[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sokolov et al., 2020 - Google Patents

Modern social engineering voice cloning technologies

Sokolov et al., 2020

Document ID
4882277150717141677
Author
Sokolov S
Alimov O
Tyapkin D
Katorin Y
Moiseev A
Publication year
Publication venue
2020 IEEE conference of russian young researchers in electrical and electronic engineering (EIConRus)

External Links

Snippet

Today, new methods of fraud are actively increasing depending on the development of technology. The current ways of influencing the victim, which seemed impossible 10 years ago, is part of the modern era. Now cybercrime tools are easy to use and accessible to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
CN111052230B (en) Speech activated selective memory for speech capture device
Yuan et al. {CommanderSong}: a systematic approach for practical adversarial voice recognition
CN110800044B (en) Utterance rights management for voice assistant systems
US10665244B1 (en) Leveraging multiple audio channels for authentication
JP6697265B2 (en) Using the ability to speak as proof of human interaction
US11706217B2 (en) Managing voice applications within a digital workspace
CN105069874B (en) A kind of mobile Internet sound-groove gate inhibition system and its implementation
Malik et al. Towards vulnerability analysis of voice-driven interfaces and countermeasures for replay attacks
US10623403B1 (en) Leveraging multiple audio channels for authentication
US10706848B1 (en) Anomaly detection for voice controlled devices
Sharif et al. Smart home voice assistants: a literature survey of user privacy and security vulnerabilities
Lit et al. A survey on amazon alexa attack surfaces
Sokolov et al. Modern social engineering voice cloning technologies
Zhang et al. Using AI to attack VA: a stealthy spyware against voice assistances in smart phones
Dixit et al. Review of audio deepfake detection techniques: Issues and prospects
Wang et al. Vsmask: Defending against voice synthesis attack via real-time predictive perturbation
CN115035903A (en) Physical voice watermark injection method, voice tracing method and device
US10949153B2 (en) Methods and systems for facilitating the generation of a customized response based on a context
JP2019028465A (en) Speaker verification method and speech recognition system
Guo et al. PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Bispham et al. A taxonomy of attacks via the speech interface
Wu et al. HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks
Phipps et al. Securing voice communications using audio steganography
CN110428844A (en) Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment
McCarthy et al. Shouting Through Letterboxes: A study on attack susceptibility of voice assistants