Ahmed et al., 2023 - Google Patents
Tubes among us: Analog attack on automatic speaker identificationAhmed et al., 2023
View PDF- Document ID
- 14048428814771472677
- Author
- Ahmed S
- Wani Y
- Shamsabadi A
- Yaghini M
- Shumailov I
- Papernot N
- Fawaz K
- Publication year
- Publication venue
- 32nd USENIX Security Symposium (USENIX Security 23)
External Links
Snippet
Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such …
- 241000282414 Homo sapiens 0 abstract description 30
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kamble et al. | Advances in anti-spoofing: from the perspective of ASVspoof challenges | |
Sahidullah et al. | Introduction to voice presentation attack detection and recent advances | |
Zhang et al. | Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication | |
Chen et al. | Who is real bob? adversarial attacks on speaker recognition systems | |
Wang et al. | Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones | |
Yan et al. | A survey on voice assistant security: Attacks and countermeasures | |
Wang et al. | Secure your voice: An oral airflow-based continuous liveness detection for voice assistants | |
Gong et al. | Protecting voice controlled systems using sound source identification based on acoustic cues | |
Zhang et al. | Viblive: A continuous liveness detection for secure voice user interface in iot environment | |
Li et al. | Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array | |
Tan et al. | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction | |
Chen et al. | Sok: A modularized approach to study the security of automatic speech recognition systems | |
Huang et al. | Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices | |
Jiang et al. | Securing liveness detection for voice authentication via pop noises | |
Khan et al. | Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures | |
Li et al. | Security and privacy problems in voice assistant applications: A survey | |
Yu et al. | Antifake: Using adversarial audio to prevent unauthorized speech synthesis | |
Chen et al. | {QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems | |
Cai et al. | Identifying source speakers for voice conversion based spoofing attacks on speaker verification systems | |
Zong et al. | Trojanmodel: A practical trojan attack against automatic speech recognition systems | |
Zhang et al. | Volere: Leakage resilient user authentication based on personal voice challenges | |
Ahmed et al. | Tubes among us: Analog attack on automatic speaker identification | |
Han et al. | Accuth: Anti-spoofing voice authentication via accelerometer | |
Guo et al. | Supervoice: Text-independent speaker verification using ultrasound energy in human speech | |
Xu et al. | Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems |