Login / Signup
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony.
Zhengxian He
Mohit Narayan Rajput
Mustaque Ahamad
Published in:
CoRR (2020)
Keyphrases
</>
sensitive data
emotion recognition
privacy preserving
data storage
smart card
text to speech
security concerns
information security
multimedia
data sharing
data confidentiality
protection mechanisms
privacy preservation
third party
confidential data
sensitive information
data privacy
malicious users
privacy protection
personal data
security threats
voice over internet protocol
databases
unauthorized access
data analysis
query processing
intrusion detection