Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

ASVspoof 2019: Future horizons in spoofed and fake audio detection

M Todisco, X Wang, V Vestman, M Sahidullah… - arXiv preprint arXiv …, 2019 - arxiv.org
ASVspoof, now in its third edition, is a series of community-led challenges which promote
the development of countermeasures to protect automatic speaker verification (ASV) from …

ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech

X Wang, J Yamagishi, M Todisco, H Delgado… - Computer Speech & …, 2020 - Elsevier
Automatic speaker verification (ASV) is one of the most natural and convenient means of
biometric person recognition. Unfortunately, just like all other biometric systems, ASV is …

ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

A Nautsch, X Wang, N Evans… - … and Identity Science, 2021 - ieeexplore.ieee.org
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …

Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication

L Zhang, S Tan, J Yang - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

EarDynamic: An ear canal deformation based continuous user authentication using in-ear wearables

Z Wang, S Tan, L Zhang, Y Ren, Z Wang… - Proceedings of the ACM …, 2021 - dl.acm.org
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …

Void: A fast and light voice liveness detection system

ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh… - 29th USENIX Security …, 2020 - usenix.org
Due to the open nature of voice assistants' input channels, adversaries could easily record
people's use of voice commands, and replay them to spoof voice assistants. To mitigate …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …