Combating Replay Attacks Against Voice Assistants.
Swadhin PradhanWei SunGhufran BaigLili QiuPublished in: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. (2019)
Keyphrases
- spam filters
- countermeasures
- malicious users
- computer security
- malicious attacks
- traffic analysis
- security threats
- intelligent agents
- security mechanisms
- attack detection
- spam filtering
- watermarking scheme
- java card
- denial of service attacks
- chosen plaintext
- security protocols
- digital image watermarking
- voice activity detection
- information systems
- law enforcement
- digital images
- database systems