A review of modern audio deepfake detection methods: challenges and future directions

Z Almutairi, H Elgibreen - Algorithms, 2022 - mdpi.com
A number of AI-generated tools are used today to clone human voices, leading to a new
technology known as Audio Deepfakes (ADs). Despite being introduced to enhance human …

Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

Deepfake audio detection via MFCC features using machine learning

A Hamza, ARR Javed, F Iqbal, N Kryvinska… - IEEE …, 2022 - ieeexplore.ieee.org
Deepfake content is created or altered synthetically using artificial intelligence (AI)
approaches to appear real. It can include synthesizing audio, video, images, and text …

Personal voice assistant security and privacy—a survey

P Cheng, U Roedig - Proceedings of the IEEE, 2022 - ieeexplore.ieee.org
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Audio deepfakes: A survey

Z Khanjani, G Watson, VP Janeja - Frontiers in Big Data, 2023 - frontiersin.org
A deepfake is content or material that is synthetically generated or manipulated using
artificial intelligence (AI) methods, to be passed off as real and can include audio, video …

Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication

Y Gao, Y Jin, J Chauhan, S Choi, J Li… - Proceedings of the ACM on …, 2021 - dl.acm.org
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …

WavoID: Robust and secure multi-modal user identification via mmWave-voice mechanism

T Liu, F Lin, C Wang, C Xu, X Zhang, Z Li… - Proceedings of the 36th …, 2023 - dl.acm.org
With the increasing deployment of voice-controlled devices in homes and enterprises, there
is an urgent demand for voice identification to prevent unauthorized access to sensitive …

{MAVL}: Multiresolution analysis of voice localization

M Wang, W Sun, L Qiu - … Symposium on Networked Systems Design and …, 2021 - usenix.org
The ability for a smart speaker to localize a user based on his/her voice opens the door to
many new applications. In this paper, we present a novel system, MAVL, to localize human …

DeepRange: Acoustic ranging via deep learning

W Mao, W Sun, M Wang, L Qiu - Proceedings of the ACM on Interactive …, 2020 - dl.acm.org
Acoustic ranging is a technique for estimating the distance between two objects using
acoustic signals, which plays a critical role in many applications, such as motion tracking …