Nov. 17, 2022, 2:20 a.m. | Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji

cs.CR updates on arXiv.org arxiv.org

Keyword spotting (KWS) has been widely used in various speech control
scenarios. The training of KWS is usually based on deep neural networks and
requires a large amount of data. Manufacturers often use third-party data to
train KWS. However, deep neural networks are not sufficiently interpretable to
manufacturers, and attackers can manipulate third-party training data to plant
backdoors during the model training. An effective backdoor attack can force the
model to make specified judgments under certain conditions, i.e., triggers. In …

attack backdoor masking sound

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Architect - Hardware

@ Intel | IND - Bengaluru

Elastic Consultant

@ Elastic | Spain

OT Cybersecurity Specialist

@ Emerson | Abu Dhabi, United Arab Emirates

Security Operations Program Manager

@ Kaseya | Miami, Florida, United States

Senior Security Operations Engineer

@ Revinate | Vancouver