A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Adversarial attack and defense strategies of speaker recognition systems: A survey

H Tan, L Wang, H Zhang, J Zhang, M Shafiq, Z Gu - Electronics, 2022 - mdpi.com
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …

The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …

{QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems

G Chen, Y Zhang, Z Zhao, F Song - 32nd USENIX Security Symposium …, 2023 - usenix.org
Current adversarial attacks against speaker recognition systems (SRSs) require either white-
box access or heavy black-box queries to the target SRS, thus still falling behind practical …

Demographic bias in low-resolution deep face recognition in the wild

A Atzori, G Fenu, M Marras - IEEE Journal of Selected Topics in …, 2023 - ieeexplore.ieee.org
Face biometrics play a primary role in smart cities, from consumer-to organizational-level
applications. This class of technologies has been recently shown to emphasize performance …

Improving the adversarial robustness for speaker verification by self-supervised learning

H Wu, X Li, AT Liu, Z Wu, H Meng… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Previous works have shown that automatic speaker verification (ASV) is seriously vulnerable
to malicious spoofing attacks, such as replay, synthetic speech, and recently emerged …

Voting for the right answer: Adversarial defense for speaker verification

H Wu, Y Zhang, Z Wu, D Wang, H Lee - arXiv preprint arXiv:2106.07868, 2021 - arxiv.org
Automatic speaker verification (ASV) is a well developed technology for biometric
identification, and has been ubiquitous implemented in security-critic applications, such as …

A study of bias mitigation strategies for speaker recognition

R Peri, K Somandepalli, S Narayanan - Computer Speech & Language, 2023 - Elsevier
Speaker recognition is increasingly used in several everyday applications including smart
speakers, customer care centers and other speech-driven analytics. It is crucial to accurately …

Adversarial sample detection for speaker verification by neural vocoders

H Wu, PC Hsu, J Gao, S Zhang… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Automatic speaker verification (ASV), one of the most important technology for biometric
identification, has been widely adopted in security-critical applications. However, ASV is …

Fair performance-based user recommendation in eCoaching systems

L Boratto, S Carta, W Iguider, F Mulas… - User Modeling and User …, 2022 - Springer
Offering timely support to users in eCoaching systems is a key factor to keep them engaged.
However, coaches usually follow a lot of users, so it is hard for them to prioritize those with …