A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
[PDF][PDF] A review of speech-centric trustworthy machine learning: Privacy, safety, and fairness
Speech-centric machine learning systems have revolutionized a number of leading
industries ranging from transportation and healthcare to education and defense …
industries ranging from transportation and healthcare to education and defense …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations
Existing efforts in audio adversarial attacks only focus on the scenarios where an adversary
has prior knowledge of the entire speech input so as to generate an adversarial example by …
has prior knowledge of the entire speech input so as to generate an adversarial example by …
Black-box adversarial attacks on commercial speech platforms with minimal information
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …
APIs and voice control devices, have received little attention until recent years. Constructing …
A performance-sensitive malware detection system using deep learning on mobile devices
Currently, Android malware detection is mostly performed on server side against the
increasing number of malware. Powerful computing resource provides more exhaustive …
increasing number of malware. Powerful computing resource provides more exhaustive …
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms
With the emergence of the voice personal assistant (VPA) ecosystem, third-party developers
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …
Adversarial attack and defense strategies of speaker recognition systems: A survey
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …
advances in deep learning have considerably boosted the development of speech signal …