You Talk Too Much: Limiting Privacy Exposure Via Voice Input
暂无分享,去创建一个
[1] Dora M. Ballesteros L,et al. Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content , 2014 .
[2] Micah Sherr,et al. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition , 2015, WOOT.
[3] Heiga Zen,et al. WaveNet: A Generative Model for Raw Audio , 2016, SSW.
[4] Katharina von Kriegstein,et al. How do we recognise who is speaking? , 2014, Frontiers in bioscience.
[5] Veton Kepuska,et al. Comparing Speech Recognition Systems (Microsoft API, Google API And CMU Sphinx) , 2017 .
[6] Haizhou Li,et al. Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..
[7] Yuqiong Sun,et al. AuDroid: Preventing Attacks on Audio Channels in Mobile Devices , 2015, ACSAC.
[8] A. Acquisti,et al. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk , 2013, Behavior Research Methods.
[9] Zhi Xu,et al. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones , 2015, CODASPY.
[10] Paris Smaragdis,et al. A Framework for Secure Speech Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[11] Bhiksha Raj,et al. Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise , 2013, IEEE Signal Processing Magazine.
[12] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[13] L. DoraM.Ballesteros,et al. Speech Scrambling Based on Imitation of a Target Speech Signal with Non-confidential Content , 2014, Circuits Syst. Signal Process..