Security and Privacy Problems in Voice Assistant Applications: A Survey Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19 Backdoor AttackPrivacy AnalysisSpeech Recognition Process 2023.04.19 2025.05.28 Literature Database
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26 Performance EvaluationAttack MethodSpeech Recognition Process 2022.07.26 2025.05.28 Literature Database
Generative Extraction of Audio Classifiers for Speaker Identification Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26 Dataset GenerationModel Performance EvaluationSpeech Recognition Process 2022.07.26 2025.05.28 Literature Database
Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16 Privacy Protection MethodInformation-Theoretic PrivacySpeech Recognition Process 2022.07.16 2025.05.28 Literature Database
Adversarial attacks and defenses in Speaker Recognition Systems: A survey Authors: Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou | Published: 2022-05-27 Adversarial ExampleAdversarial Attack MethodsSpeech Recognition Process 2022.05.27 2025.05.28 Literature Database
End-to-end anti-spoofing with RawNet2 Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16 Detection of DeepfakesModel EvaluationSpeech Recognition Process 2020.11.02 2025.05.28 Literature Database
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03 Certified RobustnessAdversarial Example DetectionSpeech Recognition Process 2018.12.26 2025.05.28 Literature Database
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09 Data Privacy ManagementPrivacy Enhancing TechnologySpeech Recognition Process 2018.03.09 2025.05.28 Literature Database