{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:14:50Z","timestamp":1777130090775,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427281","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"884-896","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment"],"prefix":"10.1145","author":[{"given":"Linghan","family":"Zhang","sequence":"first","affiliation":[{"name":"FSU, United States of America"}]},{"given":"Sheng","family":"Tan","sequence":"additional","affiliation":[{"name":"Trinity University, United States of America"}]},{"given":"Zi","family":"Wang","sequence":"additional","affiliation":[{"name":"FSU, United States of America"}]},{"given":"Yili","family":"Ren","sequence":"additional","affiliation":[{"name":"FSU, United States of America"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"FSU, United States of America"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"FSU, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2008. Personal Music Players and Hearing. https:\/\/ec.europa.eu\/health\/scientific_committees\/opinions_layman\/en\/hearing-loss-personal-music-player-mp3\/l-2\/2-sound-measurement-decibel.htm.  2008. Personal Music Players and Hearing. https:\/\/ec.europa.eu\/health\/scientific_committees\/opinions_layman\/en\/hearing-loss-personal-music-player-mp3\/l-2\/2-sound-measurement-decibel.htm."},{"key":"e_1_3_2_1_2_1","unstructured":"2012. Dumping of sound level vs distance. http:\/\/www.sengpielaudio.com\/calculator-distance.htm.  2012. Dumping of sound level vs distance. http:\/\/www.sengpielaudio.com\/calculator-distance.htm."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. Why does your voice sound different on a recording. http:\/\/www.bbc.com\/future\/story\/20130913-why-we-hate-hearing-our-own-voice.  2013. Why does your voice sound different on a recording. http:\/\/www.bbc.com\/future\/story\/20130913-why-we-hate-hearing-our-own-voice."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. VocalPassword. http:\/\/www.nuance.com\/ucmprod\/groups\/enterprise\/@webenus\/documents\/collateral\/nc_015226.pdf.  2015. VocalPassword. http:\/\/www.nuance.com\/ucmprod\/groups\/enterprise\/@webenus\/documents\/collateral\/nc_015226.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Adobe Voco \u2019Photoshop-for-voice\u2019 causes concern. https:\/\/www.bbc.com\/news\/technology-37899902.  2016. Adobe Voco \u2019Photoshop-for-voice\u2019 causes concern. https:\/\/www.bbc.com\/news\/technology-37899902."},{"key":"e_1_3_2_1_6_1","unstructured":"2016. All the Technology Inside Your Google Home. https:\/\/electronics360.globalspec.com\/article\/7718\/all-the-technology-inside-your-google-home.  2016. All the Technology Inside Your Google Home. https:\/\/electronics360.globalspec.com\/article\/7718\/all-the-technology-inside-your-google-home."},{"key":"e_1_3_2_1_7_1","unstructured":"2016. FACTS ABOUT SPEECH INTELLIGIBILITY. https:\/\/www.dpamicrophones.com\/mic-university\/facts-about-speech-intelligibility.  2016. FACTS ABOUT SPEECH INTELLIGIBILITY. https:\/\/www.dpamicrophones.com\/mic-university\/facts-about-speech-intelligibility."},{"key":"e_1_3_2_1_8_1","unstructured":"2016. VoiceVault. http:\/\/www.nuance.com\/landingpages\/products\/voicebiometrics\/vocalpassword.asp.  2016. VoiceVault. http:\/\/www.nuance.com\/landingpages\/products\/voicebiometrics\/vocalpassword.asp."},{"key":"e_1_3_2_1_9_1","unstructured":"2017. Burger King\u2019s new ad forces Google Home to advertise the Whopper. https:\/\/www.theverge.com\/2017\/4\/12\/15259400\/burger-king-google-home-ad-wikipedia.  2017. Burger King\u2019s new ad forces Google Home to advertise the Whopper. https:\/\/www.theverge.com\/2017\/4\/12\/15259400\/burger-king-google-home-ad-wikipedia."},{"key":"e_1_3_2_1_10_1","unstructured":"2017. Google Home now recognizes your individual voice. https:\/\/money.cnn.com\/2017\/04\/20\/technology\/google-home-voice-recognition\/index.html.  2017. Google Home now recognizes your individual voice. https:\/\/money.cnn.com\/2017\/04\/20\/technology\/google-home-voice-recognition\/index.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2017. The Source Filter Theory. http:\/\/my.ilstu.edu\/~jsawyer\/resonancesoftchalk\/resonancesoftchalk7.html.  2017. The Source Filter Theory. http:\/\/my.ilstu.edu\/~jsawyer\/resonancesoftchalk\/resonancesoftchalk7.html."},{"key":"e_1_3_2_1_12_1","unstructured":"2017. The Voice Foundation. https:\/\/voicefoundation.org\/health-science\/voice-disorders\/anatomy-physiology-of-voice-production\/understanding-voice-production\/.  2017. The Voice Foundation. https:\/\/voicefoundation.org\/health-science\/voice-disorders\/anatomy-physiology-of-voice-production\/understanding-voice-production\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2018. Designing a VUI-Voice User Interface. https:\/\/uxplanet.org\/designing-a-vui-voice-user-interface-c0b3b9b57ace.  2018. Designing a VUI-Voice User Interface. https:\/\/uxplanet.org\/designing-a-vui-voice-user-interface-c0b3b9b57ace."},{"key":"e_1_3_2_1_14_1","unstructured":"2018. How Voice User Interface is taking over the world and why you should care. https:\/\/medium.com\/@goodrebels\/how-voice-user-interface-is-taking-over-the-world-and-why-you-should-care-54474bd56f81.  2018. How Voice User Interface is taking over the world and why you should care. https:\/\/medium.com\/@goodrebels\/how-voice-user-interface-is-taking-over-the-world-and-why-you-should-care-54474bd56f81."},{"key":"e_1_3_2_1_15_1","unstructured":"2018. protecting privacy on VUI. https:\/\/medium.com\/grandstudio\/protecting-privacy-in-voice-user-interfaces-b800e47728.  2018. protecting privacy on VUI. https:\/\/medium.com\/grandstudio\/protecting-privacy-in-voice-user-interfaces-b800e47728."},{"key":"e_1_3_2_1_16_1","volume-title":"The 13 Best Smart Home Devices and Systems of","year":"2019"},{"key":"e_1_3_2_1_17_1","unstructured":"2019. 7 Key Predictions For The Future Of Voice Assistants And AI. https:\/\/clearbridgemobile.com\/7-key-predictions-for-the-future-of-voice-assistants-and-ai\/.  2019. 7 Key Predictions For The Future Of Voice Assistants And AI. https:\/\/clearbridgemobile.com\/7-key-predictions-for-the-future-of-voice-assistants-and-ai\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2019. Aliasing. https:\/\/en.wikipedia.org\/wiki\/Aliasing.  2019. Aliasing. https:\/\/en.wikipedia.org\/wiki\/Aliasing."},{"key":"e_1_3_2_1_19_1","unstructured":"2019. Amazon Echo Studio: First impressions. https:\/\/www.techhive.com\/article\/3441216\/amazon-echo-studio-first-impressions.html.  2019. Amazon Echo Studio: First impressions. https:\/\/www.techhive.com\/article\/3441216\/amazon-echo-studio-first-impressions.html."},{"key":"e_1_3_2_1_20_1","unstructured":"2019. Amazon files patent for replay attack detection method to protect voice authentication. https:\/\/www.biometricupdate.com\/201901\/amazon-files-patent-for-replay-attack-detection-method-to-protect-voice-authentication.  2019. Amazon files patent for replay attack detection method to protect voice authentication. https:\/\/www.biometricupdate.com\/201901\/amazon-files-patent-for-replay-attack-detection-method-to-protect-voice-authentication."},{"key":"e_1_3_2_1_21_1","unstructured":"2019. Biometrics: authentication and identification (2019 review). https:\/\/www.gemalto.com\/govt\/inspired\/biometrics.  2019. Biometrics: authentication and identification (2019 review). https:\/\/www.gemalto.com\/govt\/inspired\/biometrics."},{"key":"e_1_3_2_1_22_1","unstructured":"2019. Decibel Meter. https:\/\/www.pce-instruments.com\/us\/measuring-instruments\/test-meters\/decibel-meter-kat_162375.htm.  2019. Decibel Meter. https:\/\/www.pce-instruments.com\/us\/measuring-instruments\/test-meters\/decibel-meter-kat_162375.htm."},{"key":"e_1_3_2_1_23_1","unstructured":"2019. Google express store. https:\/\/express.google.com\/stores.  2019. Google express store. https:\/\/express.google.com\/stores."},{"key":"e_1_3_2_1_24_1","unstructured":"2019. in-car voice assistant consumer adoption report. https:\/\/voicebot.ai\/wp-content\/uploads\/2019\/01\/in-car_voice_assistant_consumer_adoption_report_2019_voicebot.pdf.  2019. in-car voice assistant consumer adoption report. https:\/\/voicebot.ai\/wp-content\/uploads\/2019\/01\/in-car_voice_assistant_consumer_adoption_report_2019_voicebot.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"2019. INMP621 Wide Dynamic Range Microphone with PDM Digital Output. https:\/\/www.invensense.com\/products\/digital\/inmp621\/product-documentation.  2019. INMP621 Wide Dynamic Range Microphone with PDM Digital Output. https:\/\/www.invensense.com\/products\/digital\/inmp621\/product-documentation."},{"key":"e_1_3_2_1_26_1","unstructured":"2019. Nyquist frequency. https:\/\/en.wikipedia.org\/wiki\/Nyquist_frequency.  2019. Nyquist frequency. https:\/\/en.wikipedia.org\/wiki\/Nyquist_frequency."},{"key":"e_1_3_2_1_27_1","unstructured":"2019. smartLav+ Lavalier micropohne for smartphones. http:\/\/www.rode.com\/microphones\/smartlav-plus.  2019. smartLav+ Lavalier micropohne for smartphones. http:\/\/www.rode.com\/microphones\/smartlav-plus."},{"key":"e_1_3_2_1_28_1","unstructured":"2019. Standard score. https:\/\/en.wikipedia.org\/wiki\/Standard_score.  2019. Standard score. https:\/\/en.wikipedia.org\/wiki\/Standard_score."},{"key":"e_1_3_2_1_29_1","unstructured":"2019. Voice Is New UI. What Does It Mean for Enterprises?https:\/\/www.linkedin.com\/pulse\/voice-new-ui-what-does-mean-enterprises-sujatha-visweswara.  2019. Voice Is New UI. What Does It Mean for Enterprises?https:\/\/www.linkedin.com\/pulse\/voice-new-ui-what-does-mean-enterprises-sujatha-visweswara."},{"key":"e_1_3_2_1_30_1","volume-title":"2014 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, 1\u20136.","author":"Alegre Federico","year":"2014"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196545"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1979.1163209"},{"key":"e_1_3_2_1_33_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 513\u2013530.","author":"Carlini Nicholas"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487334"},{"key":"e_1_3_2_1_38_1","volume-title":"I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In Interspeech. 930\u2013934","author":"Hautam\u00e4ki Rosa\u00a0Gonz\u00e1lez","year":"2013"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.381081"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong\u00a0Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).  Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong\u00a0Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"e_1_3_2_1_43_1","unstructured":"Xinyu Lei Guan-Hua Tu Alex\u00a0X Liu Chi-Yu Li and Tian Xie. 2017. The insecurity of home digital voice assistants-amazon alexa as a case study. arXiv preprint arXiv:1712.03327(2017).  Xinyu Lei Guan-Hua Tu Alex\u00a0X Liu Chi-Yu Li and Tian Xie. 2017. The insecurity of home digital voice assistants-amazon alexa as a case study. arXiv preprint arXiv:1712.03327(2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1973.1162470"},{"key":"e_1_3_2_1_45_1","unstructured":"Khalid\u00a0Mahmood Malik Hafiz Malik and Roland Baumann. 2019. Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay. arXiv preprint arXiv:1904.06591(2019).  Khalid\u00a0Mahmood Malik Hafiz Malik and Roland Baumann. 2019. Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay. arXiv preprint arXiv:1904.06591(2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209591"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800100"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206769"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.3001703"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2013.6528953"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/andp.19324050109"},{"key":"e_1_3_2_1_55_1","volume-title":"The theory of linear prediction. Synthesis lectures on signal processing 2, 1","author":"Vaidyanathan P","year":"2007"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19530-3_25"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737422"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Zhizheng Wu Nicholas Evans Tomi Kinnunen Junichi Yamagishi Federico Alegre and Haizhou Li. 2015. Spoofing and countermeasures for speaker verification: A survey. speech communication 66(2015) 130\u2013153.  Zhizheng Wu Nicholas Evans Tomi Kinnunen Junichi Yamagishi Federico Alegre and Haizhou Li. 2015. Spoofing and countermeasures for speaker verification: A survey. speech communication 66(2015) 130\u2013153.","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2004-526"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":63,"alternative-id":["10.1145\/3427228.3427281","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427281","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}