The ai-based cyber threat landscape: A survey
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …
growth in innovation and automation. Although these AI technologies offer significant …
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …
personal assistants to telephony surveillance and biometric authentication. The wide …
Music, search, and IoT: How people (really) use voice assistants
Voice has become a widespread and commercially viable interaction mechanism with the
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …
Dolphinattack: Inaudible voice commands
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …
popular human-computer interaction method, and have turned various systems into voice …
Hidden voice commands
Voice interfaces are becoming more ubiquitous and are now the primary input method for
many devices. We explore in this paper how they can be attacked with hidden voice …
many devices. We explore in this paper how they can be attacked with hidden voice …
A survey of compiler testing
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
An empirical study on anthropomorphism and engagement with disembodied AIs and consumers' re‐use behavior
E Moriuchi - Psychology & Marketing, 2021 - Wiley Online Library
The integration of artificial intelligence (AI) into the human race has gradually become a
norm. AI entails technology assemblages such as machine learning, natural language …
norm. AI entails technology assemblages such as machine learning, natural language …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding
Voice interfaces are becoming accepted widely as input methods for a diverse set of
devices. This development is driven by rapid improvements in automatic speech recognition …
devices. This development is driven by rapid improvements in automatic speech recognition …