[HTML][HTML] Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review

S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …

Hello me, meet the real me: Voice synthesis attacks on voice assistants

D Bilika, N Michopoulou, E Alepis, C Patsakis - Computers & Security, 2024 - Elsevier
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interactions with computing interfaces. Voice Assistants …

Examining the context‐specific reasons and adoption of artificial intelligence‐based voice assistants: A behavioural reasoning theory approach

S Anayat, G Rasool, A Pathania - International Journal of …, 2023 - Wiley Online Library
AI‐based voice assistants are some of the most popular consumer products of artificial
intelligence technology. This study investigates the influence of the reasoning process on …

Meta-speaker: Acoustic source projection by exploiting air nonlinearity

W Wang, Y He, M Jin, Y Sun, X Guo - Proceedings of the 29th Annual …, 2023 - dl.acm.org
This paper proposes Meta-Speaker, an innovative speaker capable of projecting audible
sources into the air with a high level of manipulability. Unlike traditional speakers that emit …

[HTML][HTML] Security and privacy problems in voice assistant applications: A survey

J Li, C Chen, MR Azghadi, H Ghodosi, L Pan… - Computers & …, 2023 - Elsevier
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …

Echoattack: Practical inaudible attacks to smart earbuds

G Li, Z Cao, T Li - Proceedings of the 21st Annual International …, 2023 - dl.acm.org
Recent years have shown substantial interest in revealing vulnerability issues of voice-
controllable systems on smartphones and smart speakers. While significant prior works have …

[HTML][HTML] CROSS: A framework for cyber risk optimisation in smart homes

Y Zhang, P Malacaria, G Loukas, E Panaousis - Computers & Security, 2023 - Elsevier
This work introduces a decision support framework, called Cyber Risk Optimiser for Smart
homeS (CROSS), which advises both smart home users and smart home service providers …

Skillscanner: Detecting policy-violating voice applications through static analysis at the development phase

S Liao, L Cheng, H Cai, L Guo, H Hu - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The Amazon Alexa marketplace is the largest Voice Personal Assistant (VPA) platform with
over 100,000 voice applications (ie, skills) published to the skills store. In an effort to …

Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks

PV Mizinov, NS Konnova, MA Basarab… - Journal of Computer …, 2023 - Springer
Biometric vein recognition systems are vulnerable to presentation attacks. Traditionally,
researchers have used a near-infrared (NIR) drawing of the user's vascular bed to create a …

Hello me, meet the real me: Audio deepfake attacks on voice assistants

D Bilika, N Michopoulou, E Alepis… - arXiv preprint arXiv …, 2023 - arxiv.org
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interaction with computing interfaces. Voice Assistants …