R He, Y Cheng, Z Zheng, X Ji… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Due to the open nature of voice and voice interface, an adversary can spoof voice recognition systems by replaying pre-recorded voice commands from legitimate users …
H Sanghvi, SH Mankad - 2023 IEEE 11th Region 10 …, 2023 - ieeexplore.ieee.org
Playback spoofing, the act of impersonating another speaker by playing back recordings of their voice, poses a significant threat tot he security of Automatic Speaker Veri-fication (ASV) …