{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:08:45Z","timestamp":1769011725319,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["18K19789"],"award-info":[{"award-number":["18K19789"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3278497","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T13:39:38Z","timestamp":1542116378000},"page":"2222-2224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Audio Hotspot Attack"],"prefix":"10.1145","author":[{"given":"Ryo","family":"Iijima","sequence":"first","affiliation":[{"name":"Waseda University, Shinjuku, Japan"}]},{"given":"Shota","family":"Minami","sequence":"additional","affiliation":[{"name":"Waseda University, Shinjuku, Japan"}]},{"given":"Zhou","family":"Yunao","sequence":"additional","affiliation":[{"name":"Waseda University, Shinjuku, Japan"}]},{"given":"Tatsuya","family":"Takehisa","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Shinjuku, Japan"}]},{"given":"Yasuhiro","family":"Oikawa","sequence":"additional","affiliation":[{"name":"Waseda University, Shinjuku, Japan"}]},{"given":"Tatsuya","family":"Mori","sequence":"additional","affiliation":[{"name":"Waseda Univerisity, Shinjuku, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/console.aws.amazon.com\/polly\/home\/SynthesizeSpeech","author":"Polly Amazon","year":"2018","unstructured":"Amazon. 2018. Amazon Polly . ( 2018 ). https:\/\/console.aws.amazon.com\/polly\/home\/SynthesizeSpeech Amazon. 2018. Amazon Polly. (2018). https:\/\/console.aws.amazon.com\/polly\/home\/SynthesizeSpeech"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2012.04.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. N. Gurbatov O. V. Rudenko and A. I. Saichev. 2012. Waves and Structures in Nonlinear Nondispersive Media {electronic resource} : General Theory and Applications to Nonlinear Acoustics 2nd. ed.). Springer Berlin Heidelberg.  S. N. Gurbatov O. V. Rudenko and A. I. Saichev. 2012. Waves and Structures in Nonlinear Nondispersive Media {electronic resource} : General Theory and Applications to Nonlinear Acoustics 2nd. ed.). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-23617-4"},{"key":"e_1_3_2_1_4_1","volume-title":"Inaudible Voice Commands. CoRR","author":"Song Liwei","year":"2017","unstructured":"Liwei Song and Prateek Mittal . 2017. Inaudible Voice Commands. CoRR , Vol. abs\/ 1708 .07238 ( 2017 ). arxiv: 1708.07238 http:\/\/arxiv.org\/abs\/1708.07238 Liwei Song and Prateek Mittal. 2017. Inaudible Voice Commands. CoRR , Vol. abs\/1708.07238 (2017). arxiv: 1708.07238 http:\/\/arxiv.org\/abs\/1708.07238"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3278497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278497"}},"subtitle":["An Attack on Voice Assistance Systems Using Directional Sound Beams"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":5,"alternative-id":["10.1145\/3243734.3278497","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3278497","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}