Masterkey: Practical backdoor attack against speaker verification systems

H Guo, X Chen, J Guo, L Xiao, Q Yan - Proceedings of the 29th Annual …, 2023 - dl.acm.org
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …

Hydra: Accurate multi-modal leaf wetness sensing with mm-wave and camera fusion

Y Liu, M Gan, H Zeng, L Liu, Y Dong… - Proceedings of the 30th …, 2024 - dl.acm.org
Leaf Wetness Duration (LWD), the time that water remains on leaf surfaces, is crucial in the
development of plant diseases. Existing LWD detection lacks standardized measurement …

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

H Guo, G Wang, Y Wang, B Chen, Q Yan… - Proceedings of the 26th …, 2023 - dl.acm.org
In this paper, we propose PhantomSound, a query-efficient black-box attack toward voice
assistants. Existing black-box adversarial attacks on voice assistants either apply …

DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning

B Chen, N Ivanov, G Wang… - 2023 20th Annual IEEE …, 2023 - ieeexplore.ieee.org
Federated Learning (FL) is a distributed machine learning (ML) paradigm, aiming to train a
global model by exploiting the decentralized data across millions of edge devices …

Protecting activity sensing data privacy using hierarchical information dissociation

G Wang, H Guo, Y Wang, B Chen… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Smartphones and wearable devices have been integrated into our daily lives, offering
personalized services. However, many apps become overprivileged as their collected …

Web 3.0 security: Backdoor attacks in federated learning-based automatic speaker verification systems in the 6G era

Y Wu, J Chen, T Lei, J Yu, MS Hossain - Future Generation Computer …, 2024 - Elsevier
With the advent of Next-Generation Web 3.0 and the integration of 6G technologies, digital
industrial applications are undergoing unprecedented transformations. Among these, the …

[PDF][PDF] From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan, MA Elsaadani… - 2024 IEEE Symposium …, 2024 - xialihei.com
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

MuDiS: An Audio-independent, Wide-angle, and Leak-free Multi-directional Speaker

Y Li, J Zhou, D Ding, YC Chen, L Qiu, J Yu… - Proceedings of the 30th …, 2024 - dl.acm.org
This paper introduces a novel multi-directional speaker, named MuDiS, which utilizes a
parametric array to generate highly focused sound beams in multiple directions. The system …

Earda: Towards accurate and data-efficient earable activity sensing

S Lyu, Y Chen, D Duan, R Jia… - 2024 IEEE Coupling of …, 2024 - ieeexplore.ieee.org
In the realm of smart sensing with the Internet of Things, earable devices are empowered
with the capability of multi-modality sensing and intelligence of context-aware computing …

PiezoBud: A Piezo-Aided Secure Earbud with Practical Speaker Authentication

G Li, H Zeng, H Guo, Y Ren, A Dixon, Z Cao… - Proceedings of the 22nd …, 2024 - dl.acm.org
With the advancement of AI-powered personal voice assistants, speaker authentication via
earbuds has become increasingly vital, serving as a critical interface between users and …