2020
DOI: 10.1109/jiot.2020.2997779
|View full text |Cite
|
Sign up to set email alerts
|

Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…where IðV ; YÞ and IðV ; ZÞ are the mutual information of an auxiliary random variable, V, and the received variable at Bob, Y, or the received variable at Eve, Z, when sending X at Alice, respectively. For a given channel, finding the secrecy capacity is equivalent to finding the joint distribution of V and X, i.e., pðv, xÞ, u ∈ U, x ∈ X, which maximizes the difference in (2). As the result, the secrecy capacity for an average power constraint can be calculated as follows:…”
Section: Secrecy Capacity (Sc)mentioning
confidence: 99%
See 1 more Smart Citation
“…where IðV ; YÞ and IðV ; ZÞ are the mutual information of an auxiliary random variable, V, and the received variable at Bob, Y, or the received variable at Eve, Z, when sending X at Alice, respectively. For a given channel, finding the secrecy capacity is equivalent to finding the joint distribution of V and X, i.e., pðv, xÞ, u ∈ U, x ∈ X, which maximizes the difference in (2). As the result, the secrecy capacity for an average power constraint can be calculated as follows:…”
Section: Secrecy Capacity (Sc)mentioning
confidence: 99%
“…Wiretap, caused by an eavesdropper, is a passive attack and does not interfere with legitimate transceivers. Though a legitimate receiver can receive untampered signals, the privacy leakage of these signals is unacceptable along with more attention to information security [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…The main motivation of this research is the simplicity and purpose of adopting such features to the residence to convert the normal home into a wireless smart home. A wireless remote operation is enabled via any smart phone/tablet/Personal Computer (PC) /laptop equipped with the Android operating system [7,8], via a Graphical User Interface (GUI) based on the touch sensitive interface as well as voice assistance. This paper provides an option to customize the device according to the user end, with respect to self-configure and remote assistance-based controlling.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…Mao et al, [8] proposed a paper related to the identification of ultrasonic sensor-enabled inaudible speech threats on smart home automation schemes. In this paper, the authors emphasize IoT as a vital foundation element and its operational capabilities for the rapidly growing cross-region, intelligent application and diverse cooperative smart building solutions that demand structured collaboration between numerous smart city technologies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also, some work has studied countermeasure techniques for improving the resilience of these system against adversarial attacks [19], [67], [88]. Most of these techniques are passive in nature, such as on the case of promoting the detection of an adversarial attack occurrence.…”
Section: Adversarial Attacks On Speech Recognition Systemsmentioning
confidence: 99%