System and method are disclosed to protect a voice-activated assistant against accidental or malicious activation. The system includes a device interacting with the cloud having an assistive device, which in turn is protected by another, protective assistant. The protective assistant detects incoming malicious (or spurious) actions triggered by a third party which tries to connect to the device through the assistant. The protective assistant then emits a signal that would perturb the third party signal, or prepares and issues “cancellation” commands to automatically cancel the action. The system may also notify the user via SMS / phone call / email / screen notification to further manually check the legitimacy of the detected malicious acti...
With the advancement of deep learning based speech recognition technology, an increasing number of c...
A digital voice assistant that understands and responds to natural language voice commands. To activ...
Smart assistants utilize speech recognition, sensing, artificial intelligence, and networking techno...
Intelligent voice assistants are internet-connected devices, which listen to their environment and r...
Personal Voice Assistants (PVAs) such as the Amazon Echo are com- monplace and it is now likely to a...
Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to alw...
The rapid proliferation of Voice Assistant (VA) devices such as Amazon\u27s Alexa, Google Home, and ...
This paper investigates the potential for spreading misinformation via third-party voice application...
This document describes a technique for processing voice commands received by a voice activated comp...
The purchase of mobile smart devices and intelligent assistants, such as Siri, Google Home, and Alex...
Voice assistant applications have become omniscient nowadays. Two models that provide the two most i...
With a rapidly increasing market of millions of devices, the intelligent virtual assistants (IVA) ha...
Voice-activated devices continue to increase in popularity, availability, and functionality. To use...
In some cases, a user may primarily interacts with an interactive assistant, referred to herein as “...
This paper presents novel attacks on voice-controlled digital assistants using nonsensical word sequ...
With the advancement of deep learning based speech recognition technology, an increasing number of c...
A digital voice assistant that understands and responds to natural language voice commands. To activ...
Smart assistants utilize speech recognition, sensing, artificial intelligence, and networking techno...
Intelligent voice assistants are internet-connected devices, which listen to their environment and r...
Personal Voice Assistants (PVAs) such as the Amazon Echo are com- monplace and it is now likely to a...
Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to alw...
The rapid proliferation of Voice Assistant (VA) devices such as Amazon\u27s Alexa, Google Home, and ...
This paper investigates the potential for spreading misinformation via third-party voice application...
This document describes a technique for processing voice commands received by a voice activated comp...
The purchase of mobile smart devices and intelligent assistants, such as Siri, Google Home, and Alex...
Voice assistant applications have become omniscient nowadays. Two models that provide the two most i...
With a rapidly increasing market of millions of devices, the intelligent virtual assistants (IVA) ha...
Voice-activated devices continue to increase in popularity, availability, and functionality. To use...
In some cases, a user may primarily interacts with an interactive assistant, referred to herein as “...
This paper presents novel attacks on voice-controlled digital assistants using nonsensical word sequ...
With the advancement of deep learning based speech recognition technology, an increasing number of c...
A digital voice assistant that understands and responds to natural language voice commands. To activ...
Smart assistants utilize speech recognition, sensing, artificial intelligence, and networking techno...