{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:17:48Z","timestamp":1755998268699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3267357.3267359","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"12-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Reactive Acoustic Jamming for Personal Voice Assistants"],"prefix":"10.1145","author":[{"given":"Peng","family":"Cheng","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"Ibrahim Ethem","family":"Bagci","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"Jeff","family":"Yan","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]},{"given":"Utz","family":"Roedig","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AlexaPi. 2016. Alexa client for all your devices! https:\/\/github.com\/alexa-pi\/AlexaPi . (2016).  AlexaPi. 2016. Alexa client for all your devices! https:\/\/github.com\/alexa-pi\/AlexaPi . (2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463185"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854370"},{"key":"e_1_3_2_1_4_1","unstructured":"Carnegie Mellon UniversitySphinx. 2006 a. Basic concepts of speech recognition. https:\/\/cmusphinx.github.io\/wiki\/tutorialconcepts\/. (2006).  Carnegie Mellon UniversitySphinx. 2006 a. Basic concepts of speech recognition. https:\/\/cmusphinx.github.io\/wiki\/tutorialconcepts\/. (2006)."},{"key":"e_1_3_2_1_5_1","unstructured":"Carnegie Mellon UniversitySphinx. 2006 b. Open Source Speech Recognition Toolkit . https:\/\/cmusphinx.github.io\/. (2006).  Carnegie Mellon UniversitySphinx. 2006 b. Open Source Speech Recognition Toolkit . https:\/\/cmusphinx.github.io\/. (2006)."},{"key":"e_1_3_2_1_6_1","unstructured":"Festival. 2004. The Festival Speech Synthesis System (version 2.4) . http:\/\/www.cstr.ed.ac.uk\/projects\/festival\/. (2004).  Festival. 2004. The Festival Speech Synthesis System (version 2.4) . http:\/\/www.cstr.ed.ac.uk\/projects\/festival\/. (2004)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1659988"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the ESSV 2014, Conference on Electronic Speech Signal Processing. 1--10","author":"Lange Patrick","year":"2014","unstructured":"Patrick Lange and David Suendermann-Oeft . 2014 . Tuning Sphinx to outperform Google's speech recognition API . In Proc. of the ESSV 2014, Conference on Electronic Speech Signal Processing. 1--10 . Patrick Lange and David Suendermann-Oeft. 2014. Tuning Sphinx to outperform Google's speech recognition API. In Proc. of the ESSV 2014, Conference on Electronic Speech Signal Processing. 1--10."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1075\/ijcl.22.3.02lov"},{"key":"e_1_3_2_1_13_1","unstructured":"Minhua Wu; Sankaran Panchapagesan; Ming Sun; Jiacheng Gu; Ryan Thomas; Shiv Naga Prasad Vitaladevuni; Bjorn Hoffmeister; Arindam Mandal. 2018. Monophone-Based Background Modeling for Two-Stage On-Deivce Wake Word Detection . (2018). http:\/\/sigport.org\/2800  Minhua Wu; Sankaran Panchapagesan; Ming Sun; Jiacheng Gu; Ryan Thomas; Shiv Naga Prasad Vitaladevuni; Bjorn Hoffmeister; Arindam Mandal. 2018. Monophone-Based Background Modeling for Two-Stage On-Deivce Wake Word Detection . (2018). http:\/\/sigport.org\/2800"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514298"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Sankaran Panchapagesan Ming Sun Aparna Khare Spyros Matsoukas Arindam Mandal Bj\u00f6rn Hoffmeister and Shiv Vitaladevuni. 2016. Multi-Task Learning and Weighted Cross-Entropy for DNN-Based Keyword Spotting.. In INTERSPEECH . 760--764.  Sankaran Panchapagesan Ming Sun Aparna Khare Spyros Matsoukas Arindam Mandal Bj\u00f6rn Hoffmeister and Shiv Vitaladevuni. 2016. Multi-Task Learning and Weighted Cross-Entropy for DNN-Based Keyword Spotting.. In INTERSPEECH . 760--764.","DOI":"10.21437\/Interspeech.2016-1485"},{"key":"e_1_3_2_1_16_1","volume-title":"Denial of service attacks in wireless networks: The case of jammers","author":"Pelechrinis Konstantinos","year":"2011","unstructured":"Konstantinos Pelechrinis , Marios Iliofotou , and Srikanth V Krishnamurthy . 2011. Denial of service attacks in wireless networks: The case of jammers . IEEE Communications surveys & tutorials , Vol. 13 , 2 ( 2011 ), 245--257. Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth V Krishnamurthy. 2011. Denial of service attacks in wireless networks: The case of jammers . IEEE Communications surveys & tutorials , Vol. 13, 2 (2011), 245--257."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_18_1","volume-title":"Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy , Sheng Shen , Haitham Hassanieh , and Romit Roy Choudhury . 2018 . Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) . USENIX Association, Renton, WA, 547--560. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/roy Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA, 547--560. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/roy"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098253"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.22"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018518"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"volume-title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Yuan Xuejing","key":"e_1_3_2_1_25_1","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , XiaoFeng Wang , and Carl A. Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 49--64. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yuan-xuejing Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 49--64. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yuan-xuejing"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2nd International Workshop on Multimedia Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267357.3267359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267357.3267359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:43Z","timestamp":1750208263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267357.3267359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":25,"alternative-id":["10.1145\/3267357.3267359","10.1145\/3267357"],"URL":"https:\/\/doi.org\/10.1145\/3267357.3267359","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}