A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Adversarial attack and defense strategies of speaker recognition systems: A survey
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …
advances in deep learning have considerably boosted the development of speech signal …
Towards understanding and mitigating audio adversarial examples for speaker recognition
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …
adversarial attacks, raising significant security concerns. In this work, we systematically …
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Recent work has illuminated the vulnerability of speaker recognition systems (SRSs) against
adversarial attacks, raising significant security concerns in deploying SRSs. However, they …
adversarial attacks, raising significant security concerns in deploying SRSs. However, they …
Differentially private speaker anonymization
Sharing real-world speech utterances is key to the training and deployment of voice-based
services. However, it also raises privacy risks as speech contains a wealth of personal data …
services. However, it also raises privacy risks as speech contains a wealth of personal data …
Voiceblock: Privacy through real-time adversarial attacks with audio-to-audio models
As governments and corporations adopt deep learning systems to collect and analyze user-
generated audio data, concerns about security and privacy naturally emerge in areas such …
generated audio data, concerns about security and privacy naturally emerge in areas such …
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving
In autonomous driving, millimeter wave (mmWave) radar has been widely adopted for object
detection because of its robustness and reliability under various weather and lighting …
detection because of its robustness and reliability under various weather and lighting …
A highly stealthy adaptive decay attack against speaker recognition
X Zhang, Y Xu, S Zhang, X Li - IEEE Access, 2022 - ieeexplore.ieee.org
Speaker recognition based on deep learning is currently the most advanced and
mainstream technology in the industry. Adversarial attacks, an emerging and powerful attack …
mainstream technology in the industry. Adversarial attacks, an emerging and powerful attack …
[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …
attacks are often assessed using different SR models, recognition tasks and datasets, and …
Symmetric saliency-based adversarial attack to speaker identification
Adversarial attack approaches to speaker identification either need high computational cost
or are not very effective, to our knowledge. To address this issue, in this letter, we propose a …
or are not very effective, to our knowledge. To address this issue, in this letter, we propose a …