Hadi Abdullah

According to our database1, Hadi Abdullah authored at least 12 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models.
CoRR, 2022

Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022

Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Beyond L<sub>p</sub> Clipping: Equalization based Psychoacoustic Attacks against ASRs.
Proceedings of the Asian Conference on Machine Learning, 2021

2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
CoRR, 2019

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2MA: Verifying Voice Commands via Two Microphone Authentication.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Proceedings of the 26th USENIX Security Symposium, 2017


  Loading...