共 54 条
- [1] Abdullah H, 2021, P IEEE S SECUR PRIV, P712, DOI 10.1109/SP40001.2021.00009
- [2] Abdullah H, 2021, P IEEE S SECUR PRIV, P730, DOI 10.1109/SP40001.2021.00014
- [3] Ahmed ME, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2685
- [4] Monkey Says, Monkey Does: Security and Privacy on Voice Assistants [J]. IEEE ACCESS, 2017, 5 : 17841 - 17851
- [5] 2MA: Verifying Voice Commands via Two Microphone Authentication [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 89 - 100
- [6] Hello, Is It Me You're Looking For? Differentiating Between Human and Electronic Speakers for Voice Interface Security [J]. WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 123 - 133
- [7] Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
- [8] Chen G., 2019, P IEEE S SEC PRIV, DOI DOI 10.1109/SP40001
- [9] You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 183 - 195
- [10] CMUSphinx, 2022, CMUSphinx open source speech recognition