Privacy and Security in the Use of Voice Assistant: An Evaluation of User Awareness and Preferences

A Dhiya'Mardhiyyah, JJK Latif… - … Conference on Information …, 2023 - ieeexplore.ieee.org
Recently, voice assistants have become increasingly popular with millions of users relying
on them to complete daily tasks and access information. While it may be convenient to use …

Fast and Lightweight Voice Replay Attack Detection via Time-frequency Spectrum Difference

R He, Y Cheng, Z Zheng, X Ji… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Due to the open nature of voice and voice interface, an adversary can spoof voice
recognition systems by replaying pre-recorded voice commands from legitimate users …

XGB-RFE: An XGBoost Approach for Improved Playback Spoofing Detection in Automatic Speaker Verification Systems Using Recursive Feature Elimination

H Sanghvi, SH Mankad - 2023 IEEE 11th Region 10 …, 2023 - ieeexplore.ieee.org
Playback spoofing, the act of impersonating another speaker by playing back recordings of
their voice, poses a significant threat tot he security of Automatic Speaker Veri-fication (ASV) …