检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:孙知信[1,2,3] 赵杰[1,2,3] 王恩良 刘晨磊 范连成 刘畅 SUN Zhixin;ZHAO Jie;WANG Enliang;LIU Chenlei;FAN Liancheng;LIU Chang(Post Big Data Technology and Application Engineering Research Center of Jiangsu Province,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;Post Industry Technology Research and Development Center of the State Posts Bureau(Internet of Things Technology),Nanjing University of Posts and Telecommunications,Nanjing 210003,China;Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;Anhui Nanling County Post Development Center,Wuhu 241399,China)
机构地区:[1]南京邮电大学江苏省邮政大数据技术与应用工程研究中心,江苏南京210003 [2]南京邮电大学国家邮政局邮政行业技术研发中心(物联网技术),江苏南京210003 [3]南京邮电大学宽带无线通信与传感网技术教育部重点实验室,江苏南京210003 [4]安徽南陵县邮政业发展中心,安徽芜湖241399
出 处:《南京邮电大学学报(自然科学版)》2024年第4期17-29,共13页Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基 金:国家自然科学基金(61972208,62272239)资助项目。
摘 要:文中概括了说话人音频攻击与对抗技术的最新进展。由于说话人音频攻击已经成为语音应用安全的严重威胁,以WaveNet、Transformer和GAN三种模型在音频攻击技术中的应用作为节点,分别介绍以其为基础的音频攻击技术。音频对抗技术则以涵盖的攻击技术分为3类,分别是基础音频攻击、重放攻击和深度伪造攻击。系统地阐述了音频攻击与对抗技术的最新研究成果,并分析比较了各算法在不同条件下的优劣,同时还介绍了音频技术常用的数据集。最后结合该领域目前的研究现状,提出了说话人音频攻防对抗技术研究中亟待关注与研究的问题。This study reviews recent advances in speaker audio attack and defense technologies.As speaker audio attacks have become serious threats to the security of voice applications,we focus on speaker audio attacks that target applications based on the three audio models,WaveNet,Transformer and GAN,and analyze the audio attack technologies based on them.We divide the audio defense technologies into three categories based on the attacks target:basic audio attacks,replay attacks and deep forgery attacks.We systematically expound the latest studies on speaker audio attack and defense technologies,analyze and compare the advantages and disadvantages of each algorithm under different conditions,and introduce the commonly used data sets of audio technologies.Finally,we provide certain issues that need urgent attention and research for speaker audio attack and defense technologies.
关 键 词:说话人音频 音频伪造 音频鉴伪 音频数据集 深度学习
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.147