A Speech Recognition Attack Defense Method Based on PSO Algorithm

A technology of speech recognition and speech recognition model, applied in speech recognition, speech analysis, countermeasures against encryption mechanisms, etc., to achieve the effects of avoiding distortion, high security and stability, and high privacy

Active Publication Date: 2021-12-07
ZHEJIANG UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the security problem that the speech recognition model in the prior art is vulnerable to adversarial attacks, the present invention provides a speech recognition attack defense method based on the PSO algorithm, which can efficiently generate adversarial audio samples with transcription errors, and through the adversarial Training improves the model's ability to defend against adversarial examples

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Speech Recognition Attack Defense Method Based on PSO Algorithm
  • A Speech Recognition Attack Defense Method Based on PSO Algorithm
  • A Speech Recognition Attack Defense Method Based on PSO Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings and examples in the specification. It should be noted that the following examples are intended to facilitate understanding of the present invention, and do not have any limiting effect on it.

[0027] refer to Figure 1-Figure 3(2) , a kind of speech recognition attack defense method based on PSO algorithm comprises the following steps:

[0028] (1) Prepare the original audio data set: collect multiple types of audio in different scenarios and preprocess them, and divide them into pre-training data sets, test data sets and disturbance data sets for generating adversarial samples according to a certain ratio. The process is as follows:

[0029] Step11: Collect multiple types of audio in a variety of scenarios, including the voice of people speaking, the sound of music in real life scenes, where the content of people speaking includes fragments of articles read a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A speech recognition attack defense method based on the PSO algorithm, comprising: (1) preparing an original audio data set, which is divided into a pre-training data set, a test data set and a disturbance data set for generating adversarial samples; (2) training a speech recognition model : Build a speech recognition model and initialize the relevant parameters of the model, use the pre-training data set to train the speech recognition model, and use the test data set to test the recognition accuracy of the model; (3) attack the speech recognition model: build an attack based on the PSO algorithm method, set the fitness function and the relevant parameters of the PSO algorithm, and the optimal adversarial samples generated by this attack method can be misidentified and not recognized by the human ear; (4) adversarial training speech recognition model: the generated in step (3) The adversarial samples are added to the pre-training data set, and the speech recognition model is retrained, so that the speech recognition model has the ability to defend against adversarial sample attacks and improve the security and stability of the model.

Description

technical field [0001] The invention relates to a speech recognition attack defense method based on a PSO algorithm. Background technique [0002] With the rapid development of machine learning in recent years, speech recognition technology has gradually become one of the key technologies in people's lives. By extracting relevant information from the input voice and audio and processing it, the smart device can transcribe the correct text content and even realize communication and interaction with people. With the unremitting efforts of researchers, speech recognition technology has gradually matured, the recognition accuracy has been continuously improved, and the application range has been continuously expanded, which has brought great convenience to people's production and life. However, the latest scientific research shows that the speech recognition model based on deep learning has certain defects and is easily interfered by adversarial examples. Attackers cause speec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L15/06G10L15/20H04L9/00
CPCG10L15/063G10L15/20H04L9/002
Inventor 陈晋音郑喆
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products