找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure Voice Processing Systems against Malicious Voice Attacks; Kun Sun,Shu Wang Book 2024 The Editor(s) (if applicable) and The Author(s

[复制链接]
查看: 48938|回复: 35
发表于 2025-3-21 16:31:24 | 显示全部楼层 |阅读模式
书目名称Secure Voice Processing Systems against Malicious Voice Attacks
编辑Kun Sun,Shu Wang
视频video
概述Discusses the threats to the voice processing systems.Provides an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion.Proposes an acoustic system to r
丛书名称SpringerBriefs in Computer Science
图书封面Titlebook: Secure Voice Processing Systems against Malicious Voice Attacks;  Kun Sun,Shu Wang Book 2024 The Editor(s) (if applicable) and The Author(s
描述.This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes..First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acou
出版日期Book 2024
关键词Speech recognition; Security and privacy; Voice processing system; Malicious voice attack; Speaker ident
版次1
doihttps://doi.org/10.1007/978-3-031-44748-8
isbn_softcover978-3-031-44747-1
isbn_ebook978-3-031-44748-8Series ISSN 2191-5768 Series E-ISSN 2191-5776
issn_series 2191-5768
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Secure Voice Processing Systems against Malicious Voice Attacks影响因子(影响力)




书目名称Secure Voice Processing Systems against Malicious Voice Attacks影响因子(影响力)学科排名




书目名称Secure Voice Processing Systems against Malicious Voice Attacks网络公开度




书目名称Secure Voice Processing Systems against Malicious Voice Attacks网络公开度学科排名




书目名称Secure Voice Processing Systems against Malicious Voice Attacks被引频次




书目名称Secure Voice Processing Systems against Malicious Voice Attacks被引频次学科排名




书目名称Secure Voice Processing Systems against Malicious Voice Attacks年度引用




书目名称Secure Voice Processing Systems against Malicious Voice Attacks年度引用学科排名




书目名称Secure Voice Processing Systems against Malicious Voice Attacks读者反馈




书目名称Secure Voice Processing Systems against Malicious Voice Attacks读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:39:19 | 显示全部楼层
Kun Sun,Shu Wang im Vergleich zu nichtseptischen Formen der Herzinsuffizienz einige Besonderheiten mit differentialtherapeutischen Konsequenzen [22a]. Die Therapie der eingeschränkten Herzfunktion darf nicht isoliert betrachtet werden: sie muß sich in ein Gesamtkonzept einordnen, das die zusätzlichen Störungen im B
发表于 2025-3-22 03:01:34 | 显示全部楼层
Kun Sun,Shu Wanghwemmung von infektiös-toxischen Stoffen in das venöse Gefäßsystem erfolgt bei dem gut durchbluteten schwangeren Uterus wesentlich häufiger als bei infektiösen Prozessen in anderen Organen. Aber auch vom nicht schwangeren Uterus kann ein septischer Schock ausgehen. Wir führten an der Universitäts-Fr
发表于 2025-3-22 06:12:01 | 显示全部楼层
发表于 2025-3-22 09:16:45 | 显示全部楼层
2191-5768 frequency-domain distortion.Proposes an acoustic system to r.This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introd
发表于 2025-3-22 16:58:07 | 显示全部楼层
Book 2024s well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic ph
发表于 2025-3-22 20:53:48 | 显示全部楼层
发表于 2025-3-23 00:15:42 | 显示全部楼层
Secure Voice Processing Systems for Driverless Vehicles, However, the automatic speech recognition (ASR) module in the voice control systems is vulnerable to adversarial voice commands, which may cause unexpected behaviors or even accidents in driverless cars. Due to the high demand on security insurance, it remains as a challenge to defend in-vehicle AS
发表于 2025-3-23 04:45:36 | 显示全部楼层
发表于 2025-3-23 08:20:02 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 06:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表