Personnaliser

OK

Secure Voice Processing Systems against Malicious Voice Attacks - Kun Sun

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

59,99 €

Occasion · Comme Neuf

  • Ou 15,00 € /mois

  • 9,00 € offerts
    • Livraison : 0,00 €
    • Livré entre le 6 et le 15 mai
    Voir les modes de livraison

    USAMedia

    PRO Vendeur favori

    4,6/5 sur + de 1 000 ventes

    Service client à l'écoute et une politique de retour sans tracas - Livraison des USA en 3 a 4 semaines (2 mois si circonstances exceptionnelles) - La plupart de nos titres sont en anglais, sauf indication contraire. N'hésitez pas à nous envoyer un e-... Voir plus
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Secure Voice Processing Systems Against Malicious Voice Attacks de Kun Sun Format Broché  - Livre Informatique

        Note : 0 0 avis sur Secure Voice Processing Systems Against Malicious Voice Attacks de Kun Sun Format Broché  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Secure Voice Processing Systems Against Malicious Voice Attacks de Kun Sun Format Broché

         - Livre Informatique

        Livre Informatique - Kun Sun - 01/10/2023 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Kun Sun - Shu Wang
      • Editeur : Springer International Publishing Ag
      • Langue : Anglais
      • Parution : 01/10/2023
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 128
      • Expédition : 207
      • Dimensions : 23.5 x 15.5 x 0.8
      • ISBN : 9783031447471



      • Résumé :
        This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes. First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems. This book is intended for security researchers, computer scientists, and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security, and audio security. Advanced-level students who are studying these topics will benefit from this book as well.

        Biographie:
        Dr. Kun Sun is a professor in the Department of Information Sciences and Technology at George Mason University. He is also the director of Sun Security Laboratory and the associate director of the Center for Secure Information Systems. He received his Ph.D. in Computer Science from North Carolina State University. Before joining GMU, he was an assistant professor in College of William and Mary. He has more than 15 years working experience in both academia and industry...

        Sommaire:

        1 Introduction.- 1.1 Overview.- 1.2 Background.- 1.2.1 Audio Signal Processing .- 1.2.2 Voice Processing Systems.- 1.2.3 Attacks on Speaker Verification Systems.- 1.2.4 Attacks on Speech Recognition Systems .- 1.3 Book Structure.- References . . .- 2 Modulated Audio Replay Attack and Dual-Domain Defense.- 2.1 Introduction.- 2.2 Modulated Replay Attacks .- 2.2.1 Impacts of Replay Components .- 2.2.2 Attack Overview .- 2.2.3 Modulation Processor .- 2.2.4 Inverse Filter Estimation .- 2.2.5 Spectrum Processing .- 2.3 Countermeasure: Dual-domain Detection.- 2.3.1 Defense Overview .- 2.3.2 Time-domain Defense .- 2.3.3 Frequency-domain Defense .- 2.3.4 Security Analysis .- 2.4 Evaluation .- .- 2.4.1 Experiment Setup .- .- 2.4.2 Effectiveness of Modulated Replay Attacks.- 2.4.3 Effectiveness of Dual-Domain Detection .- 2.4.4 Robustness of Dual-Domain Detection .- 2.4.5 Overhead of Dual-Domain Detection .- 2.5 Conclusion .- .- Appendix 2.A: Mathematical Proof of Ringing Artifacts in Modulated Replay Audio .- .- Appendix 2.B: Parameters in Detection Methods .- Appendix 2.C: Inverse Filter Implementation .- Appendix 2.D: Classifiers in Time-Domain Defense .- References .- 3 Secure Voice Processing Systems for Driverless Vehicles.- 3.1 Introduction .- 3.2 Threat Model and Assumptions .- 3.3 System Design .- 3.3.1 System Overview .- 3.3.2 Detecting Multiple Speakers .- 3.3.3 Identifying Human Voice .- 3.3.4 Identifying Driver's Voice .- 3.4 Experimental Results .- 3.4.1 Accuracy on Detecting Multiple Speakers.- 3.4.2 Accuracy on Detecting Human Voice .- 3.4.3 Accuracy on Detecting Driver's Voice .- 3.4.4 System Robustness .- 3.4.5 Performance Overhead .- 3.5 Discussions .- 3.6 Conclusion .- References.- 4 Acoustic Compensation System against Adversarial Voice Recognition.- 4.1 Introduction .- 4.2 Threat Model .- 4.2.1 Spectrum Reduction Attack .- 4.2.2 Threat Hypothesis .- 4.3 System Design .- 4.3.1 Overview .- 4.3.2 Spectrum Compensation Module .- 4.3.3 Noise Addition Module.- 4.3.4 Adaptation Module .- 4.4 Evaluations .- 4.4.1 Experiment Setup .- 4.4.2 ACE Evaluation .- 4.4.3 Spectrum Compensation Module Evaluation.- 4.4.4 Noise Addition Module Evaluation .- 4.4.5 Adaptation Module Evaluation .- 4.4.6 Overhead .- 4.5 Residual Error Analysis .- 4.5.1 Types of ASR Inference Errors .- 4.5.2 Error Composition Analysis .- 4.6 Discussions .- 4.6.1 Multipath Effect and Audio Quality Improvement.- 4.6.2 Usability .- 4.6.3 Countering Attack Variants .- 4.6.4 Limitations .- 4.7 Conclusion .-  Appendix 4.A: Echo Module .- Appendix 4.B: ACE Performance tested with CMU Sphinx.- Appendix 4.C: ACE Performance against Attack Variants.- References.- 5 Conclusion and Future Work .- 5.1 Conclusion .- 5.2 Future Work .- References.

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com