Follow
Hadi Abdullah
Hadi Abdullah
Visa Research
No verified email - Homepage
Title
Cited by
Cited by
Year
Practical hidden voice attacks against speech and speaker recognition systems
H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson
NDSS Symposium 2019, 2019
1662019
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1642020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor
2021 IEEE Symposium on Security and Privacy (SP), 2020
1252020
Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems
H Abdullah, MS Rahman, W Garcia, L Blue, K Warren, AS Yadav, ...
2021 IEEE Symposium on Security and Privacy (SP), 2019
1002019
2ma: Verifying voice commands via two microphone authentication
L Blue, H Abdullah, L Vargas, P Traynor
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
502018
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls
B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
26th USENIX Security Symposium (USENIX Security 17), 575-592, 2017
432017
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding
C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018
262018
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction
L Blue, K Warren, H Abdullah, C Gibson, L Vargas, J O'Dell, K Butler, ...
31st USENIX Security Symposium (USENIX Security 22), 2691-2708, 2022
222022
Demystifying limited adversarial transferability in automatic speech recognition systems
H Abdullah, A Karlekar, V Bindschaedler, P Traynor
International Conference on Learning Representations (ICLR), 2021
132021
Beyond Clipping: Equalization based Psychoacoustic Attacks against ASRs
H Abdullah, MS Rahman, C Peeters, C Gibson, W Garcia, ...
Asian Conference on Machine Learning, 672-688, 2021
72021
Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems
H Abdullah, A Karlekar, S Prasad, MS Rahman, L Blue, LA Bauer, ...
arXiv preprint arXiv:2203.05408, 2022
52022
Detecting SS7 redirection attacks with audio-based distance bounding
PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ...
US Patent 11,265,717, 2022
52022
Noise survey in offshore operations
MNA Rahman, H Abdullah
SPE International Conference and Exhibition on Health, Safety, Environment …, 1991
31991
Is Memorization Actually Necessary for Generalization?
H Abdullah, K Wang, B Hoak, Y Wang, SS Arora, Y Cai
2023
Transferable Adversarial Perturbations between Self-Supervised Speech Recognition Models
R Olivier, H Abdullah, B Raj
The Second Workshop on New Frontiers in Adversarial Machine Learning, 2023
2023
Detecting deep-fake audio through vocal tract reconstruction
PG Traynor, K Butler, LE Blue, L Vargas, KS Warren, H Abdullah, ...
US Patent 11,694,694, 2023
2023
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R Olivier, H Abdullah, B Raj
arXiv preprint arXiv:2209.13523, 2022
2022
Explaining, Exploiting, and Defending: Adversarial Machine Learning and Voice Processing Systems
H Abdullah
University of Florida, 2022
2022
Poster: AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
2017
Effects of calcium on Ralstonia solanacearum, pH and anatomical characters of Capsicum annuum
MA Rahman, H Abdullah
MALAYSIAN APPLIED BIOLOGY 26, 29-36, 1997
1997
The system can't perform the operation now. Try again later.
Articles 1–20