A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Trusted AI in multiagent systems: An overview of privacy and security for distributed learning

C Ma, J Li, K Wei, B Liu, M Ding, L Yuan… - Proceedings of the …, 2023 - ieeexplore.ieee.org
Motivated by the advancing computational capacity of distributed end-user equipment (UE),
as well as the increasing concerns about sharing private data, there has been considerable …

Deep transfer learning for automatic speech recognition: Towards better generalization

H Kheddar, Y Himeur, S Al-Maadeed, A Amira… - Knowledge-Based …, 2023 - Elsevier
Automatic speech recognition (ASR) has recently become an important challenge when
using deep learning (DL). It requires large-scale training datasets and high computational …

Data security issues in deep learning: Attacks, countermeasures, and opportunities

G Xu, H Li, H Ren, K Yang… - IEEE Communications …, 2019 - ieeexplore.ieee.org
Benefiting from the advancement of algorithms in massive data and powerful computing
resources, deep learning has been explored in a wide variety of fields and produced …

Adversarial attacks and defenses on cyber–physical systems: A survey

J Li, Y Liu, T Chen, Z Xiao, Z Li… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …

Towards an interpretable autoencoder: A decision-tree-based autoencoder and its application in anomaly detection

DL Aguilar, MA Medina-Pérez… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
The importance of understanding and explaining the associated classification results in the
utilization of artificial intelligence (AI) in many different practical applications (eg, cyber …

Cloud-fog automation: Vision, enabling technologies, and future research directions

J Jin, K Yu, J Kua, N Zhang, Z Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Industry 4.0 digital transformation envisages future industrial systems to be fully
automated, including the control, upgrade, and configuration processes of a large number of …

POSTER: Detecting audio adversarial example through audio modification

H Kwon, H Yoon, KW Park - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Deep neural networks (DNNs) perform well in the fields of image recognition, speech
recognition, pattern analysis, and intrusion detection. However, DNNs are vulnerable to …

Evasion Attack and Defense On Machine Learning Models in Cyber-Physical Systems: A Survey

S Wang, RKL Ko, G Bai, N Dong… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML)
techniques to reduce labor costs and improve efficiency. However, the adoption of ML also …

A wide-angle scanning sub-terahertz leaky-wave antenna based on a multilayer dielectric image waveguide

Y Torabi, G Dadashzadeh, M Hadeie, H Oraizi… - Electronics, 2021 - mdpi.com
This paper presents a new layered dielectric leaky-wave antenna (LWA) for the sub-
terahertz (THz) frequency range capable of efficient operation at the broadside with a wide …