attack 2026

Over-the-air White-box Attack on the Wav2Vec Speech Recognition Neural Network

Protopopov Alexey

0 citations

α

Published on arXiv

2603.16972

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

Develops approaches for making over-the-air adversarial attacks on Wav2Vec less detectable to human hearing

Carlini attack

Novel technique introduced


Automatic speech recognition systems based on neural networks are vulnerable to adversarial attacks that alter transcriptions in a malicious way. Recent works in this field have focused on making attacks work in over-the-air scenarios, however such attacks are typically detectable by human hearing, limiting their potential applications. In the present work we explore different approaches of making over-the-air attacks less detectable, as well as the impact these approaches have on the attacks' effectiveness.


Key Contributions

  • Explores methods to reduce human detectability of over-the-air adversarial audio attacks
  • Evaluates trade-offs between imperceptibility and attack effectiveness in physical speech recognition attacks

🛡️ Threat Analysis

Input Manipulation Attack

Adversarial perturbation attack on speech recognition neural networks at inference time, exploring optimization approaches to reduce human detectability while maintaining attack effectiveness in physical over-the-air scenarios.


Details

Domains
audio
Model Types
transformer
Threat Tags
white_boxinference_timephysicaltargeted
Applications
automatic speech recognition