A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

Advpulse: Universal, synchronization-free, and targeted audio adversarial attacks via subsecond perturbations

Z Li, Y Wu, J Liu, Y Chen, B Yuan - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Existing efforts in audio adversarial attacks only focus on the scenarios where an adversary
has prior knowledge of the entire speech input so as to generate an adversarial example by …

A survey on universal adversarial attack

C Zhang, P Benz, C Lin, A Karjauv, J Wu… - arXiv preprint arXiv …, 2021 - arxiv.org
The intriguing phenomenon of adversarial examples has attracted significant attention in
machine learning and what might be more surprising to the community is the existence of …

A survey on adversarial attacks for malware analysis

K Aryal, M Gupta, M Abdelsalam, P Kunwar… - IEEE …, 2024 - ieeexplore.ieee.org
Machine learning-based malware analysis approaches are widely researched and
deployed in critical infrastructures for detecting and classifying evasive and growing …

The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey

O Ibitoye, R Abou-Khamis, M Shehaby… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …

The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …

Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses

A Qayyum, MA Butt, H Ali, M Usman, O Halabi… - ACM Computing …, 2024 - dl.acm.org
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …

Attack on practical speaker verification system using universal adversarial perturbations

W Zhang, S Zhao, L Liu, J Li, X Cheng… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
In authentication scenarios, applications of practical speaker verification systems usually
require a person to read a dynamic authentication text. Previous studies played an audio …

Metawave: Attacking mmwave sensing with meta-material-enhanced tags

X Chen, Z Li, B Chen, Y Zhu, CX Lu… - The 30th Network …, 2023 - research.ed.ac.uk
Millimeter-wave (mmWave) sensing has been applied in many critical applications, serving
millions of thousands of people around the world. However, it is vulnerable to attacks in the …