A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

[PDF][PDF] A review of speech-centric trustworthy machine learning: Privacy, safety, and fairness

T Feng, R Hebbar, N Mehlman, X Shi… - … on Signal and …, 2023 - nowpublishers.com
Speech-centric machine learning systems have revolutionized a number of leading
industries ranging from transportation and healthcare to education and defense …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations

Z Li, Y Wu, J Liu, Y Chen, B Yuan - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Existing efforts in audio adversarial attacks only focus on the scenarios where an adversary
has prior knowledge of the entire speech input so as to generate an adversarial example by …

Black-box adversarial attacks on commercial speech platforms with minimal information

B Zheng, P Jiang, Q Wang, Q Li, C Shen… - Proceedings of the …, 2021 - dl.acm.org
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …

A performance-sensitive malware detection system using deep learning on mobile devices

R Feng, S Chen, X **e, G Meng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Currently, Android malware detection is mostly performed on server side against the
increasing number of malware. Powerful computing resource provides more exhaustive …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors

D Han, Z Wang, Y Zhong, W Chen… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …

Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms

L Cheng, C Wilson, S Liao, J Young, D Dong… - Proceedings of the 2020 …, 2020 - dl.acm.org
With the emergence of the voice personal assistant (VPA) ecosystem, third-party developers
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …

Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …