audio). We apply our white-box iterative optimization-based attack to Mozilla’s implementation DeepSpeech end-to-end, and show it has a 100% success rate. The feasibility of this attack introduce a new domain to study adversarial examples.
Видео Audio Adversarial Examples: Targeted Attacks on Speech-to-Text канала IEEE Symposium on Security and Privacy
Nicholas Carlini
Presented at the
1st Deep Learning and Security Workshop
May 24, 2018
at the 2018 IEEE Symposium on Security & Privacy
San Francisco, CA
http://www.ieee-security.org/TC/SP2018/
https://www.ieee-security.org/TC/SPW2018/DLS/
ABSTRACT
We construct targeted audio adversarial examples on automatic speech recognition. Given any audio waveform, we can produce another that is over 99.9% similar, but transcribes as any phrase we choose (recognizing up to 50 characters per second of audio). We apply our white-box iterative optimization-based attack to Mozilla’s implementation DeepSpeech end-to-end, and show it has a 100% success rate. The feasibility of this attack introduce a new domain to study adversarial examples.
Видео Audio Adversarial Examples: Targeted Attacks on Speech-to-Text канала IEEE Symposium on Security and Privacy
Показать
Комментарии отсутствуют
Информация о видео
25 мая 2018 г. 10:35:38
00:24:30
Другие видео канала
Defense Against the Dark ArtsEnd-to-End Adversarial Text-to-Speech (Paper Explained)Targeted Attacks Illustrated - Tomi TuominenDEF CON 24 - Automated E2E Spear Phishing on TwitterIntroduction to Deep Learning, Keras, and TensorFlowAdversarial Attacks on Neural Networks - Bug or Feature?Artificial Intelligence: a Silver Bullet in Cyber Security? CPX 360 KeynoteIan Goodfellow: Generative Adversarial Networks (NIPS 2016 tutorial)Geoffrey Hinton: Using Fast Weights to Store Temporary MemoriesACM CCS 2017 - DeepLog: Anomaly Detection and Diagnosis from System Logs [...] - Min DuYoshua Bengio Extra Footage 1: Brainstorm with students 🔴Top Interview Tips: Common Questions, Body Language & MoreDistillation as a Defense to Adversarial Perturbations against Deep Neural NetworksSecurity and Privacy of Machine LearningEric J. Ma - An Attempt At Demystifying Bayesian Deep LearningDefeating Machine Learning: What Your Security Vendor Is Not Telling YouTutorial on Generative adversarial networks - Domain Adversarial LearningDEF CON 24 - Attacking Network Infrastructure to Generate a 4 Tbs DDoS for 5$How will AI impact the future of cyber crime? - Dave Palmer, DarktraceR tutorial: What is text mining?