Identity and content authentication for phone calls PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
206 2020 Practical hidden voice attacks against speech and speaker recognition systems H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
NDSS Symposium 2019, 2019
198 2019 SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor
2021 IEEE Symposium on Security and Privacy (SP), 2020
173 2020 Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems H Abdullah, MS Rahman, W Garcia, L Blue, K Warren, AS Yadav, ...
2021 IEEE Symposium on Security and Privacy (SP), 2019
131 2019 2ma: Verifying voice commands via two microphone authentication L Blue, H Abdullah, L Vargas, P Traynor
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
56 2018 Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction L Blue, K Warren, H Abdullah, C Gibson, L Vargas, J O'Dell, K Butler, ...
31st USENIX Security Symposium (USENIX Security 22), 2691-2708, 2022
55 2022 {AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
26th USENIX Security Symposium (USENIX Security 17), 575-592, 2017
50 2017 Sonar: Detecting SS7 redirection attacks with audio-based distance bounding C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018
32 2018 Demystifying limited adversarial transferability in automatic speech recognition systems H Abdullah, A Karlekar, V Bindschaedler, P Traynor
International conference on learning representations (ICLR), 2021
18 2021 Beyond Clipping: Equalization based Psychoacoustic Attacks against ASRs H Abdullah, MS Rahman, C Peeters, C Gibson, W Garcia, ...
Asian Conference on Machine Learning, 672-688, 2021
10 2021 Detecting SS7 redirection attacks with audio-based distance bounding PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ...
US Patent 11,265,717, 2022
8 2022 Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems H Abdullah, A Karlekar, S Prasad, MS Rahman, L Blue, LA Bauer, ...
arXiv preprint arXiv:2203.05408, 2022
6 2022 Is Memorization Actually Necessary for Generalization? H Abdullah, K Wang, B Hoak, Y Wang, SS Arora, Y Cai
3 2023 Noise survey in offshore operations MNA Rahman, H Abdullah
SPE International Conference and Exhibition on Health, Safety, Environment …, 1991
3 1991 Transferable Adversarial Perturbations between Self-Supervised Speech Recognition Models R Olivier, H Abdullah, B Raj
The Second Workshop on New Frontiers in Adversarial Machine Learning, 2023
1 2023 Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models R Olivier, H Abdullah, B Raj
arXiv preprint arXiv:2209.13523, 2022
1 2022 Towards Efficient and Accurate Identification of Memorization in Deep Models H Abdullah
2024 Detecting deep-fake audio through vocal tract reconstruction PG Traynor, K Butler, LE Blue, L Vargas, KS Warren, H Abdullah, ...
US Patent 11,694,694, 2023
2023 Explaining, Exploiting, and Defending: Adversarial Machine Learning and Voice Processing Systems H Abdullah
University of Florida, 2022
2022 Poster: AuthentiCall: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
2017