Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Speech recognition
biblio
Spoofed Voice Detection using Dense Features of STFT and MDCT Spectrograms
Submitted by aekwall on Tue, 01/25/2022 - 3:50pm
CNN
STFT
spoofed voices
spectrum
recognition
MDCT
Hann window
Fourier transforms
attestation
Forensics
Speech recognition
Forgery
discrete cosine transforms
composability
Human behavior
Resiliency
pubcrawl
feature extraction
authentication
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
iOS Security
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
android
biblio
TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
Submitted by grigby1 on Thu, 07/08/2021 - 3:51pm
smart phones
Voiceprint recognition
voice-print
voice
two factor authentication
Telecommunications
Speech recognition
Spectrogram
speaker recognition
authentication
security
pubcrawl
MFCC
identity authentication
Human Factors
Human behavior
GMM-UBM
biblio
Adversarial Deception in Deep Learning: Analysis and Mitigation
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
predictive security metrics
Computational modeling
deep learning
false trust
Measurement
Mitigation strategy
Perturbation methods
policy-based governance
Predictive models
pubcrawl
Resiliency
Scalability
Speech recognition
targeted and untargeted adversarial attacks
Training
Trust and dependability risks in deep learning
biblio
A Survey on Amazon Alexa Attack Surfaces
Submitted by aekwall on Thu, 05/13/2021 - 11:35am
Scalability
voice hacking
Virtual assistants
echo
Amazon Alexa
Alexa skills
attack surface
Attack Surfaces
Surface treatment
Speech recognition
security
usability
Data collection
Ecosystems
privacy
Metrics
pubcrawl
Resiliency
Internet of Things
biblio
Multi-format speech perception hashing based on time-frequency parameter fusion of energy zero ratio and frequency band variance
Submitted by grigby1 on Fri, 12/11/2020 - 2:43pm
resilience
time-frequency parameter fusion
time-frequency features
Time-frequency Analysis
Time Frequency Analysis
speech signal processing
Speech recognition
speech processing
speech content authentication
sensor fusion
security
Scalability
Robustness
Resiliency
Cryptography
pubcrawl
perceptual hash
multiformat speech perception hashing
microsoft windows
Metrics
message authentication
mean filtering
Libraries
key dependence
hash sequence security
frequency band variance
feature extraction
energy zero ratio
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by aekwall on Mon, 09/14/2020 - 12:28pm
Privacy-preserving
composability
smart IoT devices
smart Internet of Things (IoT) devices
privacy-preserving outsourced speech recognition
outsourced privacy-preserving speech recognition framework
neural network-based speech recognition
long short-term memory neural network
long short-term memory (LSTM)
intelligent IoT device voice control
human-machine interaction interface
forward propagation (FP)
Back propagation through time (BPTT)
additive secret sharing-based interactive protocols
data privacy
Speech recognition
edge computing
recurrent neural nets
Logic gates
Neural networks
Cryptography
privacy
pubcrawl
privacy leakage
Protocols
distributed processing
Internet of Things
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
CAPTCHA
text-based
Speech recognition
image-based
image segmentation
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA designing techniques
CAPTCHA categories
CAPTCHA breaking techniques
audio/video based
attack methods
security of data
captchas
usability
security mechanism
Google
computer science
composability
Human behavior
pubcrawl
security
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
« first
‹ previous
1
2
3
4
next ›
last »