Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Adversarial sample attack-resistant speech recognition model training method

A speech recognition model and adversarial sample technology, applied in speech recognition, speech analysis, instruments, etc., can solve problems such as the inability of the human ear to recognize disturbances, and neural network adversarial attacks.

Active Publication Date: 2021-06-11
SHANDONG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] While recent studies have shown that neural networks are vulnerable to adversarial attacks
This problem also exists in the field of speech recognition. The attacker adds a slight disturbance to the audio, which will cause the neural network to input completely different values, but the human ear cannot recognize the slight disturbance.
As the voice confrontation attacks that have appeared in recent years have become more and more aggressive and more and more types, the security issues in the field of voice recognition have become prominent, and it has also laid certain hidden dangers for the large-scale commercialization of voice recognition technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adversarial sample attack-resistant speech recognition model training method
  • Adversarial sample attack-resistant speech recognition model training method
  • Adversarial sample attack-resistant speech recognition model training method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

[0047] like figure 1 As shown, the speech recognition model training method against adversarial sample attack of the present invention comprises the following steps:

[0048] A: Select a data set consisting of N audio files, and record the Chinese character corresponding to the audio file as y;

[0049] In the present invention, the Chinese speech recognition framework and the Chinese speech data set Free ST-Chinese-Mandarin-Corpus are adopted. The Free ST-Chinese-Mandarin-Corpus dataset consists of N audio files. Each audio file is a sentence read by a reader. Each sentence contains about ten Chinese characters. The corresponding audio files Chinese characters are recorded as y.

[0050] B: Sampling the voice files in the data set selected in step A to obtain the collection tensor;

[0051] When preprocessing the voice file, first cut off the invalid part o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an adversarial sample attack-resistant speech recognition model training method. The method comprises the following steps of A, selecting a data set consisting of speech files; B, sampling the speech files to obtain a collection tensor; C, extracting a feature tensor from the acquired tensor; D, inputting the feature tensor, the Chinese characters corresponding to the speech files and the training parameters into a convolutional neural network model, mapping the output tensor into the probability of outputting different Chinese characters at each time step by using a CTC function in combination with an acoustic model and a language model, and then selecting the maximum value of the probability to transcribe the corresponding Chinese character as an actual output value; finally, calculating a deviation value between the target value and the actual output value and recording the deviation value as loss; and E, using a back propagation method to update the weight parameter of the convolutional neural network model, and updating the training parameter input into the convolutional neural network model while updating the weight parameter. The method can reduce the training calculation amount and the training time, and improves the capability of resisting malicious attacks.

Description

technical field [0001] The invention relates to the field of speech recognition, in particular to a speech recognition model training method for resisting adversarial sample attacks. Background technique [0002] With the development of deep learning and neural network research, automatic recognition application scenarios are becoming more and more extensive. In the field of speech, deep learning is reshaping the way we interact with machines, such as the personal assistants that are widely used in smartphones (Apple's Siri, Google's Assistant). These systems recognize and execute user commands by running speech recognition models. In fact, the research on automatic speech recognition predates the advent of computers, and speech synthesis and recognition technology can be traced back to the original vocoder. After the new century, artificial intelligence network research has emerged in the field of speech recognition. Most artificial intelligence networks use multi-layer p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L15/06G10L15/16G10L15/26G10L25/24
CPCG10L15/063G10L15/16G10L25/24
Inventor 徐东亮翟文升刘志伟
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products