The success of adversarial attacks to speaker recognition is mainly in white-box scenarios. When applying the adversarial voices that are generated by attacking white-box surrogate models to black-box victim models, i.e. \textit{transfer-based} black-box attacks, the transferability of the adversarial voices is not only far from satisfactory, but also lacks interpretable basis. To address these issues, in this paper, we propose a general framework, named spectral transformation attack based on modified discrete cosine transform (STA-MDCT), to improve the transferability of the adversarial voices to a black-box victim model. Specifically, we first apply MDCT to the input voice. Then, we slightly modify the energy of different frequency bands for capturing the salient regions of the adversarial noise in the time-frequency domain that are critical to a successful attack. Unlike existing approaches that operate voices in the time domain, the proposed framework operates voices in the time-frequency domain, which improves the interpretability, transferability, and imperceptibility of the attack. Moreover, it can be implemented with any gradient-based attackers. To utilize the advantage of model ensembling, we not only implement STA-MDCT with a single white-box surrogate model, but also with an ensemble of surrogate models. Finally, we visualize the saliency maps of adversarial voices by the class activation maps (CAM), which offers an interpretable basis to transfer-based attacks in speaker recognition for the first time. Extensive comparison results with five representative attackers show that the CAM visualization clearly explains the effectiveness of STA-MDCT, and the weaknesses of the comparison methods; the proposed method outperforms the comparison methods by a large margin.
翻译:对抗性声音的转移不仅远不能令人满意,而且缺乏解释基础。为了解决这些问题,我们在本文件中提出了一个总体框架,即以修改的离散连线变换(STA-MDCT)为基础的光谱变换攻击,以提高对抗性声音向黑盒受害者模型的可转移性。具体地说,我们首先将MDCT应用到输入声音中。然后,我们略微修改不同频率波段的能量,以捕捉对成功攻击至关重要的时间频域中对抗性声音的突出区域。与在时间域中操作声音的现有方法不同,拟议框架在时间频域内运行声音,提高可解释性、可转移性、和可感知性。此外,我们可以用任何基于梯度的直观声音变换到黑盒受害者模型。我们只能用SBCT攻击者的可变现性声音变现性声音来实施。最后,我们用SBAM的变现方法展示了SBAR的优势,我们只能用SBAR-BR的变换式变换结果,我们只能用SBAR-BS的变式变式变换方法来演示SIM的变换。