Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Voice presentation attack detection through text-converted voice command analysis

Full metadata record
DC Field Value Language
dc.contributor.authorKwak, I.-Y.-
dc.contributor.authorHuh, J.H.-
dc.contributor.authorHan, S.T.-
dc.contributor.authorKim, I.-
dc.contributor.authorYoon, J.-
dc.date.accessioned2023-03-08T15:44:00Z-
dc.date.available2023-03-08T15:44:00Z-
dc.date.issued2019-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/63793-
dc.description.abstractVoice assistants are quickly being upgraded to support advanced, security-critical commands such as unlocking devices, checking emails, and making payments. In this paper, we explore the feasibility of using users’ text-converted voice command utterances as classification features to help identify users’ genuine commands, and detect suspicious commands. To maintain high detection accuracy, our approach starts with a globally trained attack detection model (immediately available for new users), and gradually switches to a user-specific model tailored to the utterance patterns of a target user. To evaluate accuracy, we used a real-world voice assistant dataset consisting of about 34.6 million voice commands collected from 2.6 million users. Our evaluation results show that this approach is capable of achieving about 3.4% equal error rate (EER), detecting 95.7% of attacks when an optimal threshold value is used. As for those who frequently use security-critical (attack-like) commands, we still achieve EER below 5%. © 2019 Association for Computing Machinery.-
dc.language영어-
dc.language.isoENG-
dc.publisherAssociation for Computing Machinery-
dc.titleVoice presentation attack detection through text-converted voice command analysis-
dc.typeArticle-
dc.identifier.doi10.1145/3290605.3300828-
dc.identifier.bibliographicCitationConference on Human Factors in Computing Systems - Proceedings-
dc.description.isOpenAccessN-
dc.identifier.wosid000474467907055-
dc.identifier.scopusid2-s2.0-85067622621-
dc.citation.titleConference on Human Factors in Computing Systems - Proceedings-
dc.type.docTypeConference Paper-
dc.subject.keywordAuthorAttack detection-
dc.subject.keywordAuthorVoice assistant security-
dc.subject.keywordAuthorVoice command analysis-
dc.subject.keywordPlusSPEAKER IDENTIFICATION-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Cybernetics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Business & Economics > Department of Applied Statistics > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kwak, Il-Youp photo

Kwak, Il-Youp
대학원 (통계데이터사이언스학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE