• Publications
  • Influence
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
TLDR
We show that adversarial sound can be applied to ASR systems and show that the attacks can be systematically conducted. Expand
  • 115
  • 16
  • PDF
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
TLDR
We present Devil’s Whisper, a general adversarial attack on commercial ASR systems. Expand
  • 7
  • 1
  • PDF
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
TLDR
We propose REEVE (REmotE VoicE control) attack that can manipulate Amazon Alexa remotely, e.g., via signal broadcasting to compromise radio, TV, speaker. Expand
  • 7
Scintillation optimization of linear Gaussian beam array propagating through weak turbulence
The analytical expression for the scintillation index of the linear Gaussian beam array propagating through weak turbulence in the horizontal path is derived, where the coherent combination isExpand
  • 3
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside
TLDR
In this paper, we proposed MUTAE (Manipulating Users’ Trust on Amazon Echo) attack to remotely compromise Echo’s voice control interface. Expand
Optimization of multilayer radial beam array in weak turbulent atmosphere
Abstract The on-axis scintillation index of multilayer radial beam array with incoherent combination propagating through weak turbulence is studied. The results indicate that for large beam number,Expand
Effects of turbulent atmosphere on the properties of the multilayer radial beam array communication system
Based on the Rytov approximation theory, the analytical expression for the scintillation index of multiple beams propagating through non-Kolmogorov turbulence is derived, where the incoherentExpand