Search Results for author: Hadi Abdullah

Found 6 papers, 1 papers with code

Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models

1 code implementation17 Sep 2022 Raphael Olivier, Hadi Abdullah, Bhiksha Raj

To exploit ASR models in real-world, black-box settings, an adversary can leverage the transferability property, i. e. that an adversarial sample produced for a proxy ASR can also fool a different remote ASR.

Adversarial Attack Automatic Speech Recognition +3

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

no code implementations11 Oct 2019 Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor

Automatic speech recognition and voice identification systems are being deployed in a wide array of applications, from providing control mechanisms to devices lacking traditional interfaces, to the automatic transcription of conversations and authentication of users.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

no code implementations18 Mar 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (blackbox) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems.

Audio Signal Processing BIG-bench Machine Learning +1

Cannot find the paper you are looking for? You can Submit a new open access paper.