Skip to content

sveapp/Audio-denfense

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A Defensive Approach for Query-Based Audio Adversarial Attacks

We introduce a state detection defense for query-based attacks to detect the process of generating adversarial examples(AEs) in ASR systems. We analyze the group behavior during the generation of the adversarial samples and detect the attacks based on the association before and after the query. During the query process, the samples inevitably leave digital audio fingerprint information, and we extract the fingerprints of the samples and do similarity matching with the previous queries. Cut off the user's right to continue accessing the model when the likelihood of an attack occurring becomes high. We experimentally validated our scheme for an upwards of 80% detection success rate for existing query-based attacks, and some of them achieve 98%.

Pre-requisites

NVIDIA GPU + CUDA cuDNN + Cupy

Data-sets

Music-sets:https://drive.google.com/file/d/1wPVK9S8TyB0aaXqXFKEebYKuKshmBvDc/view?usp=sharing.
Mini-LibriSpeech :www.openslr.org/resources/31/train-clean-5.tar.gz

Obtaining source code

CS(CommanderSong): We contacted the author of CommanderSong and got the source code, and we do not release the source code of CommanderSong according to the author's request. So you can try to get in touch with the author and get the source code.
DW(Devil's Whisper): You can get the DW's source code from https://github.com/RiskySignal/Devil-Whisper-Attack
IRTA("Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition"):You can get the IRTA's source code from https://github.com/cleverhans-lab/cleverhans/tree/master/cleverhans_v3.1.0/examples/adversarial_asr
DS("Audio Adversarial Examples: Targeted Attacks on Speech-to-Text"):You can get the DS's source code from https://github.com/carlini/audio_adversarial_examples

Implementation details

Our defense is a detection of the process.To reproduce the process of the attack, we reserve intermediate samples from each iteration of the attack algorithm, which is comparable to querying the model once for each iteration. Then, all the samples are fed to our detection model.In our commit code we provide a test example.

About

A Defensive Approach for Query-Based Audio Adversarial Attacks

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages