Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security 2021
DOI: 10.1145/3433210.3437523
|View full text |Cite
|
Sign up to set email alerts
|

HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…As previous shown in Table 1 the comparison of the related studies and in Table 10 the comparison of the proposed model and the benchmark study. Wu et al [ 9 ] used the fusion-based technique for the hidden voice attacks. The study has achieved the success rate of 0.941.…”
Section: Further Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As previous shown in Table 1 the comparison of the related studies and in Table 10 the comparison of the proposed model and the benchmark study. Wu et al [ 9 ] used the fusion-based technique for the hidden voice attacks. The study has achieved the success rate of 0.941.…”
Section: Further Discussionmentioning
confidence: 99%
“…As a result, some studies have been made on the safety measure for HVAC systems. Wu et al [ 9 ] focused on hidden voice attacks and how such security breaches can affect many organizations and users. They proposed a fusion-based method to combine normal and obfuscated samples, since a hybrid hidden voice attacks commands and effectively fools defensive classifiers.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Voice-activated devices have become increasingly prevalent daily, with billions of digital voice assistants worldwide and a significant market share held by popular platforms such as Apple Siri, Google Assistant, and Amazon Alexa [1][2]. Researchers have made progress in developing defense mechanisms and detection techniques to counter ultrasonic attacks and other security risks associated with voiceactivated devices [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. Continued vigilance and innovation are essential to ensuring user safety and privacy [14].…”
Section: Introductionmentioning
confidence: 99%
“…Surveys, analyses, and investigations into specific aspects of voice assistant security have also contributed significantly to the field [8,10,11,13,16,20,29,37,39,50,69,72,83]. These studies have provided comprehensive insights into the attack surface, vulnerabilities, and potential mitigations, allowing for a deeper understanding of the security challenges posed by voice-controlled systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation