[PDF][PDF] A review of speech-centric trustworthy machine learning: Privacy, safety, and fairness

T Feng, R Hebbar, N Mehlman, X Shi… - … on Signal and …, 2023 - nowpublishers.com
Speech-centric machine learning systems have revolutionized a number of leading
industries ranging from transportation and healthcare to education and defense …

An overview on generative AI at scale with Edge-Cloud Computing

YC Wang, J Xue, C Wei… - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
As a specific category of artificial intelligence (AI), generative artificial intelligence (GenAI)
generates new content that resembles what humans create. The rapid development of …

[HTML][HTML] Analysis of security and data control in smart personal assistants from the user's perspective

C Valero, J Pérez, S Solera-Cotanilla… - Future Generation …, 2023 - Elsevier
Advances in the fields of the Internet of Things, Speech Recognition and Artificial
Intelligence have facilitated the development of Smart Personal Assistants. As a result …

Characterizing everyday misuse of smart home devices

P Moh, P Datta, N Warford, A Bates… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Exploration of Internet of Things (IoT) security often focuses on threats posed by external
and technically-skilled attackers. While it is important to understand these most extreme …

[HTML][HTML] Security and privacy problems in voice assistant applications: A survey

J Li, C Chen, MR Azghadi, H Ghodosi, L Pan… - Computers & …, 2023 - Elsevier
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …

Echoattack: Practical inaudible attacks to smart earbuds

G Li, Z Cao, T Li - Proceedings of the 21st Annual International …, 2023 - dl.acm.org
Recent years have shown substantial interest in revealing vulnerability issues of voice-
controllable systems on smartphones and smart speakers. While significant prior works have …

Protecting sensitive data in the information age: State of the art and future prospects

C Stach, C Gritti, J Bräcker, M Behringer, B Mitschang - Future Internet, 2022 - mdpi.com
The present information age is characterized by an ever-increasing digitalization. Smart
devices quantify our entire lives. These collected data provide the foundation for data-driven …

What is sensitive about (sensitive) data? characterizing sensitivity and intimacy with google assistant users

A Gómez Ortega, J Bourgeois, G Kortuem - Proceedings of the 2023 CHI …, 2023 - dl.acm.org
Digital technologies have increasingly integrated into people's lives, continuously capturing
their behavior through potentially sensitive data. In the context of voice assistants, there is a …

Adversarial attacks and defenses in physiological computing: A systematic review

D Wu, J Xu, W Fang, Y Zhang, L Yang, X Xu… - arXiv preprint arXiv …, 2021 - arxiv.org
Physiological computing uses human physiological data as system inputs in real time. It
includes, or significantly overlaps with, brain-computer interfaces, affective computing …

Skillscanner: Detecting policy-violating voice applications through static analysis at the development phase

S Liao, L Cheng, H Cai, L Guo, H Hu - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The Amazon Alexa marketplace is the largest Voice Personal Assistant (VPA) platform with
over 100,000 voice applications (ie, skills) published to the skills store. In an effort to …