Speaker Verification (SV) is widely deployed in mobile systems to
authen...
In this paper, we propose PhantomSound, a query-efficient black-box atta...
Recent advances in natural language processing and machine learning have...
Deep learning based voice synthesis technology generates artificial
huma...
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where
ad...
In this paper, we propose NEC (Neural Enhanced Cancellation), a defense
...
Voice-activated systems are integrated into a variety of desktop, mobile...
Inaudible voice command injection is one of the most threatening attacks...
The developers of Ethereum smart contracts often implement administratin...
In-band full duplex wireless is of utmost interest to future wireless
co...
Deep imitation learning enables robots to learn from expert demonstratio...