Attacks and defenses in user authentication systems: A survey
X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
ASVspoof 2019: Future horizons in spoofed and fake audio detection
ASVspoof, now in its third edition, is a series of community-led challenges which promote
the development of countermeasures to protect automatic speaker verification (ASV) from …
the development of countermeasures to protect automatic speaker verification (ASV) from …
ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
Automatic speaker verification (ASV) is one of the most natural and convenient means of
biometric person recognition. Unfortunately, just like all other biometric systems, ASV is …
biometric person recognition. Unfortunately, just like all other biometric systems, ASV is …
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …
speaker verification (ASV). This paper describes the third in a series of bi-annual …
Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …
passwords for mobile authentication. Recently, a growing body of work shows that voice …
Advances in anti-spoofing: from the perspective of ASVspoof challenges
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …
This leads to an increased interest to secure these voice biometric systems for real-world …
Toothsonic: Earable authentication via acoustic toothprint
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …
range of personal applications. The traditional authentication methods hence become less …
EarDynamic: An ear canal deformation based continuous user authentication using in-ear wearables
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …
applications. Meanwhile, the growing adoption of sensors in wearables also provides …
Void: A fast and light voice liveness detection system
Due to the open nature of voice assistants' input channels, adversaries could easily record
people's use of voice commands, and replay them to spoof voice assistants. To mitigate …
people's use of voice commands, and replay them to spoof voice assistants. To mitigate …
Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …