PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking

11/16/2022
by   Hanbo Cai, et al.
0

Keyword spotting (KWS) has been widely used in various speech control scenarios. The training of KWS is usually based on deep neural networks and requires a large amount of data. Manufacturers often use third-party data to train KWS. However, deep neural networks are not sufficiently interpretable to manufacturers, and attackers can manipulate third-party training data to plant backdoors during the model training. An effective backdoor attack can force the model to make specified judgments under certain conditions, i.e., triggers. In this paper, we design a backdoor attack scheme based on Pitch Boosting and Sound Masking for KWS, called PBSM. Experimental results demonstrated that PBSM is feasible to achieve an average attack success rate close to 90 victim models when poisoning less than 1

READ FULL TEXT
research
12/20/2022

VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion

Keyword spotting (KWS) based on deep neural networks (DNNs) has achieved...
research
10/07/2020

Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks

Backdoor attack against deep neural networks is currently being profound...
research
07/30/2021

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Deep neural networks represent a powerful option for many real-world app...
research
04/02/2021

RABA: A Robust Avatar Backdoor Attack on Deep Neural Network

With the development of Deep Neural Network (DNN), as well as the demand...
research
07/13/2021

AUC Optimization for Robust Small-footprint Keyword Spotting with Limited Training Data

Deep neural networks provide effective solutions to small-footprint keyw...
research
08/04/2023

N-gram Boosting: Improving Contextual Biasing with Normalized N-gram Targets

Accurate transcription of proper names and technical terms is particular...
research
10/09/2019

BrokenStrokes: On the (in)Security of Wireless Keyboards

Wireless devices resorting to event-triggered communications have been p...

Please sign up or login with your details

Forgot password? Click here to reset