Ahmed et al., 2023 - Google Patents

Tubes among us: Analog attack on automatic speaker identification

Ahmed et al., 2023

View PDF
Document ID
14048428814771472677
Author
Ahmed S
Wani Y
Shamsabadi A
Yaghini M
Shumailov I
Papernot N
Fawaz K
Publication year
Publication venue
32nd USENIX Security Symposium (USENIX Security 23)

External Links

Snippet

Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kamble et al. Advances in anti-spoofing: from the perspective of ASVspoof challenges
Sahidullah et al. Introduction to voice presentation attack detection and recent advances
Zhang et al. Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication
Chen et al. Who is real bob? adversarial attacks on speaker recognition systems
Wang et al. Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones
Yan et al. A survey on voice assistant security: Attacks and countermeasures
Wang et al. Secure your voice: An oral airflow-based continuous liveness detection for voice assistants
Gong et al. Protecting voice controlled systems using sound source identification based on acoustic cues
Zhang et al. Viblive: A continuous liveness detection for secure voice user interface in iot environment
Li et al. Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
Tan et al. A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
Chen et al. Sok: A modularized approach to study the security of automatic speech recognition systems
Huang et al. Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices
Jiang et al. Securing liveness detection for voice authentication via pop noises
Khan et al. Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
Li et al. Security and privacy problems in voice assistant applications: A survey
Yu et al. Antifake: Using adversarial audio to prevent unauthorized speech synthesis
Chen et al. {QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems
Cai et al. Identifying source speakers for voice conversion based spoofing attacks on speaker verification systems
Zong et al. Trojanmodel: A practical trojan attack against automatic speech recognition systems
Zhang et al. Volere: Leakage resilient user authentication based on personal voice challenges
Ahmed et al. Tubes among us: Analog attack on automatic speaker identification
Han et al. Accuth: Anti-spoofing voice authentication via accelerometer
Guo et al. Supervoice: Text-independent speaker verification using ultrasound energy in human speech
Xu et al. Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems