A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

[HTML][HTML] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

ZM Saadi, AT Sadiq, OZ Akif, AK Farhan - Electronics, 2024 - mdpi.com
As technology advances and develops, the need for strong and simple authentication
mechanisms that can help protect data intensifies. The contemporary approach to giving …

Usability evaluation of artificial intelligence-based voice assistants: The case of Amazon Alexa

DS Zwakman, D Pal, C Arpnikanondt - SN Computer Science, 2021 - Springer
Currently, the use of voice-assistants has been on the rise, but a user-centric usability
evaluation of these devices is a must for ensuring their success. System Usability Scale …

Analyzing the adoption and diffusion of voice-enabled smart-home systems: empirical evidence from Thailand

D Pal, C Arpnikanondt, S Funilkul… - Universal Access in the …, 2021 - Springer
The market for voice assistants (VAs) and other allied voice-based smart-home products is
gradually emerging. The initial growth has been slower than expected; therefore, an in …

An integrated TAM/ISS model based PLS-SEM approach for evaluating the continuous usage of voice enabled IoT systems

D Pal, C Arpnikanondt - Wireless Personal Communications, 2021 - Springer
Abstract The Voice Assistant (VA) market is emerging rapidly. Considering the unique
features of voice technology, primarily with respect to its ability to provide a total hands-free …

SoK: On the offensive potential of AI

SL Schröer, G Apruzzese, S Human, P Laskov… - arxiv preprint arxiv …, 2024 - arxiv.org
Our society increasingly benefits from Artificial Intelligence (AI). Unfortunately, more and
more evidence shows that AI is also used for offensive purposes. Prior works have revealed …

Mobile spyware identification and categorization: A systematic review

M Naser, H Albazar, H Abdel-Jaber - Informatica, 2023 - informatica.si
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …

Characterizing sensor leaks in android apps

X Sun, X Chen, K Liu, S Wen, L Li… - 2021 IEEE 32nd …, 2021 - ieeexplore.ieee.org
While extremely valuable to achieve advanced functions, mobile phone sensors can be
abused by attackers to implement malicious activities in Android apps, as experimentally …

Towards Securing Mobile Communication from Spyware Attacks with Artificial Intelligence Techniques

A Kumari, I Sharma - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Nowadays security in mobile phones is a crucial issue, attacker attacks through messages
and emails and when the user opens these malicious links, they can easily insert the …

Robust sensor fusion algorithms against voice command attacks in autonomous vehicles

J Guan, X Zheng, C Wang, Y Zhou… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With recent advances in autonomous driving, voice control systems have become
increasingly adopted as human-vehicle interaction methods. This technology enables …