March 1, 2024, 5:11 a.m. | Sonal Joshi, Thomas Thebaud, Jes\'us Villalba, Najim Dehak

cs.CR updates on arXiv.org arxiv.org

arXiv:2402.19355v1 Announce Type: cross
Abstract: Adversarial examples have proven to threaten speaker identification systems, and several countermeasures against them have been proposed. In this paper, we propose a method to detect the presence of adversarial examples, i.e., a binary classifier distinguishing between benign and adversarial examples. We build upon and extend previous work on attack type classification by exploring new architectures. Additionally, we introduce a method for identifying the victim model on which the adversarial attack is carried out. To …

adversarial arxiv attack binary classification countermeasures cs.cr cs.lg cs.sd detect detection eess.as examples identification presence speaker systems techniques threaten victim

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom