A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Characterizing audio adversarial examples using temporal dependency

Z Yang, B Li, PY Chen, D Song - arXiv preprint arXiv:1809.10875, 2018 - arxiv.org
Recent studies have highlighted adversarial examples as a ubiquitous threat to different
neural network models and many downstream applications. Nonetheless, as unique data …

Personal voice assistant security and privacy—a survey

P Cheng, U Roedig - Proceedings of the IEEE, 2022 - ieeexplore.ieee.org
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …

Sirenattack: Generating adversarial audio for end-to-end acoustic systems

T Du, S Ji, J Li, Q Gu, T Wang, R Beyah - Proceedings of the 15th ACM …, 2020 - dl.acm.org
Despite their immense popularity, deep learning-based acoustic systems are inherently
vulnerable to adversarial attacks, wherein maliciously crafted audios trigger target systems …

Research progress and challenges on application-driven adversarial examples: A survey

W Jiang, Z He, J Zhan, W Pan, D Adhikari - ACM Transactions on Cyber …, 2021 - dl.acm.org
Great progress has been made in deep learning over the past few years, which drives the
deployment of deep learning–based applications into cyber-physical systems. But the lack of …

Universal adversarial perturbations for speech recognition systems

P Neekhara, S Hussain, P Pandey, S Dubnov… - arXiv preprint arXiv …, 2019 - arxiv.org
In this work, we demonstrate the existence of universal adversarial audio perturbations that
cause mis-transcription of audio signals by automatic speech recognition (ASR) systems …

Adversarial attacks and defenses on cyber–physical systems: A survey

J Li, Y Liu, T Chen, Z Xiao, Z Li… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …

Query-efficient adversarial attack with low perturbation against end-to-end speech recognition systems

S Wang, Z Zhang, G Zhu, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the widespread use of automated speech recognition (ASR) systems in modern
consumer devices, attack against ASR systems have become an attractive topic in recent …

[PDF][PDF] x-Vectors Meet Adversarial Attacks: Benchmarking Adversarial Robustness in Speaker Verification.

J Villalba, Y Zhang, N Dehak - Interspeech, 2020 - interspeech2020.org
Abstract Automatic Speaker Verification (ASV) enables high-security applications like user
authentication or criminal investigation. However, ASV can be subjected to malicious …

Characterizing speech adversarial examples using self-attention u-net enhancement

CH Yang, J Qi, PY Chen, X Ma… - ICASSP 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Recent studies have highlighted adversarial examples as ubiquitous threats to the deep
neural network (DNN) based speech recognition systems. In this work, we present a U-Net …