June 29, 2023, 1:10 a.m. | Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu

cs.CR updates on arXiv.org arxiv.org

Automatic Speaker Recognition Systems (SRSs) have been widely used in voice
applications for personal identification and access control. A typical SRS
consists of three stages, i.e., training, enrollment, and recognition. Previous
work has revealed that SRSs can be bypassed by backdoor attacks at the training
stage or by adversarial example attacks at the recognition stage. In this
paper, we propose TUNER, a new type of backdoor attack against the enrollment
stage of SRS via adversarial ultrasound modulation, which is inaudible, …

access access control adversarial applications attacks automatic backdoor backdoor attacks control identification personal recognition stage systems training ultrasound voice work

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Director, Risk Compliance & Trust (GRC)

@ Snyk | Boston, London

Working Student (f/m/d) - Security Architecture Project Management & Communications

@ SAP | Walldorf, DE, 69190

Werkstudent Cyber Security (w/m/x)

@ BMW Group | München, DE