Automatic speech recognizers (ASR) are now nearly ubiquitous, finding application in smart assistants, smartphones, smart speakers, and other devices. An attack on an ASR that triggers such a device into carrying out false instructions can lead to severe consequences. Typically, speech recognition is performed using machine learning models, e.g., neural networks, whose intermediate outputs are not always fully concealed. Exposing such intermediate outputs makes the crafting of malicious input audio easier. This disclosure describes techniques that thwart attacks on speech recognition systems by moving model inference processing to a secure computing enclave. The memory of the secure enclave and signals are inaccessible to the user and untru...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
This paper details the research in progress into identifying and addressing the threats faced by voi...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
While deep learning techniques have achieved great success in modern digital products, researchers h...
With the widespread use of machine learning techniques in many areas of our life (e.g., recognizing ...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
Automatic speaker verification (ASV), one of the most important technology for biometric identificat...
Speech is one of the most private forms of communication. People do not like to be eavesdropped on. ...
Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturba...
Although authentication of users of digital voice-based systems has been addressed by much research ...
Although authentication of users of digital voice-based systems has been addressed by much research ...
With the advances in deep learning, speaker verification has achieved very high accuracy and is gain...
Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances i...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
This paper details the research in progress into identifying and addressing the threats faced by voi...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
While deep learning techniques have achieved great success in modern digital products, researchers h...
With the widespread use of machine learning techniques in many areas of our life (e.g., recognizing ...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
Automatic speaker verification (ASV), one of the most important technology for biometric identificat...
Speech is one of the most private forms of communication. People do not like to be eavesdropped on. ...
Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturba...
Although authentication of users of digital voice-based systems has been addressed by much research ...
Although authentication of users of digital voice-based systems has been addressed by much research ...
With the advances in deep learning, speaker verification has achieved very high accuracy and is gain...
Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances i...
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudib...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
This paper details the research in progress into identifying and addressing the threats faced by voi...
Abstract - Recent advances in artificial intelligence have enabled a disturbing new form of cyberatt...