{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:54:23Z","timestamp":1757541263826,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030306182"},{"type":"electronic","value":"9783030306199"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30619-9_27","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T06:51:47Z","timestamp":1568184707000},"page":"378-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users\u2019 Awareness"],"prefix":"10.1007","author":[{"given":"Rongjunchen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"James","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"27_CR1","unstructured":"IBM Watson. \nhttps:\/\/www.ibm.com\/watson\/\n\n. Accessed 28 Sept 2018"},{"key":"27_CR2","unstructured":"Virus Total. \nhttps:\/\/www.virustotal.com\n\n. Accessed 29 Sept 2018"},{"key":"27_CR3","unstructured":"Android 9 Changes (2018). \nhttps:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all\n\n. Accessed 1 Apr 2019"},{"key":"27_CR4","unstructured":"Control Google Home by Voice (2018). \nhttps:\/\/support.google.com\/googlehome\/answer\/7207759?hl=en-AU&ref_topic=7196346\n\n. Accessed 29 Sept 2018"},{"key":"27_CR5","unstructured":"Now the Google Assistant Can Take Care of Your IOUs (2018). \nhttps:\/\/www.blog.google\/products\/assistant\/now-google-assistant-can-take-care-your-ious\n\n. Accessed 29 Sept 2018"},{"key":"27_CR6","unstructured":"Permissions Overview (2018). \nhttps:\/\/developer.android.com\/guide\/topics\/per-missions\/overview#dangerous-permission-prompt\n\n. Accessed 29 Sept 2018"},{"key":"27_CR7","unstructured":"Firebase (2019). \nhttps:\/\/firebase.google.com"},{"key":"27_CR8","unstructured":"Nearest Neighbor Interpolation (2019). \nhttps:\/\/en.wikipedia.org\/wiki\/Nearest-neighbor_interpolation"},{"key":"27_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"17841","DOI":"10.1109\/ACCESS.2017.2747626","volume":"5","author":"E Alepis","year":"2017","unstructured":"Alepis, E., Patsakis, C.: Monkey says, monkey does: security and privacy on voice assistants. IEEE Access 5, 17841\u201317851 (2017)","journal-title":"IEEE Access"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Anjum, A., Ilyas, M.U.: Activity recognition using smartphone sensors. In: 2013 IEEE Consumer Communications and Networking Conference (CCNC), pp. 914\u2013919. IEEE (2013)","DOI":"10.1109\/CCNC.2013.6488584"},{"key":"27_CR12","unstructured":"Arik, S., Chen, J., Peng, K., Ping, W., Zhou, Y.: Neural voice cloning with a few samples. In: Advances in Neural Information Processing Systems, pp. 10019\u201310029 (2018)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Aron, J.: How innovative is apple\u2019s new voice assistant, Siri? (2011)","DOI":"10.1016\/S0262-4079(11)62647-X"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40994-3_25"},{"key":"27_CR16","unstructured":"Binder, J., Post, S.D., Tackin, O., Gruber, T.R.: Voice trigger for a digital assistant. US Patent App. 14\/175,864, 7 August 2014"},{"key":"27_CR17","unstructured":"Carlini, N., et al.: Hidden voice commands. In: USENIX Security Symposium (2016)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merri\u00ebnboer, B., Bahdanau, D., Bengio, Y.: On the properties of neural machine translation: encoder-decoder approaches. arXiv preprint \narXiv:1409.1259\n\n (2014)","DOI":"10.3115\/v1\/W14-4012"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"De Silva, L.C.: Multi-sensor based human activity detection for smart homes. In: Proceedings of the 3rd International Universal Communication Symposium, IUCS 2009, pp. 223\u2013229 (2009)","DOI":"10.1145\/1667780.1667827"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Diao, W., Liu, X., Zhou, Z., Zhang, K.: Your voice assistant is mine: how to abuse speakers to steal information and control your phone. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM 2014, pp. 63\u201374 (2014)","DOI":"10.1145\/2666620.2666623"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, pp. 343\u2013355 (2017)","DOI":"10.1145\/3117811.3117823"},{"issue":"4","key":"27_CR22","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/89.917681","volume":"9","author":"A Ganapathiraju","year":"2001","unstructured":"Ganapathiraju, A., Hamaker, J., Picone, J., Ordowski, M., Doddington, G.R.: Syllable-based large vocabulary continuous speech recognition. IEEE Trans. Speech Audio Process. 9(4), 358\u2013366 (2001)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"27_CR23","unstructured":"Gibiansky, A., et al.: Deep voice 2: multi-speaker neural text-to-speech. In: Advances in Neural Information Processing Systems, pp. 2962\u20132970 (2017)"},{"key":"27_CR24","unstructured":"Google: What Can Your Google Assistant Do? (2018). \nhttps:\/\/assistant.google.com\/explore?hl=en-AU\n\n. Accessed 29 Sept 2018"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A., Hinton, G.: Speech recognition with deep recurrent neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6645\u20136649. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"27_CR26","unstructured":"Gross, M.: Context-aware computing: from neuroscience to mobile devices (2015)"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Ho, J., Intille, S.S.: Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 909\u2013918. ACM (2005)","DOI":"10.1145\/1054972.1055100"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Kiseleva, J., et al.: Understanding user satisfaction with intelligent assistants. In: Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval, CHIIR 2016, pp. 121\u2013130 (2016)","DOI":"10.1145\/2854946.2854961"},{"key":"27_CR29","unstructured":"Knote, R., Janson, A., Eigenbrod, L., S\u00f6llner, M.: The what and how of smart personal assistants: principles and application domains for is research (2018)"},{"key":"27_CR30","unstructured":"Kumar, D., et al.: Skill squatting attacks on Amazon Alexa. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 33\u201347 (2018)"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Liu, R., Cornelius, C., Rawassizadeh, R., Peterson, R., Kotz, D.: Poster: vocal resonance as a passive biometric. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2017, pp. 160\u2013160 (2017)","DOI":"10.1145\/3081333.3089304"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystroke inference with smartwatch. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1273\u20131285 (2015)","DOI":"10.1145\/2810103.2813668"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building Markov chains of behavioral models. arXiv preprint \narXiv:1612.04433\n\n (2016)","DOI":"10.14722\/ndss.2017.23353"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Marquardt, P., Verma, A., Carter, H., Traynor, P.: (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 551\u2013562. ACM (2011)","DOI":"10.1145\/2046707.2046771"},{"issue":"2","key":"27_CR35","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.smrv.2006.09.001","volume":"11","author":"A Muzet","year":"2007","unstructured":"Muzet, A.: Environmental noise, sleep and health. Sleep Med. Rev. 11(2), 135\u2013142 (2007)","journal-title":"Sleep Med. Rev."},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nherr, L., Kohls, K., Zeiler, S., Holz, T., Kolossa, D.: Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. arXiv preprint \narXiv:1808.05665\n\n (2018)","DOI":"10.14722\/ndss.2019.23288"},{"issue":"6","key":"27_CR37","doi-asserted-by":"publisher","first-page":"10146","DOI":"10.3390\/s140610146","volume":"14","author":"M Shoaib","year":"2014","unstructured":"Shoaib, M., Bosch, S., Incel, O.D., Scholten, H., Havinga, P.J.: Fusion of smartphone motion sensors for physical activity recognition. Sensors 14(6), 10146\u201310176 (2014)","journal-title":"Sensors"},{"key":"27_CR38","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint \narXiv:1312.6199\n\n (2013)"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Wiese, J., Saponas, T.S., Brush, A.B.: Phoneprioception: enabling mobile phones to infer where they are kept. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2157\u20132166 (2013)","DOI":"10.1145\/2470654.2481296"},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"Xu, N., Zhang, F., Luo, Y., Jia, W., Xuan, D., Teng, J.: Stealthy video capturer: a new video-based spyware in 3G smartphones. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 69\u201378. ACM (2009)","DOI":"10.1145\/1514274.1514285"},{"key":"27_CR41","unstructured":"Yuan, X., et al.: CommanderSong: a systematic approach for practical adversarial voice recognition. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 49\u201364 (2018)"},{"key":"27_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: DolphinAttack: inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 (2017)","DOI":"10.1145\/3133956.3134052"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30619-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:08:41Z","timestamp":1584403721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30619-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030306182","9783030306199"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30619-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ml4cs2019.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}