BEGIN:VCALENDAR VERSION:2.0 PRODID:-//128.220.36.25//NONSGML kigkonsult.se iCalcreator 2.26.9// CALSCALE:GREGORIAN METHOD:PUBLISH X-FROM-URL:https://www.clsp.jhu.edu X-WR-TIMEZONE:America/New_York BEGIN:VTIMEZONE TZID:America/New_York X-LIC-LOCATION:America/New_York BEGIN:STANDARD DTSTART:20231105T020000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 RDATE:20241103T020000 TZNAME:EST END:STANDARD BEGIN:DAYLIGHT DTSTART:20240310T020000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 RDATE:20250309T020000 TZNAME:EDT END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT UID:ai1ec-21494@www.clsp.jhu.edu DTSTAMP:20240329T151304Z CATEGORIES;LANGUAGE=en-US:Student Seminars CONTACT: DESCRIPTION:
Abstract
\nAdversarial atta cks deceive neural network systems by adding carefully crafted perturbatio ns to benign signals. Being almost imperceptible to humans\, these attacks pose a severe security threat to the state-of-the-art speech and speaker recognition systems\, making it vital to propose countermeasures against t hem. In this talk\, we focus on 1) classification of a given adversarial a ttack into attack algorithm type\, threat model type\, and signal-to-adver sarial-noise ratios\, 2) developing a novel speech denoising solution to f urther improve the classification performance.
\nO ur proposed approach uses an x-vector network as a signature extractor to get embeddings\, which we call signatures. These signatures contain inform ation about the attack and can help classify different attack algorithms\, threat models\, and signal-to-adversarial-noise ratios. We demonstrate th e transferability of such signatures to other tasks. In particular\, a sig nature extractor trained to classify attacks against speaker identificatio n can also be used to classify attacks against speaker verification and sp eech recognition. We also show that signatures can be used to detect unkno wn attacks i.e. attacks not included during training. Lastly\, we propose to improve the signature extractor by making the job of the signature ext ractor easier by removing the clean signal from the adversarial example (w hich consists of clean signal+perturbation). We train our signature extrac tor using adversarial perturbation. At inference time\, we use a time-doma in denoiser to obtain adversarial perturbation from adversarial examples. Using our improved approach\, we show that common attacks in the literatur e (Fast Gradient Sign Method (FGSM)\, Projected Gradient Descent (PGD)\, C arlini-Wagner (CW) ) can be classified with accuracy as high as 96%. We al so detect unknown attacks with an equal error rate (EER) of about 9%\, whi ch is very promising.
DTSTART;TZID=America/New_York:20220304T120000 DTEND;TZID=America/New_York:20220304T131500 LOCATION:Ames Hall 234 @ 3400 N. Charles Street\, Baltimore\, MD 21218 SEQUENCE:0 SUMMARY:Student Seminar – Sonal Joshi “Classify and Detect Adversarial Atta cks Against Speaker and Speech Recognition Systems” URL:https://www.clsp.jhu.edu/events/student-seminar-sonal-joshi/ X-COST-TYPE:free X-TAGS;LANGUAGE=en-US:2022\,Joshi\,March END:VEVENT BEGIN:VEVENT UID:ai1ec-23320@www.clsp.jhu.edu DTSTAMP:20240329T151304Z CATEGORIES;LANGUAGE=en-US:Seminars CONTACT: DESCRIPTION:Abstract
\nSpeech communications repr esents a core domain for education\, team problem solving\, social engagem ent\, and business interactions. The ability for Speech Technology to extr act layers of knowledge and assess engagement content represents the next generation of advanced speech solutions. Today\, the emergence of BIG DATA \, Machine Learning\, as well as voice enabled speech systems have require d the need for effective voice capture and automatic speech/speaker recogn ition. The ability to employ speech and language technology to assess huma n-to-human interactions offers new research paradigms having profound impa ct on assessing human interaction. In this talk\, we will focus on big dat a naturalistic audio processing relating to (i) child learning spaces\, an d (ii) the NASA APOLLO lunar missions. ML based technology advancements in clude automatic audio diarization\, speech recognition\, and speaker recog nition. Child-Teacher based assessment of conversational interactions are explored\, including keyword and “WH-word” (e.g.\, who\, what\, etc.). Dia rization processing solutions are applied to both classroom/learning space child speech\, as well as massive APOLLO data. CRSS-UTDallas is expanding our original Apollo-11 corpus\, resulting in a massive multi-track audio processing challenge to make available 150\,000hrs of Apollo mission data to be shared with science communities: (i) speech/language technology\, (i i) STEM/science and team-based researchers\, and (iii) education/historica l/archiving specialists. Our goals here are to provide resources which all ow to better understand how people work/learn collaboratively together. Fo r Apollo\, to accomplish one of mankind’s greatest scientific/technologica l challenges in the last century.
\nBiography
\nJohn H.L. Hansen\, received Ph.D. & M.S. degrees from Georgia Institute of Technology\, and B.S.E.E. from Rutgers Univ. He joined Univ. of Texas at Dallas (UTDallas) in 2005\, where he currently serves as Associate Dean for Research\, Prof. of ECE\, Distinguished Univ. Chair in Telecom. Engin eering\, and directs Center for Robust Speech Systems (CRSS). He is an ISC A Fellow\, IEEE Fellow\, and has served as Member and TC-Chair of IEEE Sig nal Proc. Society\, Speech & Language Proc. Tech. Comm.(SLTC)\, and Techni cal Advisor to U.S. Delegate for NATO (IST/TG-01). He served as ISCA Presi dent (2017-21)\, continues to serve on ISCA Board (2015-23) as Treasurer\, has supervised 99 PhD/MS thesis candidates (EE\,CE\,BME\,TE\,CS\,Ling.\,C og.Sci.\,Spch.Sci.\,Hear.Sci)\, was recipient of 2020 UT-Dallas Provost’s Award for Grad. PhD Research Mentoring\; author/co-author of 865 journal/c onference papers including 14 textbooks in the field of speech/language/he aring processing & technology including coauthor of textbook Discrete-Time Processing of Speech Signals\, (IEEE Press\, 2000)\, and lead author of t he report “The Impact of Speech Under ‘Stress’ on Military Speech Technolo gy\,” (NATO RTO-TR-10\, 2000). He served as Organizer\, Chair/Co-Chair/Tec h.Chair for ISCA INTERSPEECH-2022\, IEEE ICASSP-2010\, IEEE SLT-2014\, ISC A INTERSPEECH-2002\, and Tech. Chair for IEEE ICASSP-2024. He received the 2022 IEEE Signal Processing Society Leo Beranek MERITORIOUS SERVICE Award .
\nDTSTART;TZID=America/New_York:20230303T120000 DTEND;TZID=America/New_York:20230303T131500 LOCATION:Hackerman Hall B17 @ 3400 N. Charles Street\, Baltimore\, MD 21218 SEQUENCE:0 SUMMARY:John Hansen (University of Texas at Dallas) “Challenges and Advance ments in Speaker Diarization & Recognition for Naturalistic Data Streams” URL:https://www.clsp.jhu.edu/events/john-hansen-university-of-texas-at-dall as/ X-COST-TYPE:free X-TAGS;LANGUAGE=en-US:2023\,Hansen\,March END:VEVENT BEGIN:VEVENT UID:ai1ec-24511@www.clsp.jhu.edu DTSTAMP:20240329T151304Z CATEGORIES;LANGUAGE=en-US:Student Seminars CONTACT: DESCRIPTION: DTSTART;TZID=America/New_York:20240412T120000 DTEND;TZID=America/New_York:20240412T131500 LOCATION:Hackerman Hall B17 @ 3400 N. Charles Street\, Baltimore\, MD 21218 SEQUENCE:0 SUMMARY:Sonal Joshi (JHU) URL:https://www.clsp.jhu.edu/events/sonal-joshi-jhu/ X-COST-TYPE:free X-TAGS;LANGUAGE=en-US:2024\,April\,Joshi END:VEVENT END:VCALENDAR