The ai-based cyber threat landscape: A survey

N Kaloudi, J Li - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …

Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

Music, search, and IoT: How people (really) use voice assistants

T Ammari, J Kaye, JY Tsai, F Bentley - ACM Transactions on Computer …, 2019 - dl.acm.org
Voice has become a widespread and commercially viable interaction mechanism with the
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …

Dolphinattack: Inaudible voice commands

G Zhang, C Yan, X Ji, T Zhang, T Zhang… - Proceedings of the 2017 …, 2017 - dl.acm.org
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …

Hidden voice commands

N Carlini, P Mishra, T Vaidya, Y Zhang… - 25th USENIX security …, 2016 - usenix.org
Voice interfaces are becoming more ubiquitous and are now the primary input method for
many devices. We explore in this paper how they can be attacked with hidden voice …

A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems

T Sugawara, B Cyr, S Rampazzi, D Genkin… - 29th USENIX Security …, 2020 - usenix.org
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …

An empirical study on anthropomorphism and engagement with disembodied AIs and consumers' re‐use behavior

E Moriuchi - Psychology & Marketing, 2021 - Wiley Online Library
The integration of artificial intelligence (AI) into the human race has gradually become a
norm. AI entails technology assemblages such as machine learning, natural language …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding

L Schönherr, K Kohls, S Zeiler, T Holz… - arxiv preprint arxiv …, 2018 - arxiv.org
Voice interfaces are becoming accepted widely as input methods for a diverse set of
devices. This development is driven by rapid improvements in automatic speech recognition …