{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:45:12Z","timestamp":1730321112832,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:00:00Z","timestamp":1559433600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,2]]},"DOI":"10.1145\/3316781.3317861","type":"proceedings-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T14:07:13Z","timestamp":1558620433000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["MASKER"],"prefix":"10.1145","author":[{"given":"Fuxun","family":"Yu","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}]},{"given":"Zirui","family":"Xu","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}]},{"given":"Chenchen","family":"Liu","sequence":"additional","affiliation":[{"name":"Clarkson University, Potsdam, New York"}]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}]}],"member":"320","published-online":{"date-parts":[[2019,6,2]]},"reference":[{"volume-title":"USENIX Symposium on Operating Systems Design and Implementation.","author":"Mart\u00edn","key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi et al. 2016. TensorFlow: A System for Large-Scale Machine Learning .. In USENIX Symposium on Operating Systems Design and Implementation. Mart\u00edn Abadi et al. 2016. TensorFlow: A System for Large-Scale Machine Learning.. In USENIX Symposium on Operating Systems Design and Implementation."},{"volume-title":"Advances in Pattern Recognition (ICAPR), 2015 Eighth International Conference on. IEEE, 1--6.","author":"Suhail Khan","key":"e_1_3_2_1_2_1","unstructured":"Khan Suhail Ahmad and et al. 2015. A unique approach in text independent speaker recognition using MFCC feature sets and probabilistic neural network . In Advances in Pattern Recognition (ICAPR), 2015 Eighth International Conference on. IEEE, 1--6. Khan Suhail Ahmad and et al. 2015. A unique approach in text independent speaker recognition using MFCC feature sets and probabilistic neural network. In Advances in Pattern Recognition (ICAPR), 2015 Eighth International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_3_1","unstructured":"Moustafa Alzantot and etal 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. arXiv:1801.00554 (2018). Moustafa Alzantot and et al. 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. arXiv:1801.00554 (2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"Inc. Amazon.com. 2018. Amazon Alexa. https:\/\/developer.amazon.com\/alexa Inc. Amazon.com. 2018. Amazon Alexa. https:\/\/developer.amazon.com\/alexa"},{"key":"e_1_3_2_1_5_1","unstructured":"le Inc. App. 2018. Apple Siri. https:\/\/www.apple.com\/ios\/siri\/ le Inc. App. 2018. Apple Siri. https:\/\/www.apple.com\/ios\/siri\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905853"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and etal 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. arXiv:1801.01944 (2018). Nicholas Carlini and et al. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. arXiv:1801.01944 (2018).","DOI":"10.1109\/SPW.2018.00009"},{"volume-title":"NSA has massive database of Americans\u00e2\u0102&Zacute","year":"2006","author":"Cauley Leslie","key":"e_1_3_2_1_8_1","unstructured":"Leslie Cauley . 2006. NSA has massive database of Americans\u00e2\u0102&Zacute ; phone calls. USA today 11, 06 ( 2006 ). Leslie Cauley. 2006. NSA has massive database of Americans\u00e2\u0102Ź phone calls. USA today 11, 06 (2006)."},{"key":"e_1_3_2_1_9_1","unstructured":"Microsoft Corporation. 2018. Bing Voice. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/speech\/ Microsoft Corporation. 2018. Bing Voice. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/speech\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Mozilla Corporation. 2018. Common Voice. https:\/\/voice.mozilla.org\/en Mozilla Corporation. 2018. Common Voice. https:\/\/voice.mozilla.org\/en"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315154718"},{"key":"e_1_3_2_1_12_1","unstructured":"Yuan Gong and etal 2017. Crafting Adversarial Examples For Speech Paralinguistics Applications. arXiv:1711.03280 (2017). Yuan Gong and et al. 2017. Crafting Adversarial Examples For Speech Paralinguistics Applications. arXiv:1711.03280 (2017)."},{"volume-title":"Explaining and harnessing adversarial examples. arXiv:1412.6572","year":"2014","author":"Goodfellow Ian J","key":"e_1_3_2_1_13_1","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_14_1","unstructured":"Awni Hannun and etal 2014. Deep speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567 (2014). Awni Hannun and et al. 2014. Deep speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567 (2014)."},{"key":"e_1_3_2_1_15_1","first-page":"137","article-title":"Method and apparatus for enabling transmission of data packets over a bypass circuit-switched public telephone connection","volume":"6","author":"Jonas Howard","year":"2000","unstructured":"Howard Jonas and 2000 . Method and apparatus for enabling transmission of data packets over a bypass circuit-switched public telephone connection . US Patent 6 , 137 ,792. Howard Jonas and et al. 2000. Method and apparatus for enabling transmission of data packets over a bypass circuit-switched public telephone connection. US Patent 6,137,792.","journal-title":"US Patent"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.36001"},{"key":"e_1_3_2_1_17_1","unstructured":"Eric Limer. {n. d.}. Hundreds of Apps Can Eavesdrop Through Phone Microphones to Target Ads. Eric Limer. {n. d.}. Hundreds of Apps Can Eavesdrop Through Phone Microphones to Target Ads."},{"key":"e_1_3_2_1_18_1","first-page":"549","article-title":"Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password","volume":"8","author":"Lin Chung-Yu","year":"2013","unstructured":"Chung-Yu Lin . 2013 . Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password . US Patent 8 , 549 ,594. Chung-Yu Lin. 2013. Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password. US Patent 8,549,594.","journal-title":"US Patent"},{"key":"e_1_3_2_1_19_1","unstructured":"Google LLC. 2018. Google Voice. https:\/\/voice.google.com\/u\/0\/about Google LLC. 2018. Google Voice. https:\/\/voice.google.com\/u\/0\/about"},{"volume-title":"Automatic Speech Recognition and Understanding (ASRU), 2015 IEEE Workshop on. IEEE, 167--174","author":"Yajie","key":"e_1_3_2_1_20_1","unstructured":"Yajie Miao and et al. 2015. EESEN: End-to-end speech recognition using deep RNN models and WFST-based decoding . In Automatic Speech Recognition and Understanding (ASRU), 2015 IEEE Workshop on. IEEE, 167--174 . Yajie Miao and et al. 2015. EESEN: End-to-end speech recognition using deep RNN models and WFST-based decoding. In Automatic Speech Recognition and Understanding (ASRU), 2015 IEEE Workshop on. IEEE, 167--174."},{"key":"e_1_3_2_1_21_1","volume-title":"Vehicular Technology Conference","volume":"1","author":"Jyhi-Kong","year":"1995","unstructured":"Jyhi-Kong Wey and et al. 1995. Clone terminator: An authentication service for advanced mobile phone system . In Vehicular Technology Conference , 1995 IEEE 45th, Vol. 1 . IEEE, 175--179. Jyhi-Kong Wey and et al. 1995. Clone terminator: An authentication service for advanced mobile phone system. In Vehicular Technology Conference, 1995 IEEE 45th, Vol. 1. IEEE, 175--179."},{"key":"e_1_3_2_1_22_1","unstructured":"Dong Yu and etal 2016. Automatic Speech Recognition. Springer. Dong Yu and et al. 2016. Automatic Speech Recognition. Springer."},{"key":"e_1_3_2_1_23_1","unstructured":"Xuejing Yuan and etal 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv:1801.08535 (2018). Xuejing Yuan and et al. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv:1801.08535 (2018)."}],"event":{"name":"DAC '19: The 56th Annual Design Automation Conference 2019","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Las Vegas NV USA","acronym":"DAC '19"},"container-title":["Proceedings of the 56th Annual Design Automation Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316781.3317861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T22:46:37Z","timestamp":1672958797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316781.3317861"}},"subtitle":["Adaptive Mobile Security Enhancement against Automatic Speech Recognition in Eavesdropping"],"short-title":[],"issued":{"date-parts":[[2019,6,2]]},"references-count":23,"alternative-id":["10.1145\/3316781.3317861","10.1145\/3316781"],"URL":"https:\/\/doi.org\/10.1145\/3316781.3317861","relation":{},"subject":[],"published":{"date-parts":[[2019,6,2]]},"assertion":[{"value":"2019-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}