A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

Towards understanding and mitigating audio adversarial examples for speaker recognition

G Chen, Z Zhao, F Song, S Chen, L Fan… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

G Chen, Z Zhao, F Song, S Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent work has illuminated the vulnerability of speaker recognition systems (SRSs) against
adversarial attacks, raising significant security concerns in deploying SRSs. However, they …

Differentially private speaker anonymization

AS Shamsabadi, BML Srivastava, A Bellet… - arxiv preprint arxiv …, 2022 - arxiv.org
Sharing real-world speech utterances is key to the training and deployment of voice-based
services. However, it also raises privacy risks as speech contains a wealth of personal data …

Voiceblock: Privacy through real-time adversarial attacks with audio-to-audio models

P O'Reilly, A Bugler, K Bhandari… - Advances in Neural …, 2022 - proceedings.neurips.cc
As governments and corporations adopt deep learning systems to collect and analyze user-
generated audio data, concerns about security and privacy naturally emerge in areas such …

TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving

Y Zhu, C Miao, H Xue, Z Li, Y Yu, W Xu, L Su… - Proceedings of the 2023 …, 2023 - dl.acm.org
In autonomous driving, millimeter wave (mmWave) radar has been widely adopted for object
detection because of its robustness and reliability under various weather and lighting …

A highly stealthy adaptive decay attack against speaker recognition

X Zhang, Y Xu, S Zhang, X Li - IEEE Access, 2022 - ieeexplore.ieee.org
Speaker recognition based on deep learning is currently the most advanced and
mainstream technology in the industry. Adversarial attacks, an emerging and powerful attack …

[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition

G Chen, Z Zhao, F Song, S Chen, L Fan… - arxiv preprint arxiv …, 2021 - academia.edu
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …

Symmetric saliency-based adversarial attack to speaker identification

J Yao, X Chen, XL Zhang, WQ Zhang… - IEEE Signal Processing …, 2023 - ieeexplore.ieee.org
Adversarial attack approaches to speaker identification either need high computational cost
or are not very effective, to our knowledge. To address this issue, in this letter, we propose a …