Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …
mechanisms that can help protect data intensifies. The contemporary approach to giving …
Usability evaluation of artificial intelligence-based voice assistants: The case of Amazon Alexa
Currently, the use of voice-assistants has been on the rise, but a user-centric usability
evaluation of these devices is a must for ensuring their success. System Usability Scale …
evaluation of these devices is a must for ensuring their success. System Usability Scale …
Analyzing the adoption and diffusion of voice-enabled smart-home systems: empirical evidence from Thailand
The market for voice assistants (VAs) and other allied voice-based smart-home products is
gradually emerging. The initial growth has been slower than expected; therefore, an in …
gradually emerging. The initial growth has been slower than expected; therefore, an in …
An integrated TAM/ISS model based PLS-SEM approach for evaluating the continuous usage of voice enabled IoT systems
Abstract The Voice Assistant (VA) market is emerging rapidly. Considering the unique
features of voice technology, primarily with respect to its ability to provide a total hands-free …
features of voice technology, primarily with respect to its ability to provide a total hands-free …
SoK: On the offensive potential of AI
Our society increasingly benefits from Artificial Intelligence (AI). Unfortunately, more and
more evidence shows that AI is also used for offensive purposes. Prior works have revealed …
more evidence shows that AI is also used for offensive purposes. Prior works have revealed …
Mobile spyware identification and categorization: A systematic review
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …
have become indispensable companions, seamlessly integrating into our daily routines …
Characterizing sensor leaks in android apps
While extremely valuable to achieve advanced functions, mobile phone sensors can be
abused by attackers to implement malicious activities in Android apps, as experimentally …
abused by attackers to implement malicious activities in Android apps, as experimentally …
Towards Securing Mobile Communication from Spyware Attacks with Artificial Intelligence Techniques
Nowadays security in mobile phones is a crucial issue, attacker attacks through messages
and emails and when the user opens these malicious links, they can easily insert the …
and emails and when the user opens these malicious links, they can easily insert the …
Robust sensor fusion algorithms against voice command attacks in autonomous vehicles
With recent advances in autonomous driving, voice control systems have become
increasingly adopted as human-vehicle interaction methods. This technology enables …
increasingly adopted as human-vehicle interaction methods. This technology enables …