Alert button
Picture for Patrick Traynor

Patrick Traynor

Alert button

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Bookmark button
Alert button
Mar 10, 2022
Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor

Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Bookmark button
Alert button
Oct 25, 2021
Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor

Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Bookmark button
Alert button
Jul 21, 2020
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

Figure 1 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Bookmark button
Alert button
Jul 13, 2020
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

Figure 1 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Add code
Bookmark button
Alert button
Oct 11, 2019
Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor

Figure 1 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 2 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 3 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 4 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Viaarxiv icon

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Add code
Bookmark button
Alert button
Mar 18, 2019
Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

Figure 1 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 2 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 3 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 4 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Viaarxiv icon