Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …
personal assistants to telephony surveillance and biometric authentication. The wide …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
The security of autonomous driving: Threats, defenses, and future directions
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …
by releasing the burden of drivers and reducing traffic accidents with more precise control …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …
such tools can be extremely useful in applications where people consent to their voices …
" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …
Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
Teethpass: Dental occlusion-based user authentication via in-ear acoustic sensing
With the rapid development of mobile devices and the fast increase of sensitive data, secure
and convenient mobile authentication technologies are desired. Except for traditional …
and convenient mobile authentication technologies are desired. Except for traditional …