Affiliation:
1. Samsung AI Center, Cambridge
2. University of Cambridge
3. Samsung AI Center, Cambridge and University of Oxford
Abstract
Deep neural networks (DNNs) continue to demonstrate superior generalization performance in an increasing range of applications, including speech recognition and image understanding. Recent innovations in compression algorithms, design of efficient architectures and hardware accelerators have prompted a rapid growth in deploying DNNs on mobile and IoT devices to redefine user experiences. Relying on the superior inference quality of DNNs, various voice-enabled devices have started to pervade our everyday lives and are increasingly used for, e.g., opening and closing doors, starting or stopping washing machines, ordering products online, and authenticating monetary transactions. As the popularity of these voice-enabled services increases, so does their risk of being attacked. Recently, DNNs have been shown to be extremely brittle under adversarial attacks and people with malicious intentions can potentially exploit this vulnerability to compromise DNN-based voice-enabled systems. Although some existing work already highlights the vulnerability of audio models, very little is known of the behaviour of compressed on-device audio models under adversarial attacks. This paper bridges this gap by investigating thoroughly the vulnerabilities of compressed audio DNNs and makes a stride towards making compressed models robust. In particular, we propose a stochastic compression technique that generates compressed models with greater robustness to adversarial attacks. We present an extensive set of evaluations on adversarial vulnerability and robustness of DNNs in two diverse audio recognition tasks, while considering two popular attack algorithms: FGSM and PGD. We found that error rates of conventionally trained audio DNNs under attack can be as high as 100%. Under both white- and black-box attacks, our proposed approach is found to decrease the error rate of DNNs under attack by a large margin.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference75 articles.
1. Deep learning
2. I. Goodfellow Y. Bengio and A. Courville Deep learning. MIT press Cambridge 2016 vol. 1. I. Goodfellow Y. Bengio and A. Courville Deep learning. MIT press Cambridge 2016 vol. 1.
3. https://developer.amazon.com/en-US/alexa/alexa-skills-kit [Retrieved: May 13 2020]. https://developer.amazon.com/en-US/alexa/alexa-skills-kit [Retrieved: May 13 2020].
4. https://biztechmagazine.com/article/2018/11/voiceprint-security-game-changer-banks-and-credit-unions-all-sizes [Retrived: May 13 2020]. https://biztechmagazine.com/article/2018/11/voiceprint-security-game-changer-banks-and-credit-unions-all-sizes [Retrived: May 13 2020].
5. https://www.apple.com/uk/ios/siri/ [Retrieved: May 13 2020]. https://www.apple.com/uk/ios/siri/ [Retrieved: May 13 2020].
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Keamanan Data Internet of Things dalam Perspektif Pseudosains Mario Bunge;Jurnal Filsafat Indonesia;2024-06-30
2. TXAI-ADV: Trustworthy XAI for Defending AI Models against Adversarial Attacks in Realistic CIoT;Electronics;2024-05-03
3. AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks;ACM Transactions on Privacy and Security;2024-03-14
4. Echo;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2023-09-27
5. VoiceCloak;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2023-06-12