Skip to main navigation Skip to search Skip to main content

DualPure: An Efficient Adversarial Purification Method for Speech Command Recognition

  • Hao Tan
  • , Xiaochen Liu
  • , Huan Zhang
  • , Junjian Zhang
  • , Yaguan Qian
  • , Zhaoquan Gu*
  • *Corresponding author for this work
  • Harbin Institute of Technology Shenzhen
  • Peng Cheng Laboratory
  • Guangzhou University
  • Zhejiang University of Science and Technology

Research output: Contribution to journalConference articlepeer-review

Abstract

Adversarial examples pose a security threat to Autopilot's speech command recognition module, which attracted widespread attention from researchers. Previous works purify the malicious adversarial perturbations through pre-processing data from the time and frequency domain information. However, these methods either have a weak purification capacity or require a significant purification cost. To tackle these problems, we propose a real-time and efficient purification-based defense method DualPure, which combines the two defense aspects in the time and frequency domain for co-purification. Specifically, we first disrupt the potential malicious perturbation in the sample at the waveform level and then apply an unconditional diffusion model to purify the feature at the frequency level. Numerous experiments show that the proposed method can effectively purify and achieve good adversarial robustness in white-box attacks (+ ∼ 6.3%) and black-box attacks (+ ∼ 1.08%).

Original languageEnglish
Pages (from-to)1280-1284
Number of pages5
JournalProceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH
DOIs
StatePublished - 2024
Externally publishedYes
Event25th Interspeech Conferece 2024 - Kos Island, Greece
Duration: 1 Sep 20245 Sep 2024

Keywords

  • adversarial example
  • adversarial purification
  • diffusion model
  • speech command recognition

Fingerprint

Dive into the research topics of 'DualPure: An Efficient Adversarial Purification Method for Speech Command Recognition'. Together they form a unique fingerprint.

Cite this