{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:25:29Z","timestamp":1730273129489,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ised48680.2019.9096252","type":"proceedings-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T21:05:06Z","timestamp":1589922306000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Security over Voice Controlled Android Applications for Home IoT Systems"],"prefix":"10.1109","author":[{"given":"Sriram","family":"Sankaran","sequence":"first","affiliation":[]},{"given":"M R","family":"Prabha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"journal-title":"Hey siri-are you there? Jamming of voice commands using the resonance effect","year":"0","author":"oh","key":"ref11"},{"key":"ref12","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"journal-title":"Practical hidden voice attacks against speech and speaker recognition systems","year":"2019","author":"abdullah","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23288"},{"key":"ref16","first-page":"547","article-title":"Inaudible voice commands: The long-range attack and defense","author":"roy","year":"2018","journal-title":"15th USENIX Symposium on Networked Systems Design and Implementation ( NSDI 18)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209591"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3351258"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"journal-title":"Spying on the Smart Home Privacy Attacks and Defenses on Encrypted IoT Traffic","year":"2017","author":"apthorpe","key":"ref3"},{"key":"ref6","first-page":"153","article-title":"Design of wireless home automation and security system using pic microcontroller","volume":"3","author":"narayanan","year":"2013","journal-title":"International Journal of Computer Applications in Engineering Sciences"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229573"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.43"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2018.00012"},{"key":"ref2","article-title":"A review on security in smart home development","volume":"15","author":"robles","year":"2010","journal-title":"International Journal of Advanced Science and Technology"},{"journal-title":"Ubiquitous smart home system using android application","year":"2014","author":"kumar","key":"ref1"},{"journal-title":"Light commands Laser-based audio injection on voice-controllable systems","year":"2019","author":"sugawara","key":"ref9"}],"event":{"name":"2019 9th International Symposium on Embedded Computing and System Design (ISED)","start":{"date-parts":[[2019,12,13]]},"location":"Kollam, India","end":{"date-parts":[[2019,12,14]]}},"container-title":["2019 9th International Symposium on Embedded Computing and System Design (ISED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9089148\/9096215\/09096252.pdf?arnumber=9096252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:22:19Z","timestamp":1658262139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9096252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ised48680.2019.9096252","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}