A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles

J Tian, B Wang, R Guo, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The introduction of deep learning (DL) technology can improve the performance of cyber–
physical systems (CPSs) in many ways. However, this also brings new security issues. To …

Black-box adversarial attacks on commercial speech platforms with minimal information

B Zheng, P Jiang, Q Wang, Q Li, C Shen… - Proceedings of the …, 2021 - dl.acm.org
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …

Can we use arbitrary objects to attack lidar perception in autonomous driving?

Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su… - Proceedings of the 2021 …, 2021 - dl.acm.org
As an effective way to acquire accurate information about the driving environment, LiDAR
perception has been widely adopted in autonomous driving. The state-of-the-art LiDAR …

Veriml: Enabling integrity assurances and fair payments for machine learning as a service

L Zhao, Q Wang, C Wang, Q Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …

Hear sign language: A real-time end-to-end sign language recognition system

Z Wang, T Zhao, J Ma, H Chen, K Liu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Sign language recognition (SLR) bridges the communication gap between the hearing-
impaired and the ordinary people. However, existing SLR systems either cannot provide …

Query-efficient adversarial attack with low perturbation against end-to-end speech recognition systems

S Wang, Z Zhang, G Zhu, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the widespread use of automated speech recognition (ASR) systems in modern
consumer devices, attack against ASR systems have become an attractive topic in recent …

Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems

S Joshi, J Villalba, P Żelasko… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …

{KENKU}: Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems

X Wu, S Ma, C Shen, C Lin, Q Wang, Q Li… - 32nd USENIX Security …, 2023 - usenix.org
Prior researchers show that existing automatic speech recognition (ASR) systems are
vulnerable to adversarial examples. Most existing adversarial attacks against ASR systems …

LinkBreaker: Breaking the backdoor-trigger link in DNNs via neurons consistency check

Z Chen, S Wang, A Fu, Y Gao, S Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Backdoor attacks cause model misbehaving by first implanting backdoors in deep neural
networks (DNNs) during training and then activating the backdoor via samples with triggers …