Speech recognition attack defense method based on PSO algorithm

A speech recognition and speech recognition model technology, applied in speech recognition, speech analysis, countermeasures against encryption mechanisms, etc., to achieve the effects of avoiding audio distortion, high security and stability, and high privacy

Active Publication Date: 2020-02-07
ZHEJIANG UNIV OF TECH
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the security problem that the speech recognition model in the prior art is vulnerable to adversarial attacks, the present invention provides a speech recognition attack defense method based on the PSO algorithm, which can efficiently generate adversarial audio samples with transcription errors, and through the adversarial Training improves the model's ability to defend against adversarial examples

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Speech recognition attack defense method based on PSO algorithm
  • Speech recognition attack defense method based on PSO algorithm
  • Speech recognition attack defense method based on PSO algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings and examples in the specification. It should be noted that the following examples are intended to facilitate understanding of the present invention, and do not have any limiting effect on it.

[0027] refer to Figure 1-Figure 3(2) , a kind of speech recognition attack defense method based on PSO algorithm comprises the following steps:

[0028] (1) Prepare the original audio data set: collect multiple types of audio in different scenarios and preprocess them, and divide them into pre-training data sets, test data sets and disturbance data sets for generating adversarial samples according to a certain ratio. The process is as follows:

[0029] Step11: Collect multiple types of audio in a variety of scenarios, including the voice of people speaking, the sound of music in real life scenes, where the content of people speaking includes fragments of articles read a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a speech recognition attack defense method based on a PSO algorithm. The method comprises the following steps of (1) preparing an original audio data set, and dividing the original audio data set into a pre-training data set, a test data set and a disturbance data set used for generating an adversarial sample; (2) training a speech recognition model, wherein the speech recognition model is built, related parameters of the model are initialized, the speech recognition model is trained by using the pre-training data set, and the test data set is used to test the recognition accuracy of the model; (3) attacking the speech recognition model, wherein an attack method based on the PSO algorithm is built, a fitness function and related parameters of the PSO algorithm are set, and an optimal adversarial sample generated by the attack method can be recognized by mistake and is not recognized by the human ear; and (4) performing adversarial training on the speech recognition model, wherein the adversarial sample generated in the step (3) is added into the pre-training data set, and the speech recognition model is re-trained, so that the speech recognition model has the capability of defending attack of the adversarial sample and the safety and stability of the model are improved.

Description

technical field [0001] The invention relates to a speech recognition attack defense method based on a PSO algorithm. Background technique [0002] With the rapid development of machine learning in recent years, speech recognition technology has gradually become one of the key technologies in people's lives. By extracting relevant information from the input voice and audio and processing it, the smart device can transcribe the correct text content and even realize communication and interaction with people. With the unremitting efforts of researchers, speech recognition technology has gradually matured, the recognition accuracy has been continuously improved, and the application range has been continuously expanded, which has brought great convenience to people's production and life. However, the latest scientific research shows that the speech recognition model based on deep learning has certain defects and is easily interfered by adversarial examples. Attackers cause speec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L15/06G10L15/20H04L9/00
CPCG10L15/063G10L15/20H04L9/002
Inventor 陈晋音郑喆
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products