Version 13 (modified by 4 years ago) ( diff ) | ,
---|
Adversarial Machine Learning Against Voice Assistant Systems
Project Objective
This project aims to study the security of voice assistant systems under adversarial machine learning. Adversarial learning algorithms can generate adversarial audio samples to serve as the input of voice assistant systems, so as to fool the machine learning models in the system. In this project, we will focus on the white-box attack in the digital domain by generating adversarial samples using adversarial machine learning algorithms to attack a speaker recognition system based on X-Vector. If time allows, we will further enhance the robustness of the attack by simulating room impulse response and conduct over-the-air attack.
— Weekly plan
Tutorials
*Week 1
- Generating Adversarial Samples in Keras: https://medium.com/mindboard/generating-adversarial-samples-in-keras-tutorial-f881ac836246
- Tensorflow - Adversarial Example using FGSM: https://www.tensorflow.org/tutorials/generative/adversarial_fgsm
- Generating Adversarial Samples in Keras: https://medium.com/analytics-vidhya/implementing-adversarial-attacks-and-defenses-in-keras-tensorflow-2-0-cab6120c5715
*Week 2
- Python tutorial: https://www.w3schools.com/python/
- How to run Python code: https://www.knowledgehut.com/blog/programming/run-python-scripts
- Jupyter notebook tutorial: https://www.dataquest.io/blog/jupyter-notebook-tutorial/
- Video tutorial (Optional): Neural Networks and Deep Learning: https://www.coursera.org/learn/neural-networks-deep-learning
Reading Material
- Hidden voice commands
- CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
- Audio Adversarial Examples Targeted Attacks on Speech-to-Text
- Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
- Practical Adversarial Attacks Against Speaker Recognition Systems
- X-Vectors: Robust DNN Embeddings For Speaker Recognition
Week 1 Activities
- Get ORBIT/COSMOS account and familiarize oneself with the testbed procedures
Week 2 Activities
- Get familiar with Python language.
— Install Python environment
— Use Jupyter Notebook to run Python code samples
- Learn the concept of deep learning and deep neural networks.
— Slides: Neural Network Basics of Energy-Efficient Machine Learning System
— Video tutorial (Optional): Neural Networks and Deep Learning by Andrew Ng (Recommended chapters: Week 2: Logistic Regression as a Neural Network, Week 3: Shallow Neural Network)
Attachments (12)
- Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition.pdf (368.2 KB ) - added by 4 years ago.
- Hidden voice commands.pdf (743.3 KB ) - added by 4 years ago.
- Audio Adversarial Examples Targeted Attacks on Speech-to-Text.pdf (587.5 KB ) - added by 4 years ago.
- Commandersong A systematic approach for practical adversarial voice recognition.pdf (824.7 KB ) - added by 4 years ago.
- Practical Adversarial Attacks Against Speaker Recognition Systems.pdf (1.9 MB ) - added by 4 years ago.
- hidden voice command code readme.docx (15.8 KB ) - added by 4 years ago.
- Weekly plan for adversarial machine learning against voice assistant systems.docx (7.5 KB ) - added by 4 years ago.
- lec5_neural network basic.pdf (2.0 MB ) - added by 4 years ago.
- X-VECTORS- ROBUST DNN EMBEDDINGS FOR SPEAKER RECOGNITION.pdf (189.6 KB ) - added by 4 years ago.
- Phoneme Recognition Using Time-Delay Neural Networks .pdf (1.2 MB ) - added by 4 years ago.
- Weekly plan for adversarial machine learning against voice assistant systems.2.docx (13.0 KB ) - added by 4 years ago.
- Probabilistic Linear Discriminant Analysis for Inferences About Identity.pdf (605.3 KB ) - added by 4 years ago.