A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Sequential randomized smoothing for adversarially robust speech recognition

R Olivier, B Raj - arXiv preprint arXiv:2112.03000, 2021 - arxiv.org
While Automatic Speech Recognition has been shown to be vulnerable to adversarial
attacks, defenses against these attacks are still lagging. Existing, naive defenses can be …

Privacy-preserving and Privacy-attacking Approaches for Speech and Audio--A Survey

Y Liu, A Kapadia, D Williamson - arXiv preprint arXiv:2309.15087, 2023 - arxiv.org
In contemporary society, voice-controlled devices, such as smartphones and home
assistants, have become pervasive due to their advanced capabilities and functionality. The …

Robust sensor fusion algorithms against voice command attacks in autonomous vehicles

J Guan, X Zheng, C Wang, Y Zhou… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With recent advances in autonomous driving, voice control systems have become
increasingly adopted as human-vehicle interaction methods. This technology enables …

[图书][B] Research on Attacks, Defenses and Designs of Image and Audio CAPTCHAs

MI Hossen - 2022 - search.proquest.com
Abstract CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart) is a challenge-response test designed to distinguish between humans and …

[PDF][PDF] Hear me if you can! Audio Steganography

M Vaidya, R Dahale, S Shah - academia.edu
Audio steganography is a technique for concealing the existence of information by
embedding it within non-secret audio, called the carrier audio signal. There is a trade-off …