[1]Diao W, Liu X, Zhou Z, et al. Your voice assistant is mine: How to abusespeakers to steal information and control your phone[C] Proc of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices(SPSM). New York: ACM, 2014: 6374[2]Zhang L, Tan S, Yang J. Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication[C] Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security (CCS). New York: ACM, 2017: 5771[3]Meng Y, Zhu H, Li J, et al. Liveness detection for voice user interface via wireless signals in IoT environment[J]. IEEE Trans on Dependable and Secure Computing, 2020, 18(6): 29963011[4]Yan C, Long Y, Ji X, et al. The catcher in the field: A fieldprint based spoofing detection for textindependent speaker verification[C] Proc of the 2019 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2019: 12151229[5]Yu Z, Chang Y, Zhang N, et al. SMACK: Semantically meaningful adversarial audio attack[C] Proc of the 32nd USENIX Security Symposium (USENIX Security 23). Berkeley, CA: USENIX Association, 2023: 37993816[6]Yang L, Chen X, Jian X, et al. Remote attacks on speech recognition systems using sound from power supply[C] Proc of the 32nd USENIX Security Symposium (USENIX Security 23). Berkeley, CA: USENIX Association, 2023: 45714588[7]Zhang L, Meng Y, Yu J, et al. Voiceprint mimicry attack towards speaker verification system in smart home[C] Proc of IEEE Conf on Computer Communications (INFOCOM 2020). Piscataway, NJ: IEEE, 2020: 377386[8]Sun Z, Ren Y, Huang Y, et al. AFPM: A lowcost and universal adversarial defense for speaker recognition systems[J]. IEEE Trans on Information Forensics and Security, 2024, 19: 22732287[9]Wang S, Cao J, He X, et al. When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition[C] Proc of the 2020 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2020: 11031119[10]Feng H, Fawaz K, Shin K G. Continuous authentication for voice assistants[C] Proc of the 23rd Annual Int Conf on Mobile Computing and Networking. New York: ACM, 2017: 343355[11]Shiota S, Villavicencio F, Yamagishi J, et al. Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification[C] Proc of the 16th Annual Conf of the International Speech Communication Association. Dresden: ISCA, 2015: 239243[12]Meng Y, Li J, Pillari M, et al. Your microphone array retains your identity: A robust voice liveness detection system for smart speakers[C] Proc of the 31st USENIX Security Symposium (USENIX Security 22). Berkeley, CA: USENIX Association, 2022: 10771094[13]雷磊, 佘堃. 基于小波分析和超级向量的非对称文本相关的说话人识别模型[J]. 信息安全研究, 2018, 4(4): 352358[14]冯畅, 吴晓龙, 赵熠扬, 等. 生成式伪造语音安全问题与解决方案[J]. 信息安全研究, 2024, 10(2): 122129[15]Ahmed D, Sabir A, Das A. Spying through your voice assistants: Realistic voice command fingerprinting[C] Proc of the 32nd USENIX Security Symposium (USENIX Security 23). Berkeley, CA: USENIX Association, 2023: 24192436
|